<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//jeffric.com/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://jeffric.com/</loc>
		<lastmod>2026-04-22T02:36:03+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/my-favorite-michael-jackson-music-video-heal-the-world/258/</loc>
		<lastmod>2009-07-04T14:42:55+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/games-in-facebook-mafia-wars-and-farm-town/264/</loc>
		<lastmod>2009-07-21T14:58:45+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2009/07/mafia.JPG</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2009/07/farm.JPG</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/an-icon-of-democracy-cory-aquino/278/</loc>
		<lastmod>2009-08-03T19:09:03+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2009/08/cory_icon2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/my-farm-__/292/</loc>
		<lastmod>2009-11-11T18:01:20+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2009/11/farm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/best-wishes-to-my-friend/338/</loc>
		<lastmod>2010-01-28T14:30:06+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2010/01/odessa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/happy-valentines-day/345/</loc>
		<lastmod>2010-02-12T16:45:04+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2010/02/Pink_Heart_and_Roses.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-faculty-of-sagay-computer-institute/352/</loc>
		<lastmod>2010-02-25T06:58:08+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2010/02/Copy-of-Faculty-Tarpaulin-Portrait-NEW.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/maintenance-is-now-complete-d-wed-fri/393/</loc>
		<lastmod>2010-07-16T10:50:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/check-your-grades-online/397/</loc>
		<lastmod>2010-07-27T11:07:36+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/lst-cadiz-faculty/417/</loc>
		<lastmod>2010-10-21T05:44:58+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2010/10/69018_1615084386994_1532857491_1563128_5234970_n.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2010/10/69018_1615084346993_1532857491_1563127_6303048_n.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/it-started-with-a-kiss-episode-1/429/</loc>
		<lastmod>2011-03-15T15:35:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/how-to-prevent-computer-viruses-malware-from-infecting-your-computer/486/</loc>
		<lastmod>2011-04-10T13:08:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/free-webhosting-with-php-and-mysql-and-no-ads/523/</loc>
		<lastmod>2011-04-10T13:56:40+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/free-wordpress-themes/566/</loc>
		<lastmod>2011-04-10T20:46:32+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/ninjalion-web-hosting-promo-code/681/</loc>
		<lastmod>2011-04-24T20:13:24+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/pacman-wins-again/725/</loc>
		<lastmod>2011-05-08T05:21:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2011/05/Pacquiao-vs-Mosley-Tale-of-the-Tape.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/earn-money-from-your-facebook-and-twitter-account/729/</loc>
		<lastmod>2011-05-29T07:54:14+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2011/05/churp2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/promo-code-for-dreamhost-less85-85-discount-2011/479/</loc>
		<lastmod>2011-05-31T08:26:02+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2011/03/468x60-a.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/my-online-voting-system-using-php/735/</loc>
		<lastmod>2011-06-11T19:17:31+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/ok-pala-yung-ph-churpchurp-com-tweet-ka-lang-kita-na-astig-phchurpchurp/736/</loc>
		<lastmod>2011-07-18T18:09:22+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/egrades-an-online-grades-viewing-system/738/</loc>
		<lastmod>2011-07-24T04:54:02+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/long-weekend-this-august-august-29-30-is-a-holiday-d/748/</loc>
		<lastmod>2011-08-17T15:10:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/watch-this-video-by-mikey-bustos-and-lolmikeybustostutorial/754/</loc>
		<lastmod>2011-09-13T16:50:06+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2011/09/292.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/happy-new-year/772/</loc>
		<lastmod>2011-12-31T17:17:39+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2012/01/wpid-facebook_-687491198.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/free-facebook-for-tm-users/775/</loc>
		<lastmod>2012-02-24T15:13:39+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/my-ugly-flash-game-d/777/</loc>
		<lastmod>2012-03-18T13:02:17+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/temple-run-on-my-galaxy-ace/787/</loc>
		<lastmod>2012-05-17T06:33:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2012/04/temple.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/2012-promo-code-for-dreamhost-77offpromo/800/</loc>
		<lastmod>2012-06-06T20:33:20+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/flashlight-app-for-android/790/</loc>
		<lastmod>2012-07-16T15:17:53+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/%e2%96%88%e2%96%88%e2%96%88%e2%96%88%e2%96%88%e2%96%88%e2%96%88%e2%96%88%e2%96%88%e2%96%88%e2%96%88%e2%96%88%e2%96%88-title-%ca%99%ca%9f%e1%b4%8f%e1%b4%84%e1%b4%8b%e1%b4%87%e1%b4%85-%ca%80/803/</loc>
		<lastmod>2012-10-02T05:50:25+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/globe-broadband-a-very-unreliable-internet-service-provider/723/</loc>
		<lastmod>2012-11-08T19:18:49+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/my-new-philips-in-ear-headphone-from-hallohallomall/810/</loc>
		<lastmod>2012-12-05T07:51:44+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2012/12/C360_2012-12-05-12-43-29.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2012/12/mercury.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2012/12/C360_2012-12-05-12-43-29.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/canon-tx-1210hi-iii-calculator-my-3rd-order-hallohallomall/819/</loc>
		<lastmod>2013-01-16T15:13:59+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2013/01/C360_2013-01-16-11-36-14.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/my-second-order-at-hallohallo-mall/816/</loc>
		<lastmod>2013-01-24T13:06:35+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/nescafe-usb-flash-drive/823/</loc>
		<lastmod>2013-01-25T16:45:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2013/01/251865_4255309549934_357329693_n.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/my-first-order-at-lazada-philippines/826/</loc>
		<lastmod>2013-03-03T07:00:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2013/03/bag1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2013/03/bag1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2013/03/bag2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cherry-mobile-fusion-bolt/829/</loc>
		<lastmod>2013-03-05T17:40:14+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2013/03/542584_10151258842302443_604260811_n.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-review-on-pipo-smart-s2-aka-pipo-s2/832/</loc>
		<lastmod>2013-04-02T05:20:17+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2013/03/front.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2013/03/DSCN0402.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2013/03/side2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2013/03/side1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2013/03/back.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2013/03/Screenshot_2013-03-20-06-39-15.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2013/03/Screenshot_2013-03-20-14-04-26.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2013/03/Screenshot_2013-03-20-14-04-05.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2013/03/Screenshot_2013-03-20-14-03-13.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2013/03/Screenshot_2013-03-20-14-01-36.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2013/03/Screenshot_2013-03-20-14-00-39.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2013/03/Screenshot_2013-03-20-14-12-36.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2013/03/Screenshot_2013-03-20-14-14-501.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2013/03/DSCN0404.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/rooting-my-sony-xperia-c/882/</loc>
		<lastmod>2014-10-24T17:43:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2014/06/Screenshot_2014-06-15-15-22-24.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2014/06/Screenshot_2014-06-15-15-22-33.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/my-galaxy-ace/761/</loc>
		<lastmod>2014-11-17T16:30:58+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2011/10/01_large.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/site-update-and-maintenance/2550/</loc>
		<lastmod>2014-12-26T21:20:52+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/summer-i-need-some-vacation/4271/</loc>
		<lastmod>2015-04-24T09:46:58+00:00</lastmod>
		<image:image>
			<image:loc>http://jeffric.com/blogs1/wp-content/uploads/2015/04/wpid-dsc_0574.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/dost-project-noah-job-posting/4421/</loc>
		<lastmod>2015-05-04T03:33:29+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/campus-devcon-at-nonescost/4486/</loc>
		<lastmod>2015-05-08T08:44:26+00:00</lastmod>
		<image:image>
			<image:loc>http://jeffric.com/blogs1/wp-content/uploads/2015/05/wpid-fb_img_14264064653903744.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/conducting-arduino-seminar-mcc/4484/</loc>
		<lastmod>2015-05-08T08:46:18+00:00</lastmod>
		<image:image>
			<image:loc>http://jeffric.com/blogs1/wp-content/uploads/2015/05/wpid-dsc_0584.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/muni-muni-sa-suyak/4488/</loc>
		<lastmod>2015-05-08T08:48:04+00:00</lastmod>
		<image:image>
			<image:loc>http://jeffric.com/blogs1/wp-content/uploads/2015/05/wpid-dsc_0580.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/old-sagay-port/4490/</loc>
		<lastmod>2015-05-08T08:53:07+00:00</lastmod>
		<image:image>
			<image:loc>http://jeffric.com/blogs1/wp-content/uploads/2015/05/wpid-dsc_0565.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/super-nikoys/4684/</loc>
		<lastmod>2015-05-17T16:01:34+00:00</lastmod>
		<image:image>
			<image:loc>http://jeffric.com/blogs1/wp-content/uploads/2015/05/wpid-dsc_0662.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/healthy-lunch/4864/</loc>
		<lastmod>2015-05-27T15:42:32+00:00</lastmod>
		<image:image>
			<image:loc>http://jeffric.com/blogs1/wp-content/uploads/2015/05/wpid-dsc_0684.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/facts-about-smoking/243/</loc>
		<lastmod>2015-06-07T01:21:27+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2009/06/no_smoking.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/parbunkells/4971/</loc>
		<lastmod>2015-06-22T01:43:13+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/project-noah-holds-first-lecture-series-for-2015-devastation-of-aquifers-from-super-typhoon-haiyans-storm-surge/4998/</loc>
		<lastmod>2015-06-26T07:30:08+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/ebayanihan-project-launched-crowdsourcing-for-disaster-management/4999/</loc>
		<lastmod>2015-06-26T08:36:57+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/list-of-flood-prone-areas-in-metro-manila/5059/</loc>
		<lastmod>2015-07-08T22:13:33+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/browsing-prohibited-websites/68/</loc>
		<lastmod>2020-06-01T19:17:14+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-new-search-engine-bing/153/</loc>
		<lastmod>2020-06-02T13:39:49+00:00</lastmod>
		<image:image>
			<image:loc>http://www.jeffric.com/blogs1/wp-content/uploads/2009/05/bing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-speedier-google-chrome/82/</loc>
		<lastmod>2020-06-02T13:40:00+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/sun-promos-sun-unlimited-text-sun-unlimited-call/742/</loc>
		<lastmod>2020-06-02T17:10:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/05/sun-gigavideo-postpaid-banner-mobile.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/globe-promos-globe-unlimited-gosurf-promo/313/</loc>
		<lastmod>2020-06-02T17:12:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/05/Globe-GoSakto.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/smart-promos/97/</loc>
		<lastmod>2020-06-02T17:13:23+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/05/smart-prepaid-giga-video-offers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/loadxtreme-loading-app-for-android-devices/873/</loc>
		<lastmod>2020-06-02T17:49:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/05/loadxtreme.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2014/05/myloadxtreme_qr.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2014/10/Screenshot_2014-05-14-02-46-35.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2014/10/Screenshot_2014-05-14-02-47-01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2014/10/Screenshot_2014-05-14-02-47-14.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2014/10/Screenshot_2014-05-14-02-47-40.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/large-scale-attack-campaign-targets-database-credentials/15578/</loc>
		<lastmod>2020-06-04T06:08:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/large-scale-attack-campaign-targets-database-credentials.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/large-scale-attack-campaign-targets-database-credentials.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-usbculprit-espionage-tool-steals-data-from-air-gapped-computers/15589/</loc>
		<lastmod>2020-06-06T17:44:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/new-usbculprit-espionage-tool-steals-data-from-air-gapped-computers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/newly-patched-sap-ase-flaws-could-let-attackers-hack-database-servers/15575/</loc>
		<lastmod>2020-06-07T04:34:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/newly-patched-sap-ase-flaws-could-let-attackers-hack-database-servers.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/newly-patched-sap-ase-flaws-could-let-attackers-hack-database-servers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/personality/6/</loc>
		<lastmod>2020-06-07T04:59:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/DSC_0068-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/making-the-advanced-protection-program-and-titan-security-keys-easier-to-use-on-apple-ios-devices/15607/</loc>
		<lastmod>2020-06-07T06:26:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-advanced-protection-program-plus-titan-security-keys-more-reliable-in-its-results-on-apple-ios-products.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-advanced-protection-program-plus-titan-security-keys-more-reliable-in-its-results-on-apple-ios-products.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-advanced-protection-program-plus-titan-security-keys-more-reliable-in-its-results-on-apple-ios-products-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-advanced-protection-program-plus-titan-security-keys-more-reliable-in-its-results-on-apple-ios-products-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-advanced-protection-program-plus-titan-security-keys-more-reliable-in-its-results-on-apple-ios-products-3.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/apple-publishes-free-resources-to-improve-password-security/15613/</loc>
		<lastmod>2020-06-07T06:56:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/apple-company-publishes-free-resources-to-enhance-password-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/easyjet-hacking-attack-are-you-affected-and-what-should-you-do/15610/</loc>
		<lastmod>2020-06-07T07:15:39+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/EasyJet_Boeing_737-700_G-EZJZ_at_Bristol_airport_in_2005-e1591513752639.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/any-indian-digilocker-account-couldve-been-accessed-without-password/15807/</loc>
		<lastmod>2020-06-08T16:07:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/any-kind-of-indian-digilocker-account-couldve-been-accessed-without-security-password.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/any-kind-of-indian-digilocker-account-couldve-been-accessed-without-security-password.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/easyjet-reveals-cyber-attack-exposed-9m-customers-details/15802/</loc>
		<lastmod>2020-06-08T16:08:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/easyjet-reveals-cyber-attack-exposed-9m-customers-details.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/qnap-nas-devices-targeted-in-another-wave-of-ransomware-attacks/15804/</loc>
		<lastmod>2020-06-08T16:09:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/qnap-nas-devices-targeted-within-wave-of-ransomware-assaults.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-advanced-protection-program-comes-to-google-nest/15799/</loc>
		<lastmod>2020-06-08T16:10:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-particular-advanced-protection-program-involves-google-nest.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-particular-advanced-protection-program-involves-google-nest.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-particular-advanced-protection-program-involves-google-nest-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-particular-advanced-protection-program-involves-google-nest-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/security-drift-the-silent-killer/15826/</loc>
		<lastmod>2020-06-09T17:00:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/protection-drift-the-quiet-killer.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/protection-drift-the-quiet-killer.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/magecart-targets-emergency-services-related-sites-via-insecure-s3-buckets/15829/</loc>
		<lastmod>2020-06-09T17:02:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/magecart-targets-emergency-services-related-websites-via-insecure-s3-and-therefore.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/magecart-targets-emergency-services-related-websites-via-insecure-s3-and-therefore.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/callstranger-vulnerability-lets-attacks-bypass-security-systems-and-scan-lans/15824/</loc>
		<lastmod>2020-06-09T17:03:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/callstranger-vulnerability-lets-attacks-avoid-security-systems-and-scan-lans.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/early-access-to-superannuation-paused-as-police-freeze-120000-in-allegedly-stolen-funds/15822/</loc>
		<lastmod>2020-06-09T17:04:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/earlier-access-to-superannuation-paused-because-police-freeze-120-500-in-allegedly-stolen-money.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/expanding-our-work-with-the-open-source-security-community/15819/</loc>
		<lastmod>2020-06-09T17:06:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/growing-our-work-with-the-free-security-community.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/growing-our-work-with-the-free-security-community-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/arm-cpus-impacted-by-rare-side-channel-attack/15851/</loc>
		<lastmod>2020-06-10T15:22:45+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/equip-cpus-impacted-by-rare-side-channel-attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-guardian-view-on-an-nhs-coronavirus-app-it-must-do-no-harm-editorial/15849/</loc>
		<lastmod>2020-06-10T15:24:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-particular-guardian-view-on-an-nhs-coronavirus-app-it-must-perform-no-harm-content.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/enhanced-safe-browsing-protection-now-available-in-chrome/15846/</loc>
		<lastmod>2020-06-10T15:25:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/improved-safe-browsing-protection-available-nowadays-in-chrome.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/improved-safe-browsing-protection-available-nowadays-in-chrome-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/msps-and-mssps-can-increase-profit-margins-with-cynet-360-platform/15860/</loc>
		<lastmod>2020-06-10T16:09:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/msps-and-mssps-can-boost-profit-margins-with-cynet-fish-hunter-360-platform.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/msps-and-mssps-can-boost-profit-margins-with-cynet-fish-hunter-360-platform.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/intel-cpus-vulnerable-to-new-sgaxe-and-crosstalk-side-channel-attacks/15857/</loc>
		<lastmod>2020-06-10T16:24:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/intel-cpus-vulnerable-to-new-sgaxe-and-crosstalk-side-channel-assaults.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/intel-cpus-vulnerable-to-new-sgaxe-and-crosstalk-side-channel-assaults.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-4-adderley/15863/</loc>
		<lastmod>2020-06-10T16:25:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/wordpress-5-4-adderley-24.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/wordpress-5-4-adderley.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/wordpress-5-4-adderley.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/wordpress-5-4-adderley-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/wordpress-5-4-adderley-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/introducing-portability-of-google-authenticator-2sv-codes-across-android-devices/15870/</loc>
		<lastmod>2020-06-11T06:52:58+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/presenting-portability-of-google-authenticator-2sv-codes-across-google-android-devices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/presenting-portability-of-google-authenticator-2sv-codes-across-google-android-devices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/presenting-portability-of-google-authenticator-2sv-codes-across-google-android-devices-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/presenting-portability-of-google-authenticator-2sv-codes-across-google-android-devices-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/presenting-portability-of-google-authenticator-2sv-codes-across-google-android-devices-3.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/government-investigates-data-breach-revealing-details-of-774000-migrants/15874/</loc>
		<lastmod>2020-06-11T07:23:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/authorities-investigates-data-breach-exposing-details-of-774-000-migrant-workers-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/senators-ask-juniper-for-the-results-of-its-2015-nsa-backdoor-investigation/15876/</loc>
		<lastmod>2020-06-11T07:54:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/senators-ask-juniper-for-the-outcomes-of-its-2015-nsa-backdoor-investigation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-4-2-security-and-maintenance-release/15878/</loc>
		<lastmod>2020-06-11T16:20:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/wp-5-4-2-protection-and-maintenance-release.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/research-grants-to-support-google-vrp-bug-hunters-during-covid-19/15881/</loc>
		<lastmod>2020-06-12T07:08:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/research-grants-to-support-google-vrp-bug-hunters-during-covid-19.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/research-grants-to-support-google-vrp-bug-hunters-during-covid-19.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/research-grants-to-support-google-vrp-bug-hunters-during-covid-19-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/research-grants-to-support-google-vrp-bug-hunters-during-covid-19-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/email-bungle-at-company-seeking-jobkeeper-payments-exposes-staffs-personal-details/15884/</loc>
		<lastmod>2020-06-12T07:24:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/e-mail-bungle-at-company-looking-for-jobkeeper-payments-exposes-staffs-personal-details.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/twitter-bans-32k-accounts-pushing-chinese-russian-and-turkish-propaganda/15886/</loc>
		<lastmod>2020-06-12T07:31:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/tweets-bans-32k-accounts-pressing-chinese-russian-and-european-propaganda.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-4-2-patches-multiple-xss-vulnerabilities/15894/</loc>
		<lastmod>2020-06-12T16:35:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/wordpress-5-4-2-patches-multiple-xss-vulnerabilities.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-4-rc5/15889/</loc>
		<lastmod>2020-06-12T16:36:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/wp-5-4-rc5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-bug-in-facebook-messenger-for-windows-couldve-helped-malware-gain-persistence/15891/</loc>
		<lastmod>2020-06-12T17:00:23+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-bug-in-facebook-messenger-for-windows-couldve-assisted-malware-gain-persistence.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-bug-in-facebook-messenger-for-windows-couldve-assisted-malware-gain-persistence.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/introducing-our-new-book-building-secure-and-reliable-systems/15898/</loc>
		<lastmod>2020-06-13T06:49:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/introducing-our-new-book-building-secure-and-reliable-systems.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/introducing-our-new-book-building-secure-and-reliable-systems.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/introducing-our-new-book-building-secure-and-reliable-systems-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/introducing-our-new-book-building-secure-and-reliable-systems-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/using-big-tech-to-tackle-coronavirus-risks-swapping-one-lockdown-for-another-adam-smith/15901/</loc>
		<lastmod>2020-06-13T08:04:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/using-big-tech-to-tackle-coronavirus-risks-swapping-one-lockdown-for-another-adam-smith.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/russia-says-germany-has-not-provided-any-evidence-of-bundestag-hack/15903/</loc>
		<lastmod>2020-06-13T08:05:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/russia-says-germany-has-not-provided-any-evidence-of-bundestag-hack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/spies-can-listen-to-your-conversations-by-watching-a-light-bulb-in-the-room/15907/</loc>
		<lastmod>2020-06-13T16:53:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/agents-can-listen-to-your-discussions-by-watching-a-light-light-bulb-in-the-room.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/agents-can-listen-to-your-discussions-by-watching-a-light-light-bulb-in-the-room.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-77-wordpress-5-4-2-released-fake-ransomware-bitcoin-scams/15910/</loc>
		<lastmod>2020-06-13T16:54:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/episode-77-wordpress-5-4-2-released-fake-ransomware-bitcoin-scams.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-4-rc4/15905/</loc>
		<lastmod>2020-06-13T17:09:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/wordpress-5-4-rc4.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/announcing-our-first-gcp-vrp-prize-winner-and-updates-to-2020-program/15914/</loc>
		<lastmod>2020-06-14T07:00:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/launching-our-first-gcp-vrp-prize-winner-and-up-dates-to-2020-program.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/launching-our-first-gcp-vrp-prize-winner-and-up-dates-to-2020-program.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/launching-our-first-gcp-vrp-prize-winner-and-up-dates-to-2020-program-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/launching-our-first-gcp-vrp-prize-winner-and-up-dates-to-2020-program-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/zoom-is-malware-why-experts-worry-about-the-video-conferencing-platform/15917/</loc>
		<lastmod>2020-06-14T07:30:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/zoom-is-malware-why-specialists-worry-about-the-video-conferencing-system.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/lamphone-attack-lets-threat-actors-recover-conversations-from-your-light-bulb/15919/</loc>
		<lastmod>2020-06-14T08:05:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/lamphone-attack-lets-threat-stars-recover-conversations-from-your-bulb.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-google-play-protect-kept-users-safe-in-2019/15921/</loc>
		<lastmod>2020-06-15T07:52:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/exactly-how-google-play-protect-held-users-safe-in-2019.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/exactly-how-google-play-protect-held-users-safe-in-2019.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/exactly-how-google-play-protect-held-users-safe-in-2019-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/exactly-how-google-play-protect-held-users-safe-in-2019-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/exactly-how-google-play-protect-held-users-safe-in-2019-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/exactly-how-google-play-protect-held-users-safe-in-2019-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/exactly-how-google-play-protect-held-users-safe-in-2019.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/exactly-how-google-play-protect-held-users-safe-in-2019-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/exactly-how-google-play-protect-held-users-safe-in-2019-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/stalkerware-detection-rates-are-improving-across-antivirus-products/15926/</loc>
		<lastmod>2020-06-15T07:53:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/stalkerware-detection-rates-are-enhancing-across-antivirus-products.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/why-isnt-the-government-publishing-more-data-about-coronavirus-deaths-jeni-tennison/15924/</loc>
		<lastmod>2020-06-15T08:26:41+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-reason-why-isnt-the-government-publishing-a-lot-more-data-about-coronavirus-fatalities-jeni-tennison.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-mobile-internet-protocol-vulnerabilities-let-hackers-target-4g-5g-users/15933/</loc>
		<lastmod>2020-06-15T16:50:31+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/brand-new-mobile-internet-protocol-weaknesses-let-hackers-target-4g-5g-users.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/brand-new-mobile-internet-protocol-weaknesses-let-hackers-target-4g-5g-users.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/webauthn-passwordless-authentication-now-available-for-atlassian-products/15930/</loc>
		<lastmod>2020-06-15T17:02:27+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/webauthn-passwordless-authentication-now-available-with-regard-to-atlassian-products.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/webauthn-passwordless-authentication-now-available-with-regard-to-atlassian-products.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-google-does-certificate-lifecycle-management/15938/</loc>
		<lastmod>2020-06-16T07:38:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/how-google-does-certificate-lifecycle-management.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/how-google-does-certificate-lifecycle-management.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/how-google-does-certificate-lifecycle-management.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/how-google-does-certificate-lifecycle-management-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/how-google-does-certificate-lifecycle-management-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/morrisons-not-liable-for-massive-staff-data-leak-court-rules/15941/</loc>
		<lastmod>2020-06-16T07:43:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/morrisons-not-liable-for-massive-personnel-data-leak-court-guidelines.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/old-gtp-protocol-vulnerabilities-will-also-impact-future-5g-networks/15943/</loc>
		<lastmod>2020-06-16T08:28:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/aged-gtp-protocol-vulnerabilities-will-even-impact-future-5g-systems.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/oracle-e-business-suite-flaws-let-hackers-hijack-business-operations/15948/</loc>
		<lastmod>2020-06-16T17:08:24+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/oracle-e-business-suite-flaws-allow-hackers-hijack-business-procedures.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/oracle-e-business-suite-flaws-allow-hackers-hijack-business-procedures.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-ripple20-flaws-put-billions-of-internet-connected-devices-at-risk-of-hacking/15945/</loc>
		<lastmod>2020-06-16T17:08:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/brand-new-ripple20-flaws-put-vast-amounts-of-internet-connected-devices-at-risk-of-cracking.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/brand-new-ripple20-flaws-put-vast-amounts-of-internet-connected-devices-at-risk-of-cracking.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fuzzbench-fuzzer-benchmarking-as-a-service/15953/</loc>
		<lastmod>2020-06-17T07:25:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/fuzzbench-fuzzer-benchmarking-as-a-support.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/fuzzbench-fuzzer-benchmarking-as-a-support.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/fuzzbench-fuzzer-benchmarking-as-a-support-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/fuzzbench-fuzzer-benchmarking-as-a-support-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/super-secretive-russian-disinfo-operation-discovered-dating-back-to-2014/15958/</loc>
		<lastmod>2020-06-17T07:46:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/extremely-secretive-russian-disinfo-procedure-discovered-dating-back-to-2014.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/contacts-of-1m-virgin-media-customers-left-on-unsecured-database/15956/</loc>
		<lastmod>2020-06-17T07:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/connections-of-1m-virgin-press-customers-left-on-unprotected-database.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-target-military-and-aerospace-staff-by-posing-as-hrs-offering-jobs/15963/</loc>
		<lastmod>2020-06-17T16:56:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/cyber-terrorist-target-military-and-aeronautical-staff-by-posing-because-hrs-offering-jobs.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/cyber-terrorist-target-military-and-aeronautical-staff-by-posing-because-hrs-offering-jobs.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/solution-providers-can-now-add-incident-response-to-their-services-portfolio-for-free/15960/</loc>
		<lastmod>2020-06-17T17:34:58+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/answer-providers-can-now-add-event-response-to-their-services-profile-for-free.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/answer-providers-can-now-add-event-response-to-their-services-profile-for-free.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/helping-developers-with-permission-requests/15968/</loc>
		<lastmod>2020-06-18T07:06:38+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/assisting-developers-with-permission-demands.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/assisting-developers-with-permission-demands.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/assisting-developers-with-permission-demands.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/assisting-developers-with-permission-demands-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/assisting-developers-with-permission-demands-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/zoom-backtracks-and-plans-to-offer-end-to-end-encryption-to-all-users/15973/</loc>
		<lastmod>2020-06-18T08:07:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/focus-backtracks-and-plans-to-provide-end-to-end-encryption-to-all-customers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/china-cracks-down-on-sexual-innuendo-and-celebrity-gossip-in-new-censorship-rules/15971/</loc>
		<lastmod>2020-06-18T08:13:39+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-far-east-cracks-down-on-sexual-innuendo-and-celebrity-gossip-within-new-censorship-rules.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/invisimole-hackers-target-high-profile-military-and-diplomatic-entities/15975/</loc>
		<lastmod>2020-06-18T17:16:39+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/invisimole-hackers-target-high-profile-army-and-diplomatic-entities.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/invisimole-hackers-target-high-profile-army-and-diplomatic-entities.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/data-encryption-on-android-with-jetpack-security/15979/</loc>
		<lastmod>2020-06-19T07:42:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/data-encryption-on-android-with-jetpack-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/data-encryption-on-android-with-jetpack-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/data-encryption-on-android-with-jetpack-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/data-encryption-on-android-with-jetpack-security.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/data-encryption-on-android-with-jetpack-security-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/data-encryption-on-android-with-jetpack-security-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/our-personal-health-history-is-too-valuable-to-be-harvested-by-the-tech-giants-eerke-boiten/15982/</loc>
		<lastmod>2020-06-19T07:44:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/our-own-personal-health-history-is-simply-too-valuable-to-be-harvested-from-the-tech-giants-eerke-boiten.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mozilla-to-launch-vpn-product-in-the-next-few-weeks/15984/</loc>
		<lastmod>2020-06-19T08:11:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/mozilla-to-launch-vpn-item-in-the-next-few-weeks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-software-glitch-sent-some-users-videos-to-strangers/15990/</loc>
		<lastmod>2020-06-20T07:50:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/search-engines-software-glitch-sent-a-few-users-videos-to-other-people.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/amd-says-it-will-fix-new-cpu-bugs-by-the-end-of-june-2020/15992/</loc>
		<lastmod>2020-06-20T07:59:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/advanced-micro-devices-says-it-will-fix-brand-new-cpu-bugs-by-the-end-associated-with-june-2020.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/improving-malicious-document-detection-in-gmail-with-deep-learning/15987/</loc>
		<lastmod>2020-06-20T08:06:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/enhancing-malicious-document-detection-within-gmail-with-deep-studying.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/enhancing-malicious-document-detection-within-gmail-with-deep-studying.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/enhancing-malicious-document-detection-within-gmail-with-deep-studying-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/enhancing-malicious-document-detection-within-gmail-with-deep-studying.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/enhancing-malicious-document-detection-within-gmail-with-deep-studying-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/enhancing-malicious-document-detection-within-gmail-with-deep-studying-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/enhancing-malicious-document-detection-within-gmail-with-deep-studying-3.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/disruptive-ads-enforcement-and-our-new-approach/15994/</loc>
		<lastmod>2020-06-21T07:45:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/bothersome-ads-enforcement-and-our-own-new-approach.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/bothersome-ads-enforcement-and-our-own-new-approach.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/bothersome-ads-enforcement-and-our-own-new-approach-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/bothersome-ads-enforcement-and-our-own-new-approach-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/adobe-wants-users-to-uninstall-flash-player-by-the-end-of-the-year/15999/</loc>
		<lastmod>2020-06-21T08:19:47+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/flag-wants-users-to-do-away-with-flash-player-by-the-end-from-the-year.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/will-we-just-accept-our-loss-of-privacy-or-has-the-techlash-already-begun-alan-rusbridger/15997/</loc>
		<lastmod>2020-06-21T08:23:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/will-certainly-we-just-accept-our-own-loss-of-privacy-or-has-got-the-techlash-already-begun-alan-rusbridger.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/titan-security-keys-now-available-in-austria-canada-france-germany-italy-japan-spain-switzerland-and-the-uk/16001/</loc>
		<lastmod>2020-06-22T07:55:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/ti-symbol-security-keys-available-nowadays-in-austria-canada-italy-germany-italy-japan-the-country-of-spain-switzerland-and-the-uk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/ti-symbol-security-keys-available-nowadays-in-austria-canada-italy-germany-italy-japan-the-country-of-spain-switzerland-and-the-uk.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/ti-symbol-security-keys-available-nowadays-in-austria-canada-italy-germany-italy-japan-the-country-of-spain-switzerland-and-the-uk.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/ti-symbol-security-keys-available-nowadays-in-austria-canada-italy-germany-italy-japan-the-country-of-spain-switzerland-and-the-uk-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/ti-symbol-security-keys-available-nowadays-in-austria-canada-italy-germany-italy-japan-the-country-of-spain-switzerland-and-the-uk-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/jeff-bezos-met-fbi-investigators-in-2019-over-alleged-saudi-hack/16005/</loc>
		<lastmod>2020-06-22T08:22:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/shaun-bezos-met-fbi-researchers-in-2019-over-supposed-saudi-hack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/academics-studied-ddos-takedowns-and-said-theyre-ineffective-recommend-patching-vulnerable-servers/16007/</loc>
		<lastmod>2020-06-22T08:42:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/teachers-studied-ddos-takedowns-plus-said-theyre-ineffective-suggest-patching-vulnerable-servers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/over-100-new-chrome-browser-extensions-caught-spying-on-users/16012/</loc>
		<lastmod>2020-06-22T17:51:40+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/more-than-100-new-chrome-internet-browser-extensions-caught-spying-upon-users.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/more-than-100-new-chrome-internet-browser-extensions-caught-spying-upon-users.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-leaked-269-gb-of-u-s-police-and-fusion-centers-data-online/16009/</loc>
		<lastmod>2020-06-22T18:13:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/cyber-terrorist-leaked-269-gb-associated-with-u-s-police-plus-fusion-centers-data-on-the-internet.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/cyber-terrorist-leaked-269-gb-associated-with-u-s-police-plus-fusion-centers-data-on-the-internet.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/boris-johnson-gets-final-warning-with-huawei-5g-verdict-imminent/16020/</loc>
		<lastmod>2020-06-23T08:16:23+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/boris-johnson-gets-final-caution-with-huawei-5g-judgement-imminent-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-we-fought-bad-apps-and-malicious-developers-in-2019/16017/</loc>
		<lastmod>2020-06-23T08:20:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-way-we-fought-bad-apps-plus-malicious-developers-in-2019.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-way-we-fought-bad-apps-plus-malicious-developers-in-2019.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-way-we-fought-bad-apps-plus-malicious-developers-in-2019.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-way-we-fought-bad-apps-plus-malicious-developers-in-2019.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-way-we-fought-bad-apps-plus-malicious-developers-in-2019-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-way-we-fought-bad-apps-plus-malicious-developers-in-2019-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsofts-safe-documents-feature-reaches-general-availability-in-office-365/16022/</loc>
		<lastmod>2020-06-23T08:58:42+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/microsofts-safe-documents-feature-gets-to-general-availability-in-workplace-365.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/virustotal-adds-cynets-artificial-intelligence-based-malware-detection/16027/</loc>
		<lastmod>2020-06-23T17:35:52+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/virustotal-adds-cynets-artificial-intelligence-based-malware-detection.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/virustotal-adds-cynets-artificial-intelligence-based-malware-detection.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-78-targeted-phishing-bypassing-security-checks-and-a-new-ddos-record/16030/</loc>
		<lastmod>2020-06-23T18:13:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/episode-78-targeted-phishing-bypassing-security-checks-and-a-new-ddos-record.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-privacy-features-added-to-the-upcoming-apple-ios-14-and-macos-big-sur/16024/</loc>
		<lastmod>2020-06-23T18:14:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/brand-new-privacy-features-added-to-the-particular-upcoming-apple-ios-fourteen-and-macos-big-en-deambulant.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/brand-new-privacy-features-added-to-the-particular-upcoming-apple-ios-fourteen-and-macos-big-en-deambulant.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/protecting-users-from-insecure-downloads-in-google-chrome/16037/</loc>
		<lastmod>2020-06-24T08:14:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/safeguarding-users-from-insecure-downloading-in-google-chrome.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/safeguarding-users-from-insecure-downloading-in-google-chrome.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/safeguarding-users-from-insecure-downloading-in-google-chrome-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/safeguarding-users-from-insecure-downloading-in-google-chrome.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/safeguarding-users-from-insecure-downloading-in-google-chrome-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/safeguarding-users-from-insecure-downloading-in-google-chrome-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/israeli-spyware-firm-fails-to-get-hacking-case-dismissed/16040/</loc>
		<lastmod>2020-06-24T08:52:38+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/judio-spyware-firm-fails-to-obtain-hacking-case-dismissed.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/twitter-bans-ddosecrets-account-over-blueleaks-police-data-dump/16042/</loc>
		<lastmod>2020-06-24T09:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/tweets-bans-ddosecrets-account-more-than-blueleaks-police-data-eliminate.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/say-hello-to-opensk-a-fully-open-source-security-key-implementation/16045/</loc>
		<lastmod>2020-06-25T08:17:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/state-hello-to-opensk-a-completely-open-source-security-key-execution.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/state-hello-to-opensk-a-completely-open-source-security-key-execution.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/state-hello-to-opensk-a-completely-open-source-security-key-execution.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/state-hello-to-opensk-a-completely-open-source-security-key-execution-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/state-hello-to-opensk-a-completely-open-source-security-key-execution-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/im-still-on-windows-7-what-should-i-do/16048/</loc>
		<lastmod>2020-06-25T08:48:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/i-am-still-on-windows-seven-what-should-i-perform.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wikileaks-founder-charged-with-conspiring-with-anonymous-and-lulzsec-hackers/16050/</loc>
		<lastmod>2020-06-25T08:51:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/wikileaks-founder-charged-with-a-conspiracy-with-anonymous-and-lulzsec-hackers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-4-1/16056/</loc>
		<lastmod>2020-06-25T18:09:45+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/wp-5-4-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/vulnerability-reward-program-2019-year-in-review/16058/</loc>
		<lastmod>2020-06-26T08:31:42+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/weeknesses-reward-program-2019-12-months-in-review.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/weeknesses-reward-program-2019-12-months-in-review.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/weeknesses-reward-program-2019-12-months-in-review-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/weeknesses-reward-program-2019-12-months-in-review.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/weeknesses-reward-program-2019-12-months-in-review-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/weeknesses-reward-program-2019-12-months-in-review-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ddos-botnet-coder-gets-13-months-in-prison/16064/</loc>
		<lastmod>2020-06-26T08:41:32+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/ddos-botnet-coder-gets-thirteen-months-in-prison.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-rolls-out-windows-10-security-fix-after-nsa-warning/16062/</loc>
		<lastmod>2020-06-26T09:02:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/ms-rolls-out-windows-10-protection-fix-after-nsa-caution.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/have-an-iphone-use-it-to-protect-your-google-account-with-the-advanced-protection-program/16067/</loc>
		<lastmod>2020-06-27T08:41:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/come-with-an-iphone-use-it-to-protect-your-own-google-account-with-the-sophisticated-protection-program.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/come-with-an-iphone-use-it-to-protect-your-own-google-account-with-the-sophisticated-protection-program.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/come-with-an-iphone-use-it-to-protect-your-own-google-account-with-the-sophisticated-protection-program.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/come-with-an-iphone-use-it-to-protect-your-own-google-account-with-the-sophisticated-protection-program-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/come-with-an-iphone-use-it-to-protect-your-own-google-account-with-the-sophisticated-protection-program-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/come-with-an-iphone-use-it-to-protect-your-own-google-account-with-the-sophisticated-protection-program-3.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/docker-servers-infected-with-ddos-malware-in-extremely-rare-attacks/16070/</loc>
		<lastmod>2020-06-27T09:20:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/docker-servers-infected-with-ddos-malware-in-extremely-uncommon-attacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/securing-open-source-how-google-supports-the-new-kubernetes-bug-bounty/16072/</loc>
		<lastmod>2020-06-28T08:40:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/acquiring-open-source-how-google-facilitates-the-new-kubernetes-bug-resources.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/acquiring-open-source-how-google-facilitates-the-new-kubernetes-bug-resources.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/acquiring-open-source-how-google-facilitates-the-new-kubernetes-bug-resources.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/acquiring-open-source-how-google-facilitates-the-new-kubernetes-bug-resources-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/acquiring-open-source-how-google-facilitates-the-new-kubernetes-bug-resources-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/adobe-mastercard-visa-warn-online-store-owners-of-magento-1-x-eol/16075/</loc>
		<lastmod>2020-06-28T09:26:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/flag-mastercard-visa-warn-online-shop-owners-of-magento-one-x-eol.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/pha-family-highlights-bread-and-friends/16078/</loc>
		<lastmod>2020-06-29T08:47:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-12.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/pha-family-highlights-bread-and-friends-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/apple-strong-arms-entire-ca-industry-into-one-year-certificate-lifespans/16081/</loc>
		<lastmod>2020-06-29T09:29:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/apple-company-strong-arms-entire-ca-business-into-one-year-certificate-lifespans.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-april-2020/16085/</loc>
		<lastmod>2020-06-29T18:54:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/the-month-in-wordpress-april-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/11-weeks-of-android-privacy-and-security/16087/</loc>
		<lastmod>2020-06-30T08:14:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/11-weeks-of-android-privacy-and-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/11-weeks-of-android-privacy-and-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/11-weeks-of-android-privacy-and-security.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/11-weeks-of-android-privacy-and-security-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/11-weeks-of-android-privacy-and-security-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/us-cyber-command-says-foreign-hackers-will-most-likely-exploit-new-pan-os-security-bug/16090/</loc>
		<lastmod>2020-06-30T09:20:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/06/all-of-us-cyber-command-says-international-hackers-will-most-likely-exploit-brand-new-pan-os-security-bug.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/system-hardening-in-android-11/16093/</loc>
		<lastmod>2020-07-01T09:05:30+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/system-hardening-in-android-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/system-hardening-in-android-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/system-hardening-in-android-11.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/system-hardening-in-android-11-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/system-hardening-in-android-11-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ceo-of-exam-monitoring-software-proctorio-apologises-for-posting-students-chat-logs-on-reddit/16096/</loc>
		<lastmod>2020-07-01T09:18:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/top-dog-of-exam-monitoring-software-program-proctorio-apologises-for-publishing-students-chat-logs-upon-reddit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-releases-emergency-security-update-to-fix-two-bugs-in-windows-codecs/16098/</loc>
		<lastmod>2020-07-01T09:18:58+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/ms-releases-emergency-security-up-date-to-fix-two-bugs-within-windows-codecs.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/facebook-says-5000-app-developers-got-user-data-after-cutoff-date/16103/</loc>
		<lastmod>2020-07-02T09:37:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/fb-says-5-000-application-developers-got-user-information-after-cutoff-date.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/roblox-accounts-hacked-with-pro-trump-messages/16109/</loc>
		<lastmod>2020-07-03T09:16:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/roblox-accounts-hacked-with-pro-trump-messages.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/f5-patches-vulnerability-that-received-a-cvss-10-severity-score/16112/</loc>
		<lastmod>2020-07-04T09:08:32+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/f5-patches-vulnerability-that-obtained-a-cvss-10-intensity-score.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-are-trying-to-steal-admin-passwords-from-f5-big-ip-devices/16115/</loc>
		<lastmod>2020-07-05T10:16:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/cyber-terrorist-are-trying-to-steal-admin-security-passwords-from-f5-big-ip-products.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/north-korean-hackers-linked-to-web-skimming-magecart-attacks-report-says/16118/</loc>
		<lastmod>2020-07-06T09:36:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/northern-korean-hackers-linked-to-internet-skimming-magecart-attacks-statement-says.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/us-secret-service-reports-an-increase-in-hacked-managed-service-providers-msps/16121/</loc>
		<lastmod>2020-07-07T10:08:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/all-of-us-secret-service-reports-a-rise-in-hacked-managed-service-providers-msps.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mozilla-suspends-firefox-send-service-while-it-addresses-malware-abuse/16124/</loc>
		<lastmod>2020-07-08T10:23:23+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/mozilla-suspends-firefox-send-service-while-it-addresses-malware-abuse.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-abandons-isolated-region-cloud-services-project-in-china/16130/</loc>
		<lastmod>2020-07-09T10:30:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/google-abandons-isolated-region-cloud-services-project-in-china.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/people-of-wordpress-mario-peshev/16134/</loc>
		<lastmod>2020-07-09T19:04:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/people-of-wordpress-mario-peshev-11.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/people-of-wordpress-mario-peshev.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/people-of-wordpress-mario-peshev-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/people-of-wordpress-mario-peshev.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/kingcomposer-patches-xss-flaw-impacting-100000-wordpress-websites/16137/</loc>
		<lastmod>2020-07-10T10:50:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/kingcomposer-patches-xss-flaw-affecting-100-000-wordpress-web-sites.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-march-2020/16140/</loc>
		<lastmod>2020-07-10T19:06:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/the-month-in-wordpress-march-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/russian-hacker-found-guilty-for-dropbox-linkedin-and-formspring-breaches/16142/</loc>
		<lastmod>2020-07-11T09:59:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/ruskies-hacker-found-guilty-with-regard-to-dropbox-linkedin-and-formspring-breaches.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-create-magstripe-versions-from-emv-and-contactless-cards/16145/</loc>
		<lastmod>2020-07-12T10:41:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/experts-create-magstripe-versions-through-emv-and-contactless-credit-cards.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hacker-breaches-security-firm-in-act-of-revenge/16148/</loc>
		<lastmod>2020-07-13T10:37:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/hacker-breaches-security-firm-within-act-of-revenge.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/effs-new-database-reveals-what-tech-local-police-are-using-to-spy-on-you/16150/</loc>
		<lastmod>2020-07-14T10:19:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/effs-new-database-reveals-exactly-what-tech-local-police-are-utilizing-to-spy-on-you.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/chrome-84-released-with-support-for-blocking-notification-popups-on-spammy-sites/16157/</loc>
		<lastmod>2020-07-15T10:42:41+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/chromium-84-released-with-assistance-for-blocking-notification-popups-on-spammy-sites.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-rce-flaw-affects-f5-big-ip-application-security-servers/16163/</loc>
		<lastmod>2020-07-15T19:57:47+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/crucial-rce-flaw-affects-f5-big-ip-application-security-machines.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/crucial-rce-flaw-affects-f5-big-ip-application-security-machines.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-elementor-attacks-how-creative-hackers-combined-vulnerabilities-to-take-over-wordpress-sites/16166/</loc>
		<lastmod>2020-07-15T20:04:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/the-particular-elementor-attacks-how-innovative-hackers-combined-vulnerabilities-to-consider-over-wordpress-sites-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/the-particular-elementor-attacks-how-innovative-hackers-combined-vulnerabilities-to-consider-over-wordpress-sites.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/the-particular-elementor-attacks-how-innovative-hackers-combined-vulnerabilities-to-consider-over-wordpress-sites-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/comptia-certification-prep-courses-get-lifetime-access-98-discount/16160/</loc>
		<lastmod>2020-07-15T20:09:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/comptia-certification-prep-courses-get-lifetime-access-snabel-a-98-discount.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/comptia-certification-prep-courses-get-lifetime-access-snabel-a-98-discount.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-blackrock-android-malware-can-steal-passwords-and-card-data-from-337-apps/16168/</loc>
		<lastmod>2020-07-16T11:17:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/brand-new-blackrock-android-malware-may-steal-passwords-and-cards-data-from-337-applications.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/why-can-application-security-be-considered-an-enabler-for-business/16175/</loc>
		<lastmod>2020-07-16T20:43:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/the-reason-why-can-application-security-be-looked-at-an-enabler-for-business.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/the-reason-why-can-application-security-be-looked-at-an-enabler-for-business.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/spanish-deputy-pm-urges-investigation-into-catalan-spyware-claims/16179/</loc>
		<lastmod>2020-07-17T10:57:42+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/the-spanish-language-deputy-pm-urges-analysis-into-catalan-spyware-statements-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-says-a-bug-is-erroneously-showing-security-alerts-for-tivo-devices/16181/</loc>
		<lastmod>2020-07-17T11:24:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/search-engines-says-a-bug-will-be-erroneously-showing-security-notifications-for-tivo-devices.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/why-application-security-should-be-considered-an-enabler-for-business/16184/</loc>
		<lastmod>2020-07-17T20:01:32+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/the-reason-why-application-security-should-be-considered-a-good-enabler-for-business.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/the-reason-why-application-security-should-be-considered-a-good-enabler-for-business.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/emotet-botnet-returns-after-a-five-month-absence/16189/</loc>
		<lastmod>2020-07-18T10:39:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/emotet-botnet-returns-after-a-five-month-absence.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/us-judge-whatsapp-lawsuit-against-israeli-spyware-firm-nso-can-proceed/16187/</loc>
		<lastmod>2020-07-18T10:40:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/all-of-us-judge-whatsapp-lawsuit-towards-israeli-spyware-firm-nso-can-proceed.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/twitter-says-hackers-downloaded-the-data-of-eight-users-in-wednesdays-hack/16192/</loc>
		<lastmod>2020-07-19T11:36:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/tweets-says-hackers-downloaded-the-information-of-eight-users-within-wednesdays-hack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/uber-drivers-demand-to-see-algorithms-data-that-determines-their-working-lives/16195/</loc>
		<lastmod>2020-07-20T11:10:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/above-all-drivers-demand-to-see-methods-data-that-determines-their-own-working-lives.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/twitter-hack-coinbase-blocks-280000-in-bitcoin-theft/16198/</loc>
		<lastmod>2020-07-21T11:49:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/tweets-hack-coinbase-blocks-280-000-in-bitcoin-robbery.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-5-beta-3/16202/</loc>
		<lastmod>2020-07-21T20:35:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/wp-5-5-beta-a-few.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/adobe-issues-emergency-fixes-for-critical-vulnerabilities-in-photoshop-bridge-prelude/16204/</loc>
		<lastmod>2020-07-22T11:36:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/flag-issues-emergency-fixes-with-regard-to-critical-vulnerabilities-in-photoshop-bridge-prelude.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/towards-native-security-defenses-for-the-web-ecosystem/16208/</loc>
		<lastmod>2020-07-23T10:46:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/towards-native-security-defenses-for-the-web-ecosystem.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/towards-native-security-defenses-for-the-web-ecosystem.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/towards-native-security-defenses-for-the-web-ecosystem-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/towards-native-security-defenses-for-the-web-ecosystem-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/towards-native-security-defenses-for-the-web-ecosystem-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/towards-native-security-defenses-for-the-web-ecosystem-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/towards-native-security-defenses-for-the-web-ecosystem-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/towards-native-security-defenses-for-the-web-ecosystem-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/towards-native-security-defenses-for-the-web-ecosystem.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/towards-native-security-defenses-for-the-web-ecosystem-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/towards-native-security-defenses-for-the-web-ecosystem-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-shadow-attack-can-replace-content-in-digitally-signed-pdf-files/16211/</loc>
		<lastmod>2020-07-23T12:13:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/brand-new-shadow-attack-can-change-content-in-digitally-authorized-pdf-files.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/garmin-services-and-production-go-down-after-ransomware-attack/16217/</loc>
		<lastmod>2020-07-24T11:21:38+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/garmin-services-and-production-go-down-after-ransomware-attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/smartwatch-maker-garmin-hit-by-outages-after-ransomware-attack/16215/</loc>
		<lastmod>2020-07-24T12:03:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/smartwatch-maker-garmin-hit-by-outages-after-ransomware-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/academics-smuggle-234-policy-violating-skills-on-the-alexa-skills-store/16221/</loc>
		<lastmod>2020-07-25T11:51:23+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/teachers-smuggle-234-policy-violating-abilities-on-the-alexa-skills-shop.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/tech-unicorn-dave-admits-to-security-breach-impacting-7-5-million-users/16223/</loc>
		<lastmod>2020-07-26T12:28:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/technology-unicorn-dave-admits-in-order-to-security-breach-impacting-seven-5-million-users.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fbi-warns-of-new-ddos-attack-vectors-coap-ws-dd-arms-and-jenkins/16226/</loc>
		<lastmod>2020-07-27T12:24:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/f-warns-of-new-ddos-assault-vectors-coap-ws-dd-hands-and-jenkins.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ransomware-attack-on-garmin-thought-to-be-the-work-of-evil-corp/16229/</loc>
		<lastmod>2020-07-28T12:05:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/ransomware-attack-on-garmin-considered-to-be-the-work-of-evil-corp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cisa-says-62000-qnap-nas-devices-have-been-infected-with-the-qsnatch-malware/16231/</loc>
		<lastmod>2020-07-28T12:38:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/cisa-says-62-000-qnap-nas-devices-have-been-contaminated-with-the-qsnatch-malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-5-release-candidate/16236/</loc>
		<lastmod>2020-07-28T21:01:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/wp-5-5-release-applicant.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/okcupid-hackers-want-your-data-not-a-relationship/16238/</loc>
		<lastmod>2020-07-29T12:37:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/okcupid-hackers-want-your-data-not-really-a-relationship.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-may-2020/16245/</loc>
		<lastmod>2020-07-29T21:25:35+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/the-month-in-wordpress-may-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-grub2-bootloader-bug-affects-billions-of-linux-and-windows-systems/16247/</loc>
		<lastmod>2020-07-29T21:56:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/crucial-grub2-bootloader-bug-impacts-billions-of-linux-and-home-windows-systems.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/crucial-grub2-bootloader-bug-impacts-billions-of-linux-and-home-windows-systems.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/us-prosecutors-seek-years-in-prison-for-uber-self-driving-exec-who-stole-google-trade-secrets/16250/</loc>
		<lastmod>2020-07-30T12:42:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/all-of-us-prosecutors-seek-years-within-prison-for-uber-self-driving-exec-who-stole-search-engines-trade-secrets.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/china-arrests-over-100-people-suspected-of-involvement-in-plustoken-cryptocurrency-scam/16255/</loc>
		<lastmod>2020-07-31T12:22:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/07/the-far-east-arrests-over-100-individuals-suspected-of-involvement-within-plustoken-cryptocurrency-scam.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/17-year-old-mastermind-2-others-behind-the-biggest-twitter-hack-arrested/16260/</loc>
		<lastmod>2020-07-31T21:33:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/17-year-old-mastermind-2-others-at-the-rear-of-the-biggest-twitter-hack-caught.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/17-year-old-mastermind-2-others-at-the-rear-of-the-biggest-twitter-hack-caught.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/author-of-fastpos-malware-revealed-pleads-guilty/16263/</loc>
		<lastmod>2020-08-01T12:24:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/writer-of-fastpos-malware-exposed-pleads-guilty.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/equity-and-the-power-of-community/16266/</loc>
		<lastmod>2020-08-01T21:09:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/collateral-and-the-power-of-community.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/phishing-campaigns-from-first-to-last-victim-take-21h-on-average/16268/</loc>
		<lastmod>2020-08-02T13:15:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/scam-campaigns-from-first-in-order-to-last-victim-take-21h-on-average.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/2gether-hacked-e1-2m-in-cryptocurrency-stolen-native-tokens-offered-in-exchange/16271/</loc>
		<lastmod>2020-08-03T13:17:39+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/2gether-hacked-e1-2m-within-cryptocurrency-stolen-native-bridal-party-offered-in-exchange.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ransomware-gang-publishes-tens-of-gbs-of-internal-data-from-lg-and-xerox/16275/</loc>
		<lastmod>2020-08-04T13:17:23+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/ransomware-gang-publishes-tens-of-gbs-of-internal-data-through-lg-and-xerox.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-5-release-candidate-2/16279/</loc>
		<lastmod>2020-08-04T21:24:38+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/wp-5-5-release-applicant-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-official-facebook-chat-plugin-created-vector-for-social-engineering-attacks/16281/</loc>
		<lastmod>2020-08-04T22:09:31+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/the-official-facebook-chat-plugin-created-vector-for-social-engineering-attacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fbi-issues-warning-over-windows-7-end-of-life/16283/</loc>
		<lastmod>2020-08-05T12:45:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/f-issues-warning-over-home-windows-7-end-of-life.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researcher-demonstrates-4-new-variants-of-http-request-smuggling-attack/16289/</loc>
		<lastmod>2020-08-05T22:21:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/specialist-demonstrates-4-new-variations-of-http-request-smuggling-attack.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/specialist-demonstrates-4-new-variations-of-http-request-smuggling-attack.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/firefox-gets-fix-for-evil-cursor-attack/16292/</loc>
		<lastmod>2020-08-06T13:15:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/opera-gets-fix-for-bad-cursor-attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-auto-updates-what-do-you-have-to-lose/16295/</loc>
		<lastmod>2020-08-06T22:34:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/wordpress-auto-updates-what-do-you-have-to-lose-21.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/wordpress-auto-updates-what-do-you-have-to-lose.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/wordpress-auto-updates-what-do-you-have-to-lose-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/wordpress-auto-updates-what-do-you-have-to-lose-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/wordpress-auto-updates-what-do-you-have-to-lose-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/wordpress-auto-updates-what-do-you-have-to-lose-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/wordpress-auto-updates-what-do-you-have-to-lose-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/canon-suffers-ransomware-attack-maze-claims-responsibility/16298/</loc>
		<lastmod>2020-08-07T13:07:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/cannon-suffers-ransomware-attack-web-claims-responsibility.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/def-con-new-tool-brings-back-domain-fronting-as-domain-hiding/16310/</loc>
		<lastmod>2020-08-08T13:47:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/outl-con-new-tool-regains-domain-fronting-as-domain-hiding.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/china-is-now-blocking-all-encrypted-https-traffic-that-uses-tls-1-3-and-esni/16314/</loc>
		<lastmod>2020-08-09T13:30:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/customer-now-blocking-all-protected-https-traffic-that-utilizes-tls-1-3-plus-esni.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/bank-of-england-paid-3m-in-golden-goodbyes-over-15-months/16312/</loc>
		<lastmod>2020-08-09T14:08:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/financial-institution-of-england-paid-3m-in-golden-goodbyes-more-than-15-months.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/have-i-been-pwned-to-release-code-base-to-the-open-source-community/16317/</loc>
		<lastmod>2020-08-10T13:35:45+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/possess-i-been-pwned-to-produce-code-base-to-the-free-community.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/pixel-4a-is-the-first-device-to-go-through-ioxt-at-launch/16322/</loc>
		<lastmod>2020-08-11T12:49:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/pixel-4a-is-the-first-gadget-to-go-through-ioxt-at-release.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/pixel-4a-is-the-first-gadget-to-go-through-ioxt-at-release.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/pixel-4a-is-the-first-gadget-to-go-through-ioxt-at-release-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/pixel-4a-is-the-first-gadget-to-go-through-ioxt-at-release.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/pixel-4a-is-the-first-gadget-to-go-through-ioxt-at-release-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/pixel-4a-is-the-first-gadget-to-go-through-ioxt-at-release-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/security-researcher-publishes-details-and-exploit-code-for-a-vbulletin-zero-day/16325/</loc>
		<lastmod>2020-08-11T13:32:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/protection-researcher-publishes-details-plus-exploit-code-for-a-vbulletin-zero-day.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-5-eckstine/16329/</loc>
		<lastmod>2020-08-11T21:51:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/wordpress-5-5-eckstine-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/wordpress-5-5-eckstine.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-flaws-affect-citrix-endpoint-management-xenmobile-servers/16331/</loc>
		<lastmod>2020-08-11T22:21:47+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/crucial-flaws-affect-citrix-endpoint-management-xenmobile-servers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/crucial-flaws-affect-citrix-endpoint-management-xenmobile-servers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/adobe-tackles-critical-code-execution-vulnerabilities-in-acrobat-reader/16334/</loc>
		<lastmod>2020-08-12T14:08:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/flag-tackles-critical-code-performance-vulnerabilities-in-acrobat-readers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/signal-adds-message-requests-to-stop-spam-and-protect-user-privacy/16341/</loc>
		<lastmod>2020-08-13T13:58:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/transmission-adds-message-requests-to-prevent-spam-and-protect-consumer-privacy.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-vulnerabilities-patched-in-quiz-and-survey-master-plugin/16345/</loc>
		<lastmod>2020-08-13T22:53:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/crucial-vulnerabilities-patched-in-test-and-survey-master-wordpress-plugin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mac-malware-spreads-through-xcode-projects-abuses-webkit-data-vault-vulnerabilities/16348/</loc>
		<lastmod>2020-08-14T14:30:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/mac-pc-malware-spreads-through-xcode-projects-abuses-webkit-information-vault-vulnerabilities.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/for-six-months-security-researchers-have-secretly-distributed-an-emotet-vaccine-across-the-world/16352/</loc>
		<lastmod>2020-08-15T14:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/for-six-months-security-researchers-have-secretly-distributed-an-emotet-vaccine-across-the-world.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cactuspete-hackers-go-on-european-rampage-with-bisonal-backdoor-upgrade/16354/</loc>
		<lastmod>2020-08-16T14:19:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/cactuspete-hackers-go-on-european-rampage-with-bisonal-backdoor-upgrade.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ritz-london-suspects-data-breach-fraudsters-pose-as-staff-in-credit-card-data-scam/16357/</loc>
		<lastmod>2020-08-17T14:36:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/ritz-london-suspects-data-infringement-fraudsters-pose-as-personnel-in-credit-card-data-rip-off.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ukraine-arrests-gang-who-ran-20-crypto-exchanges-and-laundered-money-for-ransomware-gangs/16361/</loc>
		<lastmod>2020-08-18T14:46:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/ukraine-arrests-gang-who-went-20-crypto-exchanges-and-washed-money-for-ransomware-bande.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wannaren-ransomware-author-contacts-security-firm-to-share-decryption-key/16364/</loc>
		<lastmod>2020-08-19T14:10:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/wannaren-ransomware-author-contacts-protection-firm-to-share-decryption-important.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/transparent-tribe-apt-targets-government-military-by-infecting-usb-devices/16369/</loc>
		<lastmod>2020-08-20T14:46:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/clear-tribe-apt-targets-authorities-military-by-infecting-universal-serial-bus-devices.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/former-uber-security-chief-charged-over-covering-up-2016-data-breach/16374/</loc>
		<lastmod>2020-08-20T23:20:44+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/previous-uber-security-chief-billed-over-covering-up-2016-data-breach.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/previous-uber-security-chief-billed-over-covering-up-2016-data-breach.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-target-defense-contractors-employees-by-posing-as-recruiters/16377/</loc>
		<lastmod>2020-08-20T23:42:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/cyber-terrorist-target-defense-contractors-workers-by-posing-as-employers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/cyber-terrorist-target-defense-contractors-workers-by-posing-as-employers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/university-of-utah-pays-457000-to-ransomware-gang/16383/</loc>
		<lastmod>2020-08-21T14:37:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/college-of-utah-pays-457-000-to-ransomware-bunch.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mps-criticise-privacy-watchdog-over-nhs-test-and-trace-data/16381/</loc>
		<lastmod>2020-08-21T15:07:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/mps-criticise-privacy-watchdog-more-than-nhs-test-and-trace-data.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/free-photos-graphics-site-freepik-discloses-data-breach-impacting-8-3m-users/16389/</loc>
		<lastmod>2020-08-22T14:18:40+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/totally-free-photos-graphics-site-freepik-discloses-data-breach-affecting-8-3m-users.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/your-data-is-not-destined-for-china-assures-tiktoks-uk-boss/16392/</loc>
		<lastmod>2020-08-23T14:44:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/your-data-is-not-destined-for-china-assures-tiktoks-uk-boss.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fbi-and-cisa-warn-of-major-wave-of-vishing-attacks-targeting-teleworkers/16394/</loc>
		<lastmod>2020-08-23T15:10:47+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/fbi-and-cisa-warn-of-major-wave-of-vishing-attacks-targeting-teleworkers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/group-of-unskilled-iranian-hackers-behind-recent-attacks-with-dharma-ransomware/16397/</loc>
		<lastmod>2020-08-24T14:52:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/group-of-unskilled-iranian-hackers-behind-recent-attacks-with-dharma-ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/amazon-alexa-bugs-couldve-let-hackers-install-malicious-skills-remotely/16399/</loc>
		<lastmod>2020-08-24T23:51:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/amazon-alexa-bugs-couldve-let-hackers-install-malicious-skills-remotely.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/amazon-alexa-bugs-couldve-let-hackers-install-malicious-skills-remotely.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/browser-based-cryptojacking-sees-sudden-spike-in-activity-in-q2-2020/16402/</loc>
		<lastmod>2020-08-25T14:38:48+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/browser-based-cryptojacking-sees-sudden-surge-in-activity-in-q2-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mercenary-hacker-group-targets-companies-with-3ds-max-malware/16407/</loc>
		<lastmod>2020-08-26T15:27:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/mercenary-hacker-group-targets-businesses-with-3ds-max-adware-and-spyware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/russian-arrested-after-offering-1-million-to-u-s-company-employee-for-planting-malware/16410/</loc>
		<lastmod>2020-08-26T23:54:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/ruskies-arrested-after-offering-1000000-to-u-s-organization-employee-for-planting-adware-and-spyware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/ruskies-arrested-after-offering-1000000-to-u-s-organization-employee-for-planting-adware-and-spyware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/popular-ios-sdk-accused-of-spying-on-billions-of-users-and-committing-ad-fraud/16413/</loc>
		<lastmod>2020-08-27T00:12:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/well-known-ios-sdk-accused-associated-with-spying-on-billions-of-customers-and-committing-ad-scams.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/well-known-ios-sdk-accused-associated-with-spying-on-billions-of-customers-and-committing-ad-scams.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/your-email-threads-are-now-being-hijacked-by-the-qbot-trojan/16416/</loc>
		<lastmod>2020-08-27T15:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/your-own-email-threads-are-now-being-hijacked-by-the-qbot-trojan.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-june-2020/16420/</loc>
		<lastmod>2020-08-27T23:44:32+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/the-month-in-wordpress-june-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/former-engineer-pleads-guilty-to-cisco-network-damage-causing-webex-teams-account-chaos/16423/</loc>
		<lastmod>2020-08-28T15:45:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/previous-engineer-pleads-guilty-in-order-to-cisco-network-damage-leading-to-webex-teams-account-mayhem-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/malicious-npm-package-caught-trying-to-steal-sensitive-discord-and-browser-files/16428/</loc>
		<lastmod>2020-08-29T14:51:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/08/harmful-npm-package-caught-wanting-to-steal-sensitive-discord-plus-browser-files.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/red-team-automation-or-simulation/16446/</loc>
		<lastmod>2020-09-28T16:48:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/red-team-automation-or-simulation.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/red-team-automation-or-simulation.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/uhs-hospital-network-hit-by-ransomware-attack/16451/</loc>
		<lastmod>2020-09-28T17:06:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/uhs-hospital-network-hit-by-ransomware-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/give-up-google-dont-hit-accept-all-how-to-fight-for-your-privacy/16436/</loc>
		<lastmod>2020-09-28T17:21:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/give-up-google-dont-hit-accept-all-how-to-fight-for-your-privacy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-5-1-maintenance-release/16441/</loc>
		<lastmod>2020-09-28T17:23:44+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/wordpress-5-5-1-maintenance-release.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-88-xcloner-vulnerabilities-lokibot-malware-a-14-year-old-nets-a-25k-bug-bounty/16449/</loc>
		<lastmod>2020-09-28T17:24:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/episode-88-xcloner-vulnerabilities-lokibot-malware-a-14-year-old-nets-a-25k-bug-bounty.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-uncover-cyber-espionage-operation-aimed-at-indian-army/16443/</loc>
		<lastmod>2020-09-28T17:28:47+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/researchers-uncover-cyber-espionage-operation-aimed-at-indian-army.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/researchers-uncover-cyber-espionage-operation-aimed-at-indian-army.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/lockscreen-and-authentication-improvements-in-android-11/16438/</loc>
		<lastmod>2020-09-28T17:29:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/lockscreen-and-authentication-improvements-in-android-11.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/lockscreen-and-authentication-improvements-in-android-11.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/lockscreen-and-authentication-improvements-in-android-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/lockscreen-and-authentication-improvements-in-android-11-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/lockscreen-and-authentication-improvements-in-android-11-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/lockscreen-and-authentication-improvements-in-android-11-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/lockscreen-and-authentication-improvements-in-android-11-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/lockscreen-and-authentication-improvements-in-android-11-3.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-bug-could-let-attackers-hijack-firefox-for-android-via-wi-fi-network/16487/</loc>
		<lastmod>2020-09-29T17:04:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/a-bug-could-let-attackers-hijack-firefox-for-android-via-wi-fi-network.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/a-bug-could-let-attackers-hijack-firefox-for-android-via-wi-fi-network.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-july-2020/16482/</loc>
		<lastmod>2020-09-29T17:12:41+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/the-month-in-wordpress-july-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/improved-malware-protection-for-users-in-the-advanced-protection-program/16479/</loc>
		<lastmod>2020-09-29T17:32:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/improved-malware-protection-for-users-in-the-advanced-protection-program.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/improved-malware-protection-for-users-in-the-advanced-protection-program.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/improved-malware-protection-for-users-in-the-advanced-protection-program.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/improved-malware-protection-for-users-in-the-advanced-protection-program-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/improved-malware-protection-for-users-in-the-advanced-protection-program-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-patient-dies-after-ransomware-attack-paralyzes-german-hospital-systems/16484/</loc>
		<lastmod>2020-09-29T17:37:47+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/a-patient-dies-after-ransomware-attack-paralyzes-german-hospital-systems.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/a-patient-dies-after-ransomware-attack-paralyzes-german-hospital-systems.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-some-ransomware-attacks-take-less-than-45-minutes/16490/</loc>
		<lastmod>2020-09-29T17:40:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/09/microsoft-some-ransomware-attacks-take-less-than-45-minutes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-uncover-6-year-cyber-espionage-campaign-targeting-iranian-dissidents/16501/</loc>
		<lastmod>2020-09-30T16:57:24+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/researchers-uncover-6-year-cyber-espionage-campaign-targeting-iranian-dissidents.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/researchers-uncover-6-year-cyber-espionage-campaign-targeting-iranian-dissidents.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/announcing-new-reward-amounts-for-abuse-risk-researchers/16493/</loc>
		<lastmod>2020-09-30T16:58:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/announcing-new-reward-amounts-for-abuse-risk-researchers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/announcing-new-reward-amounts-for-abuse-risk-researchers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/announcing-new-reward-amounts-for-abuse-risk-researchers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/announcing-new-reward-amounts-for-abuse-risk-researchers-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/announcing-new-reward-amounts-for-abuse-risk-researchers-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/15-million-business-email-scam-campaign-in-the-us-exposed/16504/</loc>
		<lastmod>2020-09-30T17:01:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/15-million-business-email-scam-campaign-in-the-us-exposed.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/chinese-apt-group-targets-media-finance-and-electronics-sectors/16498/</loc>
		<lastmod>2020-09-30T17:26:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/chinese-apt-group-targets-media-finance-and-electronics-sectors.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/chinese-apt-group-targets-media-finance-and-electronics-sectors.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-5-beta-4/16496/</loc>
		<lastmod>2020-09-30T17:39:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/wordpress-5-5-beta-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/beware-new-android-spyware-found-posing-as-telegram-and-threema-apps/16510/</loc>
		<lastmod>2020-10-01T17:16:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/beware-new-android-spyware-found-posing-as-telegram-and-threema-apps.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/beware-new-android-spyware-found-posing-as-telegram-and-threema-apps.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-5-beta-2/16508/</loc>
		<lastmod>2020-10-01T17:21:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/wordpress-5-5-beta-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/russian-who-hacked-linkedin-dropbox-sentenced-to-7-years-in-prison/16513/</loc>
		<lastmod>2020-10-01T17:26:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/russian-who-hacked-linkedin-dropbox-sentenced-to-7-years-in-prison.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/russian-who-hacked-linkedin-dropbox-sentenced-to-7-years-in-prison.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/with-api-attacks-rising-cloudflare-launches-a-free-api-security-tool/16516/</loc>
		<lastmod>2020-10-01T17:41:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/with-api-attacks-rising-cloudflare-launches-a-free-api-security-tool.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/u-s-treasury-sanctions-hacking-group-backed-by-iranian-intelligence/16527/</loc>
		<lastmod>2020-10-02T17:09:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/u-s-treasury-sanctions-hacking-group-backed-by-iranian-intelligence.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/u-s-treasury-sanctions-hacking-group-backed-by-iranian-intelligence.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-89-shopify-rogue-employees-medium-and-twitter-vulnerabilities-and-hackers-hiding-out-in-corporate-networks/16530/</loc>
		<lastmod>2020-10-02T17:41:52+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/episode-89-shopify-rogue-employees-medium-and-twitter-vulnerabilities-and-hackers-hiding-out-in-corporate-networks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-sets-up-research-grant-for-finding-bugs-in-browser-javascript-engines/16532/</loc>
		<lastmod>2020-10-02T17:41:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/google-sets-up-research-grant-for-finding-bugs-in-browser-javascript-engines.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-september-2020/16522/</loc>
		<lastmod>2020-10-02T17:45:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/the-month-in-wordpress-september-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-fingerprint-exploit-developers-who-help-several-malware-authors/16524/</loc>
		<lastmod>2020-10-02T17:50:47+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/researchers-fingerprint-exploit-developers-who-help-several-malware-authors.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/researchers-fingerprint-exploit-developers-who-help-several-malware-authors.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/zenscrape-a-simple-web-scraping-solution-for-penetration-testers/16544/</loc>
		<lastmod>2020-10-03T17:20:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/zenscrape-a-simple-web-scraping-solution-for-penetration-testers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/zenscrape-a-simple-web-scraping-solution-for-penetration-testers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/announcing-the-launch-of-the-android-partner-vulnerability-initiative/16538/</loc>
		<lastmod>2020-10-03T17:28:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/announcing-the-launch-of-the-android-partner-vulnerability-initiative.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/announcing-the-launch-of-the-android-partner-vulnerability-initiative.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/announcing-the-launch-of-the-android-partner-vulnerability-initiative-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/announcing-the-launch-of-the-android-partner-vulnerability-initiative-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/announcing-the-launch-of-the-android-partner-vulnerability-initiative-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/announcing-the-launch-of-the-android-partner-vulnerability-initiative.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/announcing-the-launch-of-the-android-partner-vulnerability-initiative-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/announcing-the-launch-of-the-android-partner-vulnerability-initiative-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/android-11-5-new-security-and-privacy-features-you-need-to-know/16541/</loc>
		<lastmod>2020-10-03T17:30:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/android-11-5-new-security-and-privacy-features-you-need-to-know.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/android-11-5-new-security-and-privacy-features-you-need-to-know.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-is-creating-a-special-android-security-team-to-find-bugs-in-sensitive-apps/16547/</loc>
		<lastmod>2020-10-03T17:32:07+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/google-is-creating-a-special-android-security-team-to-find-bugs-in-sensitive-apps.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fbi-adds-5-chinese-apt41-hackers-to-its-cybers-most-wanted-list/16552/</loc>
		<lastmod>2020-10-04T17:04:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/fbi-adds-5-chinese-apt41-hackers-to-its-cybers-most-wanted-list.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/fbi-adds-5-chinese-apt41-hackers-to-its-cybers-most-wanted-list.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/u-s-announces-charges-against-2-russian-and-2-iranian-hackers/16549/</loc>
		<lastmod>2020-10-04T17:25:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/u-s-announces-charges-against-2-russian-and-2-iranian-hackers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/u-s-announces-charges-against-2-russian-and-2-iranian-hackers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-ttint-iot-botnet-caught-exploiting-two-zero-days-in-tenda-routers/16555/</loc>
		<lastmod>2020-10-04T17:55:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/new-ttint-iot-botnet-caught-exploiting-two-zero-days-in-tenda-routers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/chinese-hacker-group-spotted-using-a-uefi-bootkit-in-the-wild/16566/</loc>
		<lastmod>2020-10-05T17:37:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/chinese-hacker-group-spotted-using-a-uefi-bootkit-in-the-wild.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/high-severity-vulnerabilities-in-post-grid-and-team-showcase-plugins/16564/</loc>
		<lastmod>2020-10-05T17:39:07+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/high-severity-vulnerabilities-in-post-grid-and-team-showcase-plugins.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-flaws-in-top-antivirus-software-could-make-computers-more-vulnerable/16561/</loc>
		<lastmod>2020-10-05T17:41:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/new-flaws-in-top-antivirus-software-could-make-computers-more-vulnerable.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/new-flaws-in-top-antivirus-software-could-make-computers-more-vulnerable.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/secure-your-saas-apps-with-security-posture-management-platform/16558/</loc>
		<lastmod>2020-10-05T17:57:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/secure-your-saas-apps-with-security-posture-management-platform.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/secure-your-saas-apps-with-security-posture-management-platform.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-password-protections-and-more-in-chrome/16571/</loc>
		<lastmod>2020-10-06T17:08:08+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/new-password-protections-and-more-in-chrome.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/new-password-protections-and-more-in-chrome.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/new-password-protections-and-more-in-chrome-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/new-password-protections-and-more-in-chrome.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/new-password-protections-and-more-in-chrome-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/new-password-protections-and-more-in-chrome-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-mosaicregressor-uefi-bootkit-malware-found-active-in-the-wild/16574/</loc>
		<lastmod>2020-10-06T17:20:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/new-mosaicregressor-uefi-bootkit-malware-found-active-in-the-wild.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/new-mosaicregressor-uefi-bootkit-malware-found-active-in-the-wild.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/chrome-86-released-with-password-related-security-improvements/16577/</loc>
		<lastmod>2020-10-06T18:05:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/chrome-86-released-with-password-related-security-improvements.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/alert-hackers-targeting-iot-devices-with-a-new-p2p-botnet-malware/16586/</loc>
		<lastmod>2020-10-07T17:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/alert-hackers-targeting-iot-devices-with-a-new-p2p-botnet-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/alert-hackers-targeting-iot-devices-with-a-new-p2p-botnet-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/privacy-preserving-smart-input-with-gboard/16580/</loc>
		<lastmod>2020-10-07T17:21:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/privacy-preserving-smart-input-with-gboard.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/privacy-preserving-smart-input-with-gboard.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/privacy-preserving-smart-input-with-gboard.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/privacy-preserving-smart-input-with-gboard-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/privacy-preserving-smart-input-with-gboard-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/privacy-preserving-smart-input-with-gboard-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/privacy-preserving-smart-input-with-gboard-3.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/uk-department-for-education-fails-to-meet-uk-gdpr-data-protection-standards-with-flying-colors/16591/</loc>
		<lastmod>2020-10-07T17:35:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/uk-department-for-education-fails-to-meet-uk-gdpr-data-protection-standards-with-flying-colors.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/vulnerability-exposes-over-4-million-sites-using-wpbakery/16589/</loc>
		<lastmod>2020-10-07T17:58:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/vulnerability-exposes-over-4-million-sites-using-wpbakery.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-handy-guide-for-choosing-a-managed-detection-response-mdr-service/16583/</loc>
		<lastmod>2020-10-07T18:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/a-handy-guide-for-choosing-a-managed-detection-response-mdr-service.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/a-handy-guide-for-choosing-a-managed-detection-response-mdr-service.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/waterbear-malware-used-in-attack-wave-against-government-agencies/16599/</loc>
		<lastmod>2020-10-08T17:09:38+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/waterbear-malware-used-in-attack-wave-against-government-agencies.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-find-vulnerabilities-in-microsoft-azure-cloud-service/16596/</loc>
		<lastmod>2020-10-08T17:55:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/researchers-find-vulnerabilities-in-microsoft-azure-cloud-service.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/researchers-find-vulnerabilities-in-microsoft-azure-cloud-service.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/55-new-security-flaws-reported-in-apple-software-and-services/16606/</loc>
		<lastmod>2020-10-09T17:44:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/55-new-security-flaws-reported-in-apple-software-and-services.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/55-new-security-flaws-reported-in-apple-software-and-services.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fuzzing-internships-for-open-source-software/16603/</loc>
		<lastmod>2020-10-09T17:45:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/fuzzing-internships-for-open-source-software.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/fuzzing-internships-for-open-source-software.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/fuzzing-internships-for-open-source-software-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/fuzzing-internships-for-open-source-software-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/chrome-changes-how-its-cache-system-works-to-improve-privacy/16611/</loc>
		<lastmod>2020-10-09T17:50:58+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/chrome-changes-how-its-cache-system-works-to-improve-privacy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-90-wpbakery-plugin-vulnerability-exposes-over-4-million-sites/16609/</loc>
		<lastmod>2020-10-09T17:55:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/episode-90-wpbakery-plugin-vulnerability-exposes-over-4-million-sites.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/children-and-parent-info-exposed-in-georgia-dhs-data-breach/16615/</loc>
		<lastmod>2020-10-10T18:07:31+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/children-and-parent-info-exposed-in-georgia-dhs-data-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/five-eyes-governments-india-and-japan-make-new-call-for-encryption-backdoors/16617/</loc>
		<lastmod>2020-10-11T19:10:41+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/five-eyes-governments-india-and-japan-make-new-call-for-encryption-backdoors.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/bitcoin-wallet-update-trick-has-netted-criminals-more-than-22-million/16622/</loc>
		<lastmod>2020-10-12T19:09:28+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/bitcoin-wallet-update-trick-has-netted-criminals-more-than-22-million.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-october-2020-patch-tuesday-fixes-87-vulnerabilities/16625/</loc>
		<lastmod>2020-10-13T20:04:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/microsoft-october-2020-patch-tuesday-fixes-87-vulnerabilities.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/police-raided-german-spyware-company-finfisher-offices/16631/</loc>
		<lastmod>2020-10-14T19:19:39+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/police-raided-german-spyware-company-finfisher-offices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/police-raided-german-spyware-company-finfisher-offices.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/zoom-to-roll-out-end-to-end-encrypted-e2ee-calls/16634/</loc>
		<lastmod>2020-10-14T19:49:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/zoom-to-roll-out-end-to-end-encrypted-e2ee-calls.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ubisoft-crytek-data-posted-on-ransomware-gangs-site/16638/</loc>
		<lastmod>2020-10-15T19:40:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/ubisoft-crytek-data-posted-on-ransomware-gangs-site.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-says-it-mitigated-a-2-54-tbps-ddos-attack-in-2017-largest-known-to-date/16644/</loc>
		<lastmod>2020-10-16T19:24:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/google-says-it-mitigated-a-2-54-tbps-ddos-attack-in-2017-largest-known-to-date.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ba-fined-record-20m-for-customer-data-breach/16642/</loc>
		<lastmod>2020-10-16T19:58:45+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/ba-fined-record-20m-for-customer-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/political-campaign-emails-contain-dark-patterns-to-manipulate-donors-voters/16647/</loc>
		<lastmod>2020-10-17T20:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/political-campaign-emails-contain-dark-patterns-to-manipulate-donors-voters.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/three-npm-packages-found-opening-shells-on-linux-windows-systems/16649/</loc>
		<lastmod>2020-10-18T19:42:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/three-npm-packages-found-opening-shells-on-linux-windows-systems.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/us-charges-russian-hackers-behind-notpetya-killdisk-olympicdestroyer-attacks/16652/</loc>
		<lastmod>2020-10-19T19:39:52+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/us-charges-russian-hackers-behind-notpetya-killdisk-olympicdestroyer-attacks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/nsa-publishes-list-of-top-vulnerabilities-currently-targeted-by-chinese-hackers/16657/</loc>
		<lastmod>2020-10-20T20:30:30+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/nsa-publishes-list-of-top-vulnerabilities-currently-targeted-by-chinese-hackers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-deploys-forced-security-update-for-dangerous-bug-in-popular-plugin/16662/</loc>
		<lastmod>2020-10-21T20:44:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/wordpress-deploys-forced-security-update-for-dangerous-bug-in-popular-plugin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/eu-sanctions-russia-over-2015-german-parliament-hack/16664/</loc>
		<lastmod>2020-10-22T20:12:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/eu-sanctions-russia-over-2015-german-parliament-hack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/apple-notarizes-six-malicious-apps-posing-as-flash-installers/16669/</loc>
		<lastmod>2020-10-23T20:19:08+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/apple-notarizes-six-malicious-apps-posing-as-flash-installers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/us-treasury-sanctions-russian-research-institute-behind-triton-malware/16671/</loc>
		<lastmod>2020-10-24T20:33:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/us-treasury-sanctions-russian-research-institute-behind-triton-malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/phishing-groups-are-collecting-user-data-email-and-banking-passwords-via-fake-voter-registration-forms/16673/</loc>
		<lastmod>2020-10-25T20:40:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/phishing-groups-are-collecting-user-data-email-and-banking-passwords-via-fake-voter-registration-forms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/adware-found-in-21-android-apps-with-more-than-7-million-downloads/16677/</loc>
		<lastmod>2020-10-26T21:06:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/adware-found-in-21-android-apps-with-more-than-7-million-downloads.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-august-2020/16680/</loc>
		<lastmod>2020-10-27T20:32:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/the-month-in-wordpress-august-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hacker-steals-24-million-from-cryptocurrency-service-harvest-finance/16684/</loc>
		<lastmod>2020-10-27T20:51:08+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/hacker-steals-24-million-from-cryptocurrency-service-harvest-finance.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/introducing-wordfence-central-teams/16682/</loc>
		<lastmod>2020-10-27T21:26:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/introducing-wordfence-central-teams.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/introducing-wordfence-central-teams.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/introducing-wordfence-central-teams-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/introducing-wordfence-central-teams-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/over-100-irrigation-systems-left-exposed-online-without-a-password/16692/</loc>
		<lastmod>2020-10-28T20:49:39+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/over-100-irrigation-systems-left-exposed-online-without-a-password.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mcafee-debuts-remote-browser-isolation-solution-xdr-platform/16697/</loc>
		<lastmod>2020-10-29T21:29:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/mcafee-debuts-remote-browser-isolation-solution-xdr-platform.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-discloses-windows-zero-day-exploited-in-the-wild/16709/</loc>
		<lastmod>2020-10-30T21:22:50+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/google-discloses-windows-zero-day-exploited-in-the-wild.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/privacy-preserving-features-in-the-mobile-driving-license/16706/</loc>
		<lastmod>2020-10-30T21:25:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/privacy-preserving-features-in-the-mobile-driving-license.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/privacy-preserving-features-in-the-mobile-driving-license.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/privacy-preserving-features-in-the-mobile-driving-license.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/privacy-preserving-features-in-the-mobile-driving-license-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/10/privacy-preserving-features-in-the-mobile-driving-license-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/chrome-will-soon-have-its-own-dedicated-certificate-root-store/16715/</loc>
		<lastmod>2020-10-31T21:26:39+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/chrome-will-soon-have-its-own-dedicated-certificate-root-store.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/us-cyber-command-exposes-new-russian-malware/16717/</loc>
		<lastmod>2020-11-01T21:39:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/us-cyber-command-exposes-new-russian-malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/marriott-fined-18-4-million-by-uk-watchdog-over-customer-data-breach/16751/</loc>
		<lastmod>2020-11-02T20:58:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/marriott-fined-18-4-mil-by-uk-watchdog-more-than-customer-data-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-october-2020/16749/</loc>
		<lastmod>2020-11-02T21:45:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/the-month-in-wordpress-october-2020.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-chrome-zero-day-under-active-attacks-update-your-browser/16758/</loc>
		<lastmod>2020-11-03T21:01:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/brand-new-chrome-zero-day-under-energetic-attacks-update-your-internet-browser.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/brand-new-chrome-zero-day-under-energetic-attacks-update-your-internet-browser.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/unpacking-the-wordpress-5-5-2-5-5-3-security-release/16761/</loc>
		<lastmod>2020-11-03T21:08:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/unpacking-the-wordpress-5-5-2-5-5-3-security-release.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-6-beta-3/16753/</loc>
		<lastmod>2020-11-03T21:12:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/wp-5-6-beta-a-few.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-kimsuky-module-makes-north-korean-spyware-more-powerful/16755/</loc>
		<lastmod>2020-11-03T21:54:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/brand-new-kimsuky-module-makes-northern-korean-spyware-more-powerful.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/brand-new-kimsuky-module-makes-northern-korean-spyware-more-powerful.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/after-two-zero-days-in-chrome-desktop-google-patches-a-third-zero-day-in-the-android-version/16763/</loc>
		<lastmod>2020-11-03T21:58:30+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/right-after-two-zero-days-in-chromium-desktop-google-patches-another-zero-day-in-the-android-edition.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/russian-authorities-make-rare-arrest-of-malware-author/16765/</loc>
		<lastmod>2020-11-04T21:38:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/ruskies-authorities-make-rare-police-arrest-of-malware-author.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/object-injection-vulnerability-in-welcart-e-commerce-plugin/16773/</loc>
		<lastmod>2020-11-05T21:04:08+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/item-injection-vulnerability-in-welcart-e-commerce-plugin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/apple-fixes-three-ios-zero-days-exploited-in-the-wild/16775/</loc>
		<lastmod>2020-11-05T21:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/apple-company-fixes-three-ios-zero-days-exploited-in-the-wild.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/north-korean-hackers-used-torisma-spyware-in-job-offers-based-attacks/16767/</loc>
		<lastmod>2020-11-05T21:17:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/northern-korean-hackers-used-torisma-spyware-in-job-offers-based-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/northern-korean-hackers-used-torisma-spyware-in-job-offers-based-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/premium-rate-phone-fraudsters-hack-voip-servers-of-1200-companies/16770/</loc>
		<lastmod>2020-11-05T21:57:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/premium-rate-phone-fraudsters-hack-voice-over-internet-protocol-servers-of-1200-businesses.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/premium-rate-phone-fraudsters-hack-voice-over-internet-protocol-servers-of-1200-businesses.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-94-hosting-provider-exposed-63-million-customer-records/16783/</loc>
		<lastmod>2020-11-06T21:15:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/episode-94-hosting-provider-exposed-63-million-customer-records.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/deception-technology-no-longer-only-a-fortune-2000-solution/16780/</loc>
		<lastmod>2020-11-06T21:27:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/deceptiveness-technology-no-longer-only-a-lot-of-money-2000-solution.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/deceptiveness-technology-no-longer-only-a-lot-of-money-2000-solution.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/update-your-ios-devices-now-3-actively-exploited-0-days-discovered/16777/</loc>
		<lastmod>2020-11-06T21:29:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/keep-track-of-ios-devices-now-3-actively-exploited-0-days-discovered.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/keep-track-of-ios-devices-now-3-actively-exploited-0-days-discovered.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/linux-version-of-ransomexx-ransomware-discovered/16785/</loc>
		<lastmod>2020-11-06T22:09:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/cpanel-version-of-ransomexx-ransomware-discovered.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fbi-hackers-stole-source-code-from-us-government-agencies-and-private-companies/16790/</loc>
		<lastmod>2020-11-07T21:47:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/f-hackers-stole-source-program-codecode-calculatordecoder-from-us-government-agencies-and-companies.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/if-you-dont-have-a-sase-cloud-service-you-dont-have-sase-at-all/16787/</loc>
		<lastmod>2020-11-07T21:54:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/minus-a-sase-cloud-support-you-dont-have-sase-at-all.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/minus-a-sase-cloud-support-you-dont-have-sase-at-all.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/windows-10-ios-chrome-and-many-others-fall-at-chinas-top-hacking-contest/16792/</loc>
		<lastmod>2020-11-08T21:57:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/home-windows-10-ios-chrome-and-many-more-fall-at-chinas-best-hacking-contest.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/worried-about-saas-misconfigurations-check-these-5-settings-everybody-misses/16796/</loc>
		<lastmod>2020-11-09T21:46:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/concerned-about-saas-misconfigurations-check-these-types-of-5-settings-everybody-does-not-show-for.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/concerned-about-saas-misconfigurations-check-these-types-of-5-settings-everybody-does-not-show-for.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/zoom-settles-ftc-charges-for-misleading-users-about-security-features/16804/</loc>
		<lastmod>2020-11-09T22:03:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/focus-settles-ftc-charges-with-regard-to-misleading-users-about-protection-features.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/windows-10-ios-chrome-firefox-and-others-hacked-at-tianfu-cup-competition/16799/</loc>
		<lastmod>2020-11-09T22:17:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/home-windows-10-ios-chrome-opera-and-others-hacked-at-tianfu-cup-competition.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/home-windows-10-ios-chrome-opera-and-others-hacked-at-tianfu-cup-competition.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-privilege-escalation-vulnerabilities-affect-100k-sites-using-ultimate-member-plugin/16802/</loc>
		<lastmod>2020-11-09T22:23:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/crucial-privilege-escalation-vulnerabilities-impact-100k-sites-using-greatest-member-plugin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/watch-out-new-android-banking-trojan-steals-from-112-financial-apps/16807/</loc>
		<lastmod>2020-11-10T21:51:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/look-out-new-android-banking-trojan-viruses-steals-from-112-monetary-apps.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/look-out-new-android-banking-trojan-viruses-steals-from-112-monetary-apps.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-november-2020-patch-tuesday-arrives-with-fix-for-windows-zero-day/16810/</loc>
		<lastmod>2020-11-10T22:28:50+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/ms-november-2020-patch-wednesday-arrives-with-fix-with-regard-to-windows-zero-day.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/over-2800-e-shops-running-outdated-magento-software-hit-by-credit-card-hackers/16812/</loc>
		<lastmod>2020-11-11T21:47:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/more-than-2800-e-shops-running-out-of-date-magento-software-hit-simply-by-credit-card-hackers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/more-than-2800-e-shops-running-out-of-date-magento-software-hit-simply-by-credit-card-hackers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/recent-ransomware-wave-targeting-israel-linked-to-iranian-threat-actors/16818/</loc>
		<lastmod>2020-11-11T21:55:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/current-ransomware-wave-targeting-his-home-country-of-israel-linked-to-iranian-threat-stars.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/build-your-2021-cybersecurity-plan-with-this-free-ppt-template/16815/</loc>
		<lastmod>2020-11-11T21:56:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/create-your-2021-cybersecurity-plan-with-this-particular-free-ppt-template.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/create-your-2021-cybersecurity-plan-with-this-particular-free-ppt-template.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/blackberry-discovers-new-hacker-for-hire-mercenary-group/16826/</loc>
		<lastmod>2020-11-12T22:00:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/blackberry-mobile-phones-discovers-new-hacker-for-hire-mercenary-group.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/uncovered-apt-hackers-for-hire-target-financial-entertainment-firms/16820/</loc>
		<lastmod>2020-11-12T22:25:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/discovered-apt-hackers-for-hire-target-financial-entertainment-companies.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/discovered-apt-hackers-for-hire-target-financial-entertainment-companies.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-modpipe-point-of-sale-pos-malware-targeting-restaurants-hotels/16823/</loc>
		<lastmod>2020-11-12T22:48:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/brand-new-modpipe-point-of-purchase-pos-malware-targeting-dining-places-hotels.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/brand-new-modpipe-point-of-purchase-pos-malware-targeting-dining-places-hotels.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hacker-steals-2-million-from-cryptocurrency-service-akropolis/16841/</loc>
		<lastmod>2020-11-13T22:04:42+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/hacker-steals-2-million-through-cryptocurrency-service-akropolis.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-95-critical-privilege-escalation-vulnerabilities-affect-over-100k-wordpress-sites/16839/</loc>
		<lastmod>2020-11-13T22:11:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/episode-95-critical-privilege-escalation-vulnerabilities-affect-over-100k-wordpress-sites.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/announcing-our-open-source-security-key-test-suite/16828/</loc>
		<lastmod>2020-11-13T22:26:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/launching-our-open-source-security-important-test-suite.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/launching-our-open-source-security-important-test-suite.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/launching-our-open-source-security-important-test-suite-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/launching-our-open-source-security-important-test-suite-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/launching-our-open-source-security-important-test-suite-3.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/live-webinar-reducing-complexity-by-increasing-consolidation-for-smes/16833/</loc>
		<lastmod>2020-11-13T22:31:23+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/reside-webinar-reducing-complexity-simply-by-increasing-consolidation-for-smes.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/reside-webinar-reducing-complexity-simply-by-increasing-consolidation-for-smes.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/sad-dns-new-flaws-re-enable-dns-cache-poisoning-attacks/16836/</loc>
		<lastmod>2020-11-13T22:44:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/unfortunate-dns-new-defects-re-enable-dns-cache-poisoning-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/unfortunate-dns-new-defects-re-enable-dns-cache-poisoning-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-6-beta-4/16831/</loc>
		<lastmod>2020-11-13T22:45:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/wp-5-6-beta-four.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-says-three-apts-have-targeted-seven-covid-19-vaccine-makers/16849/</loc>
		<lastmod>2020-11-14T22:30:52+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/ms-says-three-apts-possess-targeted-seven-covid-19-shot-makers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/two-new-chrome-0-days-under-active-attacks-update-your-browser/16846/</loc>
		<lastmod>2020-11-14T22:35:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/2-new-chrome-0-days-below-active-attacks-keep-track-of-browser.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/2-new-chrome-0-days-below-active-attacks-keep-track-of-browser.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/missions-the-next-level-of-interactive-developer-security-training/16843/</loc>
		<lastmod>2020-11-14T22:56:42+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/quests-the-next-level-of-online-developer-security-training.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/quests-the-next-level-of-online-developer-security-training.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/chainalysis-launches-program-to-manage-cryptocurrency-seized-by-law-enforcement/16855/</loc>
		<lastmod>2020-11-15T22:54:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/chainalysis-launches-program-to-manage-cryptocurrency-seized-by-law-enforcement.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-releases-windows-security-updates-for-critical-flaws/16852/</loc>
		<lastmod>2020-11-15T23:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/microsoft-releases-windows-security-updates-for-critical-flaws.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/microsoft-releases-windows-security-updates-for-critical-flaws.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/trojanized-security-software-hits-south-korea-users-in-supply-chain-attack/16858/</loc>
		<lastmod>2020-11-16T22:38:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/trojanized-security-software-hits-south-korea-users-in-supply-chain-attack.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/trojanized-security-software-hits-south-korea-users-in-supply-chain-attack.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-zoom-feature-can-alert-room-owners-of-possible-zoombombing-disruptions/16861/</loc>
		<lastmod>2020-11-16T22:58:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/new-zoom-feature-can-alert-room-owners-of-possible-zoombombing-disruptions.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/chinese-apt-hackers-target-southeast-asian-government-institutions/16866/</loc>
		<lastmod>2020-11-17T22:57:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/chinese-apt-hackers-target-southeast-asian-government-institutions.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/chinese-apt-hackers-target-southeast-asian-government-institutions.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/twitter-hires-veteran-hacker-mudge-as-head-of-security/16864/</loc>
		<lastmod>2020-11-17T23:06:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/twitter-hires-veteran-hacker-mudge-as-head-of-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/chrome-87-released-with-fix-for-nat-slipstream-attacks-broader-ftp-deprecation/16874/</loc>
		<lastmod>2020-11-17T23:25:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/chrome-87-released-with-fix-for-nat-slipstream-attacks-broader-ftp-deprecation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/large-scale-attacks-target-epsilon-framework-themes/16872/</loc>
		<lastmod>2020-11-17T23:28:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/large-scale-attacks-target-epsilon-framework-themes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researcher-discloses-critical-rce-flaws-in-cisco-security-manager/16869/</loc>
		<lastmod>2020-11-17T23:30:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/researcher-discloses-critical-rce-flaws-in-cisco-security-manager.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/researcher-discloses-critical-rce-flaws-in-cisco-security-manager.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-6-release-candidate/16876/</loc>
		<lastmod>2020-11-18T22:47:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/wordpress-5-6-release-candidate.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/apple-lets-some-of-its-big-sur-macos-apps-bypass-firewall-and-vpns/16881/</loc>
		<lastmod>2020-11-18T22:50:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/apple-lets-some-of-its-big-sur-macos-apps-bypass-firewall-and-vpns.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/apple-lets-some-of-its-big-sur-macos-apps-bypass-firewall-and-vpns.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/use-this-ultimate-template-to-plan-and-monitor-your-cybersecurity-budgets/16878/</loc>
		<lastmod>2020-11-18T22:51:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/use-this-ultimate-template-to-plan-and-monitor-your-cybersecurity-budgets.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/use-this-ultimate-template-to-plan-and-monitor-your-cybersecurity-budgets.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/starting-next-year-chrome-extensions-will-show-what-data-they-collect-from-users/16884/</loc>
		<lastmod>2020-11-18T23:08:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/starting-next-year-chrome-extensions-will-show-what-data-they-collect-from-users.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordfence-site-cleaning-guarantee-extended-to-1-year/16892/</loc>
		<lastmod>2020-11-19T23:11:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/wordfence-site-cleaning-guarantee-extended-to-1-year.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/warning-unpatched-bug-in-go-sms-pro-app-exposes-millions-of-media-messages/16886/</loc>
		<lastmod>2020-11-19T23:12:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/warning-unpatched-bug-in-go-sms-pro-app-exposes-millions-of-media-messages.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/warning-unpatched-bug-in-go-sms-pro-app-exposes-millions-of-media-messages.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/facebook-messenger-bug-could-have-allowed-hackers-to-spy-on-users/16894/</loc>
		<lastmod>2020-11-19T23:21:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/facebook-messenger-bug-could-have-allowed-hackers-to-spy-on-users.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/evolution-of-emotet-from-banking-trojan-to-malware-distributor/16889/</loc>
		<lastmod>2020-11-19T23:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/evolution-of-emotet-from-banking-trojan-to-malware-distributor.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/evolution-of-emotet-from-banking-trojan-to-malware-distributor.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-warn-of-critical-flaw-affecting-industrial-automation-systems/16901/</loc>
		<lastmod>2020-11-20T22:59:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/researchers-warn-of-critical-flaw-affecting-industrial-automation-systems.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/researchers-warn-of-critical-flaw-affecting-industrial-automation-systems.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-96-hosting-provider-failures-and-incident-response-preparedness/16904/</loc>
		<lastmod>2020-11-20T23:07:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/episode-96-hosting-provider-failures-and-incident-response-preparedness.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/facebook-messenger-bug-lets-hackers-listen-to-you-before-you-pick-up-the-call/16898/</loc>
		<lastmod>2020-11-20T23:15:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/facebook-messenger-bug-lets-hackers-listen-to-you-before-you-pick-up-the-call.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/facebook-messenger-bug-lets-hackers-listen-to-you-before-you-pick-up-the-call.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/drupal-sites-vulnerable-to-double-extension-attacks/16906/</loc>
		<lastmod>2020-11-20T23:40:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/drupal-sites-vulnerable-to-double-extension-attacks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/manchester-united-football-club-discloses-security-breach/16909/</loc>
		<lastmod>2020-11-21T23:34:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/manchester-united-football-club-discloses-security-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/botnets-have-been-silently-mass-scanning-the-internet-for-unsecured-env-files/16911/</loc>
		<lastmod>2020-11-23T00:03:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/botnets-have-been-silently-mass-scanning-the-internet-for-unsecured-env-files.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/tesla-model-x-hacked-and-stolen-in-minutes-using-new-key-fob-hack/16919/</loc>
		<lastmod>2020-11-23T23:17:27+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/tesla-model-x-hacked-and-stolen-in-minutes-using-new-key-fob-hack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/why-replace-traditional-web-application-firewall-waf-with-new-age-waf/16914/</loc>
		<lastmod>2020-11-23T23:25:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/why-replace-traditional-web-application-firewall-waf-with-new-age-waf.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/why-replace-traditional-web-application-firewall-waf-with-new-age-waf.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/php-8-what-wordpress-users-need-to-know/16917/</loc>
		<lastmod>2020-11-24T00:07:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/php-8-what-wordpress-users-need-to-know.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/2fa-bypass-discovered-in-web-hosting-software-cpanel/16930/</loc>
		<lastmod>2020-11-24T23:18:45+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/2fa-bypass-discovered-in-web-hosting-software-cpanel.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/antiquated-process-data-regulator-on-obtaining-cambridge-analytica-warrant/16922/</loc>
		<lastmod>2020-11-24T23:34:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/antiquated-process-data-regulator-on-obtaining-cambridge-analytica-warrant.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/stantinko-botnet-now-targeting-linux-servers-to-hide-behind-proxies/16924/</loc>
		<lastmod>2020-11-24T23:55:41+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/stantinko-botnet-now-targeting-linux-servers-to-hide-behind-proxies.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/stantinko-botnet-now-targeting-linux-servers-to-hide-behind-proxies.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-unpatched-vmware-flaw-affects-multiple-corporates-products/16927/</loc>
		<lastmod>2020-11-25T00:07:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/critical-unpatched-vmware-flaw-affects-multiple-corporates-products.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/critical-unpatched-vmware-flaw-affects-multiple-corporates-products.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/2-factor-authentication-bypass-flaw-reported-in-cpanel-and-whm-software/16933/</loc>
		<lastmod>2020-11-25T23:33:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/2-factor-authentication-bypass-flaw-reported-in-cpanel-and-whm-software.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/2-factor-authentication-bypass-flaw-reported-in-cpanel-and-whm-software.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/baidus-android-apps-caught-collecting-and-leaking-sensitive-user-data/16936/</loc>
		<lastmod>2020-11-26T00:13:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/baidus-android-apps-caught-collecting-and-leaking-sensitive-user-data.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/baidus-android-apps-caught-collecting-and-leaking-sensitive-user-data.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/security-researcher-accidentally-discovers-windows-7-and-windows-server-2008-zero-day/16939/</loc>
		<lastmod>2020-11-26T00:14:24+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/security-researcher-accidentally-discovers-windows-7-and-windows-server-2008-zero-day.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/interpol-arrests-3-nigerian-bec-scammers-for-targeting-over-500000-entities/16944/</loc>
		<lastmod>2020-11-26T23:42:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/interpol-arrests-3-nigerian-bec-scammers-for-targeting-over-500000-entities.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/interpol-arrests-3-nigerian-bec-scammers-for-targeting-over-500000-entities.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/become-a-white-hat-hacker-get-10-top-rated-courses-at-97-off/16941/</loc>
		<lastmod>2020-11-26T23:51:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/become-a-white-hat-hacker-get-10-top-rated-courses-at-97-off.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/become-a-white-hat-hacker-get-10-top-rated-courses-at-97-off.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/personal-data-of-16-million-brazilian-covid-19-patients-exposed-online/16947/</loc>
		<lastmod>2020-11-27T00:01:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/personal-data-of-16-million-brazilian-covid-19-patients-exposed-online.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/digitally-signed-bandook-malware-once-again-targets-multiple-sectors/16950/</loc>
		<lastmod>2020-11-27T23:21:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/digitally-signed-bandook-malware-once-again-targets-multiple-sectors.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/digitally-signed-bandook-malware-once-again-targets-multiple-sectors.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-hacker-is-selling-access-to-the-email-accounts-of-hundreds-of-c-level-executives/16956/</loc>
		<lastmod>2020-11-27T23:25:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/a-hacker-is-selling-access-to-the-email-accounts-of-hundreds-of-c-level-executives.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/chinas-baidu-android-apps-caught-collecting-sensitive-user-data/16953/</loc>
		<lastmod>2020-11-27T23:59:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/chinas-baidu-android-apps-caught-collecting-sensitive-user-data.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/chinas-baidu-android-apps-caught-collecting-sensitive-user-data.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/networking-equipment-vendor-belden-discloses-data-breach/16960/</loc>
		<lastmod>2020-11-28T23:47:44+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/networking-equipment-vendor-belden-discloses-data-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/sophos-notifies-customers-of-data-exposure-after-database-misconfiguration/16962/</loc>
		<lastmod>2020-11-30T00:14:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/11/sophos-notifies-customers-of-data-exposure-after-database-misconfiguration.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/quick-guide-how-to-troubleshoot-active-directory-account-lockouts/16968/</loc>
		<lastmod>2020-11-30T23:56:08+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/quick-guide-how-to-troubleshoot-active-directory-account-lockouts.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/quick-guide-how-to-troubleshoot-active-directory-account-lockouts.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/docker-malware-is-now-common-so-devs-need-to-take-docker-security-seriously/16971/</loc>
		<lastmod>2020-12-01T00:35:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/docker-malware-is-now-common-so-devs-need-to-take-docker-security-seriously.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/globe-homesurf-promo/16977/</loc>
		<lastmod>2020-12-01T19:27:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/05/Globe-GoSakto.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/globe-homewatch-promo/16981/</loc>
		<lastmod>2020-12-01T19:36:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/05/Globe-GoSakto.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/nation-state-hackers-caught-hiding-espionage-activities-behind-crypto-miners/16987/</loc>
		<lastmod>2020-12-01T23:59:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/nation-state-hackers-caught-hiding-espionage-activities-behind-crypto-miners.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/nation-state-hackers-caught-hiding-espionage-activities-behind-crypto-miners.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/malicious-npm-packages-caught-installing-remote-access-trojans/16990/</loc>
		<lastmod>2020-12-02T00:29:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/malicious-npm-packages-caught-installing-remote-access-trojans.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/incomplete-go-sms-pro-patch-left-millions-of-users-data-still-exposed-online/16984/</loc>
		<lastmod>2020-12-02T00:34:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/incomplete-go-sms-pro-patch-left-millions-of-users-data-still-exposed-online.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/incomplete-go-sms-pro-patch-left-millions-of-users-data-still-exposed-online.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-november-2020/16993/</loc>
		<lastmod>2020-12-03T00:15:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/the-month-in-wordpress-november-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/experts-uncover-crutch-russian-malware-used-in-apt-attacks-for-5-years/16995/</loc>
		<lastmod>2020-12-03T00:16:07+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/experts-uncover-crutch-russian-malware-used-in-apt-attacks-for-5-years.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/experts-uncover-crutch-russian-malware-used-in-apt-attacks-for-5-years.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/open-source-software-security-vulnerabilities-exist-for-over-four-years-before-detection/17001/</loc>
		<lastmod>2020-12-03T00:16:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/open-source-software-security-vulnerabilities-exist-for-over-four-years-before-detection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/multiple-botnets-exploiting-critical-oracle-weblogic-bug-patch-now/16998/</loc>
		<lastmod>2020-12-03T00:33:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/multiple-botnets-exploiting-critical-oracle-weblogic-bug-patch-now.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/multiple-botnets-exploiting-critical-oracle-weblogic-bug-patch-now.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/trickbot-malware-gets-uefi-bios-bootkit-feature-to-remain-undetected/17004/</loc>
		<lastmod>2020-12-04T00:24:30+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/trickbot-malware-gets-uefi-bios-bootkit-feature-to-remain-undetected.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/trickbot-malware-gets-uefi-bios-bootkit-feature-to-remain-undetected.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/dell-announces-new-protections-for-its-pc-and-server-supply-chain/17010/</loc>
		<lastmod>2020-12-04T00:24:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/dell-announces-new-protections-for-its-pc-and-server-supply-chain.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/several-unpatched-popular-android-apps-put-millions-of-users-at-risk-of-hacking/17007/</loc>
		<lastmod>2020-12-04T00:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/several-unpatched-popular-android-apps-put-millions-of-users-at-risk-of-hacking.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/several-unpatched-popular-android-apps-put-millions-of-users-at-risk-of-hacking.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/state-of-the-word-2020/17015/</loc>
		<lastmod>2020-12-05T00:13:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/state-of-the-word-2020-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/state-of-the-word-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/johnson-johnson-ciso-healthcare-orgs-are-seeing-nation-state-attacks-every-single-minute-of-every-single-day/17025/</loc>
		<lastmod>2020-12-05T00:15:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/johnson-johnson-ciso-healthcare-orgs-are-seeing-nation-state-attacks-every-single-minute-of-every-single-day.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-97-the-future-of-wordpress-with-php-8-and-wordpress-5-6/17023/</loc>
		<lastmod>2020-12-05T00:22:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/episode-97-the-future-of-wordpress-with-php-8-and-wordpress-5-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-targeting-companies-involved-in-covid-19-vaccine-distribution/17017/</loc>
		<lastmod>2020-12-05T00:39:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/hackers-targeting-companies-involved-in-covid-19-vaccine-distribution.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/hackers-targeting-companies-involved-in-covid-19-vaccine-distribution.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fostering-research-on-new-web-security-threats/17012/</loc>
		<lastmod>2020-12-05T01:02:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/fostering-research-on-new-web-security-threats.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/fostering-research-on-new-web-security-threats.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/fostering-research-on-new-web-security-threats-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/fostering-research-on-new-web-security-threats-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-organizations-can-prevent-users-from-using-breached-passwords/17020/</loc>
		<lastmod>2020-12-05T01:07:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/how-organizations-can-prevent-users-from-using-breached-passwords.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/how-organizations-can-prevent-users-from-using-breached-passwords.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ransomware-hits-helicopter-maker-kopter/17033/</loc>
		<lastmod>2020-12-06T00:28:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/ransomware-hits-helicopter-maker-kopter.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ciso-with-a-small-security-team-learn-from-your-peers-experience-with-this-free-e-book/17030/</loc>
		<lastmod>2020-12-06T00:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/ciso-with-a-small-security-team-learn-from-your-peers-experience-with-this-free-e-book.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/ciso-with-a-small-security-team-learn-from-your-peers-experience-with-this-free-e-book.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-for-hire-group-develops-new-powerpepper-in-memory-malware/17027/</loc>
		<lastmod>2020-12-06T00:40:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/hackers-for-hire-group-develops-new-powerpepper-in-memory-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/hackers-for-hire-group-develops-new-powerpepper-in-memory-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/4-free-online-cyber-security-testing-tools-for-2021/17038/</loc>
		<lastmod>2020-12-07T00:29:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/4-free-online-cyber-security-testing-tools-for-2021.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/4-free-online-cyber-security-testing-tools-for-2021.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/kazakhstan-government-is-intercepting-https-traffic-in-its-capital/17041/</loc>
		<lastmod>2020-12-07T00:54:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/kazakhstan-government-is-intercepting-https-traffic-in-its-capital.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-hacker-details-zero-click-wormable-wi-fi-exploit-to-hack-iphones/17035/</loc>
		<lastmod>2020-12-07T00:56:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/google-hacker-details-zero-click-wormable-wi-fi-exploit-to-hack-iphones.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/google-hacker-details-zero-click-wormable-wi-fi-exploit-to-hack-iphones.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/iranian-rana-android-malware-also-spies-on-instant-messengers/17049/</loc>
		<lastmod>2020-12-08T00:32:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/iranian-rana-android-malware-also-spies-on-instant-messengers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/iranian-rana-android-malware-also-spies-on-instant-messengers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/opentitan-at-one-year-the-open-source-journey-to-secure-silicon/17046/</loc>
		<lastmod>2020-12-08T00:33:44+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/opentitan-at-one-year-the-open-source-journey-to-secure-silicon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/opentitan-at-one-year-the-open-source-journey-to-secure-silicon.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/opentitan-at-one-year-the-open-source-journey-to-secure-silicon-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/opentitan-at-one-year-the-open-source-journey-to-secure-silicon.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/opentitan-at-one-year-the-open-source-journey-to-secure-silicon-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/opentitan-at-one-year-the-open-source-journey-to-secure-silicon-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/btc-e-founder-sentenced-to-five-years-in-prison-for-laundering-ransomware-funds/17055/</loc>
		<lastmod>2020-12-08T00:46:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/btc-e-founder-sentenced-to-five-years-in-prison-for-laundering-ransomware-funds.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-dmarc-can-stop-criminals-sending-fake-emails-on-behalf-of-your-domain/17052/</loc>
		<lastmod>2020-12-08T00:56:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/how-dmarc-can-stop-criminals-sending-fake-emails-on-behalf-of-your-domain.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/how-dmarc-can-stop-criminals-sending-fake-emails-on-behalf-of-your-domain.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/download-how-xdr-platforms-are-changing-the-game-for-ransomware-protection/17066/</loc>
		<lastmod>2020-12-09T00:37:41+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/download-how-xdr-platforms-are-changing-the-game-for-ransomware-protection.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/download-how-xdr-platforms-are-changing-the-game-for-ransomware-protection.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/announcing-bonus-rewards-for-v8-exploits/17058/</loc>
		<lastmod>2020-12-09T00:42:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/announcing-bonus-rewards-for-v8-exploits.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/announcing-bonus-rewards-for-v8-exploits.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/announcing-bonus-rewards-for-v8-exploits.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/announcing-bonus-rewards-for-v8-exploits-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/announcing-bonus-rewards-for-v8-exploits-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fireeye-one-of-the-worlds-largest-security-firms-discloses-security-breach/17071/</loc>
		<lastmod>2020-12-09T00:53:47+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/fireeye-one-of-the-worlds-largest-security-firms-discloses-security-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-6-simone/17061/</loc>
		<lastmod>2020-12-09T01:22:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/wordpress-5-6-simone-26.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/wordpress-5-6-simone.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/wordpress-5-6-simone-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/wordpress-5-6-simone-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/wordpress-5-6-simone.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/wordpress-5-6-simone-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/wordpress-5-6-simone-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/wordpress-5-6-simone-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-6-introduces-a-new-risk-to-your-site-what-to-do/17069/</loc>
		<lastmod>2020-12-09T01:25:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/wordpress-5-6-introduces-a-new-risk-to-your-site-what-to-do-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/wordpress-5-6-introduces-a-new-risk-to-your-site-what-to-do.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/wordpress-5-6-introduces-a-new-risk-to-your-site-what-to-do-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/warning-critical-remote-hacking-flaws-affect-d-link-vpn-routers/17063/</loc>
		<lastmod>2020-12-09T01:29:40+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/warning-critical-remote-hacking-flaws-affect-d-link-vpn-routers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/warning-critical-remote-hacking-flaws-affect-d-link-vpn-routers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/famload/17075/</loc>
		<lastmod>2020-12-09T17:52:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/pldt-smart-prepaid-wifi-famload.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/russian-apt28-hackers-using-covid-19-as-bait-to-deliver-zebrocy-malware/17081/</loc>
		<lastmod>2020-12-10T00:44:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/russian-apt28-hackers-using-covid-19-as-bait-to-deliver-zebrocy-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/russian-apt28-hackers-using-covid-19-as-bait-to-deliver-zebrocy-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/adobe-to-block-flash-content-from-running-on-january-12-2021/17087/</loc>
		<lastmod>2020-12-10T00:46:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/adobe-to-block-flash-content-from-running-on-january-12-2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-the-atheris-python-fuzzer-works/17078/</loc>
		<lastmod>2020-12-10T00:47:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/how-the-atheris-python-fuzzer-works.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/how-the-atheris-python-fuzzer-works.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/how-the-atheris-python-fuzzer-works-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/how-the-atheris-python-fuzzer-works-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/amnesia33-critical-tcp-ip-flaws-affect-millions-of-iot-devices/17084/</loc>
		<lastmod>2020-12-10T01:29:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/amnesia33-critical-tcp-ip-flaws-affect-millions-of-iot-devices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/amnesia33-critical-tcp-ip-flaws-affect-millions-of-iot-devices.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/tech-unicorn-uipath-discloses-data-breach/17102/</loc>
		<lastmod>2020-12-11T00:47:48+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/tech-unicorn-uipath-discloses-data-breach.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/valves-steam-server-bugs-couldve-let-hackers-hijack-online-games/17097/</loc>
		<lastmod>2020-12-11T00:59:42+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/valves-steam-server-bugs-couldve-let-hackers-hijack-online-games.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/valves-steam-server-bugs-couldve-let-hackers-hijack-online-games.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/reflected-xss-in-pagelayer-plugin-affects-over-200000-wordpress-sites/17100/</loc>
		<lastmod>2020-12-11T01:13:44+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/reflected-xss-in-pagelayer-plugin-affects-over-200000-wordpress-sites.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cisco-reissues-patches-for-critical-bugs-in-jabber-video-conferencing-software/17094/</loc>
		<lastmod>2020-12-11T01:18:40+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/cisco-reissues-patches-for-critical-bugs-in-jabber-video-conferencing-software.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/cisco-reissues-patches-for-critical-bugs-in-jabber-video-conferencing-software.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/improving-open-source-security-during-the-google-summer-internship-program/17091/</loc>
		<lastmod>2020-12-11T01:23:35+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/improving-open-source-security-during-the-google-summer-internship-program.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/improving-open-source-security-during-the-google-summer-internship-program.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/improving-open-source-security-during-the-google-summer-internship-program-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/improving-open-source-security-during-the-google-summer-internship-program-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/watch-out-adrozek-malware-hijacking-chrome-firefox-edge-yandex-browsers/17109/</loc>
		<lastmod>2020-12-12T00:54:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/watch-out-adrozek-malware-hijacking-chrome-firefox-edge-yandex-browsers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/watch-out-adrozek-malware-hijacking-chrome-firefox-edge-yandex-browsers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mount-locker-ransomware-offering-double-extortion-scheme-to-other-hackers/17106/</loc>
		<lastmod>2020-12-12T01:08:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/mount-locker-ransomware-offering-double-extortion-scheme-to-other-hackers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/mount-locker-ransomware-offering-double-extortion-scheme-to-other-hackers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-98-how-application-passwords-work-in-wordpress-5-6/17112/</loc>
		<lastmod>2020-12-12T01:13:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/episode-98-how-application-passwords-work-in-wordpress-5-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/zero-day-in-wordpress-smtp-plugin-abused-to-reset-admin-account-passwords/17114/</loc>
		<lastmod>2020-12-12T01:23:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/zero-day-in-wordpress-smtp-plugin-abused-to-reset-admin-account-passwords.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/governance-considerations-for-democratizing-your-organizations-data-in-2021/17116/</loc>
		<lastmod>2020-12-13T01:16:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/governance-considerations-for-democratizing-your-organizations-data-in-2021.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/governance-considerations-for-democratizing-your-organizations-data-in-2021.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mastercard-visa-cut-card-payment-ties-with-pornhub-over-child-abuse-illegal-content-allegations/17122/</loc>
		<lastmod>2020-12-13T01:28:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/mastercard-visa-cut-card-payment-ties-with-pornhub-over-child-abuse-illegal-content-allegations.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/facebook-tracks-apt32-oceanlotus-hackers-to-it-company-in-vietnam/17119/</loc>
		<lastmod>2020-12-13T01:45:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/facebook-tracks-apt32-oceanlotus-hackers-to-it-company-in-vietnam.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/facebook-tracks-apt32-oceanlotus-hackers-to-it-company-in-vietnam.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/pgminer-botnet-attacks-weakly-secured-postgresql-databases/17130/</loc>
		<lastmod>2020-12-14T01:28:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/pgminer-botnet-attacks-weakly-secured-postgresql-databases.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/48-u-s-states-and-ftc-are-suing-facebook-for-illegal-monopolization/17127/</loc>
		<lastmod>2020-12-14T01:35:48+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/48-u-s-states-and-ftc-are-suing-facebook-for-illegal-monopolization.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/48-u-s-states-and-ftc-are-suing-facebook-for-illegal-monopolization.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/aws-cisco-and-comptia-exam-prep-get-22-courses-for-4-50-each/17124/</loc>
		<lastmod>2020-12-14T01:53:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/aws-cisco-and-comptia-exam-prep-get-22-courses-for-4-50-each.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/aws-cisco-and-comptia-exam-prep-get-22-courses-for-4-50-each.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/us-agencies-and-fireeye-were-hacked-using-solarwinds-software-backdoor/17137/</loc>
		<lastmod>2020-12-15T01:21:24+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/us-agencies-and-fireeye-were-hacked-using-solarwinds-software-backdoor.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/us-agencies-and-fireeye-were-hacked-using-solarwinds-software-backdoor.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/sorel-20m-a-huge-dataset-of-20-million-malware-samples-released-online/17134/</loc>
		<lastmod>2020-12-15T01:50:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/sorel-20m-a-huge-dataset-of-20-million-malware-samples-released-online.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/sorel-20m-a-huge-dataset-of-20-million-malware-samples-released-online.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/sec-filings-solarwinds-says-18000-customers-were-impacted-by-recent-hack/17140/</loc>
		<lastmod>2020-12-15T01:54:27+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/sec-filings-solarwinds-says-18000-customers-were-impacted-by-recent-hack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-to-quarantine-solarwinds-apps-linked-to-recent-hack-starting-tomorrow/17151/</loc>
		<lastmod>2020-12-16T01:38:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/microsoft-to-quarantine-solarwinds-apps-linked-to-recent-hack-starting-tomorrow.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/introducing-learn-wordpress/17143/</loc>
		<lastmod>2020-12-16T01:52:08+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/introducing-learn-wordpress-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/introducing-learn-wordpress.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/download-the-essential-guide-to-response-automation/17148/</loc>
		<lastmod>2020-12-16T01:58:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/download-the-essential-guide-to-response-automation.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/download-the-essential-guide-to-response-automation.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wormable-gitpaste-12-botnet-returns-to-target-linux-servers-iot-devices/17145/</loc>
		<lastmod>2020-12-16T02:17:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/wormable-gitpaste-12-botnet-returns-to-target-linux-servers-iot-devices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/wormable-gitpaste-12-botnet-returns-to-target-linux-servers-iot-devices.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/outing-of-fsb-hit-squad-highlights-russias-data-security-problem/17153/</loc>
		<lastmod>2020-12-17T01:40:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/outing-of-fsb-hit-squad-highlights-russias-data-security-problem-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fbi-says-doppelpaymer-ransomware-gang-is-harassing-victims-who-refuse-to-pay/17161/</loc>
		<lastmod>2020-12-17T01:43:41+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/fbi-says-doppelpaymer-ransomware-gang-is-harassing-victims-who-refuse-to-pay.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-evidence-suggests-solarwinds-codebase-was-hacked-to-inject-backdoor/17155/</loc>
		<lastmod>2020-12-17T01:55:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/new-evidence-suggests-solarwinds-codebase-was-hacked-to-inject-backdoor.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/new-evidence-suggests-solarwinds-codebase-was-hacked-to-inject-backdoor.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ransomware-attackers-using-systembc-malware-with-rat-and-tor-proxy/17158/</loc>
		<lastmod>2020-12-17T02:05:38+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/ransomware-attackers-using-systembc-malware-with-rat-and-tor-proxy.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/ransomware-attackers-using-systembc-malware-with-rat-and-tor-proxy.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/software-supply-chain-attack-hits-vietnam-government-certification-authority/17167/</loc>
		<lastmod>2020-12-18T01:52:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/software-supply-chain-attack-hits-vietnam-government-certification-authority.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/software-supply-chain-attack-hits-vietnam-government-certification-authority.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-to-use-password-length-to-set-best-password-expiration-policy/17164/</loc>
		<lastmod>2020-12-18T01:56:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/how-to-use-password-length-to-set-best-password-expiration-policy.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/how-to-use-password-length-to-set-best-password-expiration-policy.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-challenging-exploit-the-contact-form-7-file-upload-vulnerability/17170/</loc>
		<lastmod>2020-12-18T02:01:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/a-challenging-exploit-the-contact-form-7-file-upload-vulnerability.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-was-also-breached-in-recent-solarwinds-supply-chain-hack-report/17172/</loc>
		<lastmod>2020-12-18T02:05:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/microsoft-was-also-breached-in-recent-solarwinds-supply-chain-hack-report.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/apple-google-microsoft-and-mozilla-ban-kazakhstans-mitm-https-certificate/17183/</loc>
		<lastmod>2020-12-19T01:53:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/apple-google-microsoft-and-mozilla-ban-kazakhstans-mitm-https-certificate.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-5g-network-flaws-let-attackers-track-users-locations-and-steal-data/17178/</loc>
		<lastmod>2020-12-19T02:03:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/new-5g-network-flaws-let-attackers-track-users-locations-and-steal-data.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/new-5g-network-flaws-let-attackers-track-users-locations-and-steal-data.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-99-solarwinds-supply-chain-attack-affects-government-and-fortune-500-businesses/17181/</loc>
		<lastmod>2020-12-19T02:04:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/episode-99-solarwinds-supply-chain-attack-affects-government-and-fortune-500-businesses.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-says-its-systems-were-also-breached-in-massive-solarwinds-hack/17175/</loc>
		<lastmod>2020-12-19T02:23:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/microsoft-says-its-systems-were-also-breached-in-massive-solarwinds-hack.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/microsoft-says-its-systems-were-also-breached-in-massive-solarwinds-hack.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/firefox-to-ship-network-partitioning-as-a-new-anti-tracking-defense/17194/</loc>
		<lastmod>2020-12-20T02:06:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/firefox-to-ship-network-partitioning-as-a-new-anti-tracking-defense.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-nonenone-brute-force-attacks-even-hackers-need-qa/17192/</loc>
		<lastmod>2020-12-20T02:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/the-nonenone-brute-force-attacks-even-hackers-need-qa-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/the-nonenone-brute-force-attacks-even-hackers-need-qa.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/the-nonenone-brute-force-attacks-even-hackers-need-qa-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/the-nonenone-brute-force-attacks-even-hackers-need-qa-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/solarwinds-issues-second-hotfix-for-orion-platform-supply-chain-attack/17189/</loc>
		<lastmod>2020-12-20T02:10:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/solarwinds-issues-second-hotfix-for-orion-platform-supply-chain-attack.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/solarwinds-issues-second-hotfix-for-orion-platform-supply-chain-attack.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/what-is-geocoding-how-to-find-coordinates-of-an-address/17186/</loc>
		<lastmod>2020-12-20T02:32:08+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/what-is-geocoding-how-to-find-coordinates-of-an-address.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/what-is-geocoding-how-to-find-coordinates-of-an-address.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/iphones-vulnerable-to-hacking-tool-for-months-researchers-say/17197/</loc>
		<lastmod>2020-12-21T01:48:40+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/iphones-vulnerable-to-hacking-tool-for-months-researchers-say.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/nearly-18000-solarwinds-customers-installed-backdoored-software/17199/</loc>
		<lastmod>2020-12-21T02:01:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/nearly-18000-solarwinds-customers-installed-backdoored-software.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/nearly-18000-solarwinds-customers-installed-backdoored-software.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/exfiltrating-data-from-air-gapped-computers-via-wi-fi-signals-without-wi-fi-hardware/17202/</loc>
		<lastmod>2020-12-21T02:01:07+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/exfiltrating-data-from-air-gapped-computers-via-wi-fi-signals-without-wi-fi-hardware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/exfiltrating-data-from-air-gapped-computers-via-wi-fi-signals-without-wi-fi-hardware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/zero-click-ios-zero-day-found-deployed-against-al-jazeera-employees/17205/</loc>
		<lastmod>2020-12-21T02:27:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/zero-click-ios-zero-day-found-deployed-against-al-jazeera-employees.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/two-critical-flaws-cvss-score-10-affect-dell-wyse-thin-client-devices/17209/</loc>
		<lastmod>2020-12-22T02:23:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/two-critical-flaws-cvss-score-10-affect-dell-wyse-thin-client-devices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/two-critical-flaws-cvss-score-10-affect-dell-wyse-thin-client-devices.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/common-security-misconfigurations-and-their-consequences/17212/</loc>
		<lastmod>2020-12-22T02:40:28+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/common-security-misconfigurations-and-their-consequences.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/common-security-misconfigurations-and-their-consequences.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-google-cisco-and-others-file-amicus-brief-in-support-of-facebooks-nso-lawsuit/17215/</loc>
		<lastmod>2020-12-22T02:48:32+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/microsoft-google-cisco-and-others-file-amicus-brief-in-support-of-facebooks-nso-lawsuit.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-second-hacker-group-may-have-also-breached-solarwinds-microsoft-says/17221/</loc>
		<lastmod>2020-12-23T02:45:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/a-second-hacker-group-may-have-also-breached-solarwinds-microsoft-says.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/a-second-hacker-group-may-have-also-breached-solarwinds-microsoft-says.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cybercriminals-favorite-bulletproof-vpn-service-shuts-down-in-global-action/17218/</loc>
		<lastmod>2020-12-23T02:53:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/cybercriminals-favorite-bulletproof-vpn-service-shuts-down-in-global-action.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/cybercriminals-favorite-bulletproof-vpn-service-shuts-down-in-global-action.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/law-enforcement-take-down-three-bulletproof-vpn-providers/17224/</loc>
		<lastmod>2020-12-23T03:01:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/law-enforcement-take-down-three-bulletproof-vpn-providers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/data-breach-hits-30000-signed-up-to-workplace-pensions-provider/17226/</loc>
		<lastmod>2020-12-24T02:25:47+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/data-breach-hits-30000-signed-up-to-workplace-pensions-provider.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/dhs-warns-against-using-chinese-hardware-and-digital-services/17236/</loc>
		<lastmod>2020-12-24T02:35:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/dhs-warns-against-using-chinese-hardware-and-digital-services.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/law-enforcement-seizes-jokers-stash-stolen-credit-card-marketplace/17231/</loc>
		<lastmod>2020-12-24T02:41:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/law-enforcement-seizes-jokers-stash-stolen-credit-card-marketplace.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/law-enforcement-seizes-jokers-stash-stolen-credit-card-marketplace.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/solarwinds-and-supply-chain-attacks-could-it-happen-to-wordpress/17234/</loc>
		<lastmod>2020-12-24T02:56:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/solarwinds-and-supply-chain-attacks-could-it-happen-to-wordpress.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-to-defend-against-malware-phishing-and-scams-during-covid-19-crisis/17228/</loc>
		<lastmod>2020-12-24T03:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/how-to-defend-against-malware-phishing-and-scams-during-covid-19-crisis.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/how-to-defend-against-malware-phishing-and-scams-during-covid-19-crisis.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/north-korean-hackers-trying-to-steal-covid-19-vaccine-research/17241/</loc>
		<lastmod>2020-12-25T02:39:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/north-korean-hackers-trying-to-steal-covid-19-vaccine-research.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/north-korean-hackers-trying-to-steal-covid-19-vaccine-research.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/who-attacked-solarwinds-and-why-wordpress-users-need-to-know/17244/</loc>
		<lastmod>2020-12-25T02:44:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/who-attacked-solarwinds-and-why-wordpress-users-need-to-know-17.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/who-attacked-solarwinds-and-why-wordpress-users-need-to-know.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/who-attacked-solarwinds-and-why-wordpress-users-need-to-know-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/who-attacked-solarwinds-and-why-wordpress-users-need-to-know-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/who-attacked-solarwinds-and-why-wordpress-users-need-to-know-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/who-attacked-solarwinds-and-why-wordpress-users-need-to-know-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/who-attacked-solarwinds-and-why-wordpress-users-need-to-know-5.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/russian-crypto-exchange-livecoin-hacked-after-it-lost-control-of-its-servers/17246/</loc>
		<lastmod>2020-12-25T02:45:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/russian-crypto-exchange-livecoin-hacked-after-it-lost-control-of-its-servers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-discloses-poorly-patched-now-unpatched-windows-0-day-bug/17238/</loc>
		<lastmod>2020-12-25T02:49:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/google-discloses-poorly-patched-now-unpatched-windows-0-day-bug.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/google-discloses-poorly-patched-now-unpatched-windows-0-day-bug.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/attackers-abusing-citrix-netscaler-devices-to-launch-amplified-ddos-attacks/17252/</loc>
		<lastmod>2020-12-26T02:51:07+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/attackers-abusing-citrix-netscaler-devices-to-launch-amplified-ddos-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/attackers-abusing-citrix-netscaler-devices-to-launch-amplified-ddos-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/citrix-devices-are-being-abused-as-ddos-attack-vectors/17255/</loc>
		<lastmod>2020-12-26T03:01:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/citrix-devices-are-being-abused-as-ddos-attack-vectors.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-warns-crowdstrike-of-hackers-targeting-azure-cloud-customers/17249/</loc>
		<lastmod>2020-12-26T03:15:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/microsoft-warns-crowdstrike-of-hackers-targeting-azure-cloud-customers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/microsoft-warns-crowdstrike-of-hackers-targeting-azure-cloud-customers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-and-mcafee-headline-newly-formed-ransomware-task-force/17263/</loc>
		<lastmod>2020-12-27T03:07:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/microsoft-and-mcafee-headline-newly-formed-ransomware-task-force.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-critical-flaws-in-treck-tcp-ip-stack-affect-millions-of-iot-devices/17260/</loc>
		<lastmod>2020-12-27T03:13:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/new-critical-flaws-in-treck-tcp-ip-stack-affect-millions-of-iot-devices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/new-critical-flaws-in-treck-tcp-ip-stack-affect-millions-of-iot-devices.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/police-arrest-21-weleakinfo-customers-who-bought-breached-personal-data/17257/</loc>
		<lastmod>2020-12-27T03:26:47+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/police-arrest-21-weleakinfo-customers-who-bought-breached-personal-data.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/police-arrest-21-weleakinfo-customers-who-bought-breached-personal-data.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/partial-lists-of-organizations-infected-with-sunburst-malware-released-online/17271/</loc>
		<lastmod>2020-12-28T02:49:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/partial-lists-of-organizations-infected-with-sunburst-malware-released-online.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/iphones-of-36-journalists-hacked-using-imessage-zero-click-exploit/17268/</loc>
		<lastmod>2020-12-28T03:01:23+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/iphones-of-36-journalists-hacked-using-imessage-zero-click-exploit.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/iphones-of-36-journalists-hacked-using-imessage-zero-click-exploit.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-new-solarwinds-flaw-likely-had-let-hackers-install-supernova-malware/17265/</loc>
		<lastmod>2020-12-28T03:41:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/a-new-solarwinds-flaw-likely-had-let-hackers-install-supernova-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/a-new-solarwinds-flaw-likely-had-let-hackers-install-supernova-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/finland-says-hackers-accessed-mps-emails-accounts/17275/</loc>
		<lastmod>2020-12-29T03:03:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/finland-says-hackers-accessed-mps-emails-accounts.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fbi-pranksters-are-hijacking-smart-devices-to-live-stream-swatting-incidents/17283/</loc>
		<lastmod>2020-12-30T03:12:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/fbi-pranksters-are-hijacking-smart-devices-to-live-stream-swatting-incidents.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-google-docs-bug-could-have-allowed-hackers-see-your-private-documents/17277/</loc>
		<lastmod>2020-12-30T03:23:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/a-google-docs-bug-could-have-allowed-hackers-see-your-private-documents.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/a-google-docs-bug-could-have-allowed-hackers-see-your-private-documents.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/autohotkey-based-password-stealer-targeting-us-canadian-banking-users/17280/</loc>
		<lastmod>2020-12-30T03:53:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/autohotkey-based-password-stealer-targeting-us-canadian-banking-users.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/autohotkey-based-password-stealer-targeting-us-canadian-banking-users.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cisa-updates-solarwinds-guidance-tells-us-govt-agencies-to-update-right-away/17285/</loc>
		<lastmod>2020-12-31T03:45:32+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/12/cisa-updates-solarwinds-guidance-tells-us-govt-agencies-to-update-right-away.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/solarwinds-hackers-accessed-microsoft-source-code/17287/</loc>
		<lastmod>2021-01-01T04:05:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/solarwinds-hackers-accessed-microsoft-source-code.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-says-solarwinds-hackers-accessed-some-of-its-source-code/17293/</loc>
		<lastmod>2021-01-02T03:25:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/microsoft-says-solarwinds-hackers-accessed-some-of-its-source-code.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/microsoft-says-solarwinds-hackers-accessed-some-of-its-source-code.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/secret-backdoor-account-found-in-several-zyxel-firewall-vpn-products/17290/</loc>
		<lastmod>2021-01-02T04:00:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/secret-backdoor-account-found-in-several-zyxel-firewall-vpn-products.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/secret-backdoor-account-found-in-several-zyxel-firewall-vpn-products.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fbi-swatters-are-hijacking-smart-devices-to-live-stream-swatting-incidents/17296/</loc>
		<lastmod>2021-01-02T04:09:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/fbi-swatters-are-hijacking-smart-devices-to-live-stream-swatting-incidents.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ticketmaster-to-pay-10-million-fine-for-hacking-a-rival-company/17298/</loc>
		<lastmod>2021-01-03T03:47:50+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/ticketmaster-to-pay-10-million-fine-for-hacking-a-rival-company.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/ticketmaster-to-pay-10-million-fine-for-hacking-a-rival-company.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/backdoor-account-discovered-in-more-than-100000-zyxel-firewalls-vpn-gateways/17301/</loc>
		<lastmod>2021-01-03T04:05:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/backdoor-account-discovered-in-more-than-100000-zyxel-firewalls-vpn-gateways.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/vietnam-targeted-in-complex-supply-chain-attack/17303/</loc>
		<lastmod>2021-01-04T04:33:35+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/vietnam-targeted-in-complex-supply-chain-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/solarwinds-the-more-we-learn-the-worse-it-looks/17311/</loc>
		<lastmod>2021-01-05T03:52:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/solarwinds-the-more-we-learn-the-worse-it-looks.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/british-court-rejects-u-s-request-to-extradite-wikileaks-julian-assange/17308/</loc>
		<lastmod>2021-01-05T04:12:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/british-court-rejects-u-s-request-to-extradite-wikileaks-julian-assange.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/british-court-rejects-u-s-request-to-extradite-wikileaks-julian-assange.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-december-2020/17313/</loc>
		<lastmod>2021-01-06T04:04:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/the-month-in-wordpress-december-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/healthcare-industry-witnessed-45-spike-in-cyber-attacks-since-nov-20/17318/</loc>
		<lastmod>2021-01-06T04:07:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/healthcare-industry-witnessed-45-spike-in-cyber-attacks-since-nov-20.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/healthcare-industry-witnessed-45-spike-in-cyber-attacks-since-nov-20.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/us-government-formally-blames-russia-for-solarwinds-hack/17321/</loc>
		<lastmod>2021-01-06T04:40:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/us-government-formally-blames-russia-for-solarwinds-hack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/warning-cross-platform-electrorat-malware-targeting-cryptocurrency-users/17315/</loc>
		<lastmod>2021-01-06T04:44:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/warning-cross-platform-electrorat-malware-targeting-cryptocurrency-users.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/warning-cross-platform-electrorat-malware-targeting-cryptocurrency-users.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/whatsapp-will-delete-your-account-if-you-dont-agree-sharing-data-with-facebook/17328/</loc>
		<lastmod>2021-01-07T03:59:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/whatsapp-will-delete-your-account-if-you-dont-agree-sharing-data-with-facebook.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/whatsapp-will-delete-your-account-if-you-dont-agree-sharing-data-with-facebook.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-using-fake-trumps-scandal-video-to-spread-qnode-malware/17325/</loc>
		<lastmod>2021-01-07T04:04:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/hackers-using-fake-trumps-scandal-video-to-spread-qnode-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/hackers-using-fake-trumps-scandal-video-to-spread-qnode-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/jetbrains-denies-being-involved-in-solarwinds-hack/17331/</loc>
		<lastmod>2021-01-07T04:27:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/jetbrains-denies-being-involved-in-solarwinds-hack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-side-channel-attack-can-recover-encryption-keys-from-google-titan-security-keys/17339/</loc>
		<lastmod>2021-01-08T04:17:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/new-side-channel-attack-can-recover-encryption-keys-from-google-titan-security-keys.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/creating-a-strong-password-policy-with-specops-and-nist-guidelines/17333/</loc>
		<lastmod>2021-01-08T04:51:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/creating-a-strong-password-policy-with-specops-and-nist-guidelines.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/creating-a-strong-password-policy-with-specops-and-nist-guidelines.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/solarwinds-hackers-also-accessed-u-s-justice-departments-email-server/17336/</loc>
		<lastmod>2021-01-08T04:51:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/solarwinds-hackers-also-accessed-u-s-justice-departments-email-server.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/solarwinds-hackers-also-accessed-u-s-justice-departments-email-server.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/alert-north-korean-hackers-targeting-south-korea-with-rokrat-trojan/17346/</loc>
		<lastmod>2021-01-09T04:02:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/alert-north-korean-hackers-targeting-south-korea-with-rokrat-trojan.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/alert-north-korean-hackers-targeting-south-korea-with-rokrat-trojan.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-attack-could-let-hackers-clone-your-google-titan-2fa-security-keys/17343/</loc>
		<lastmod>2021-01-09T04:25:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/new-attack-could-let-hackers-clone-your-google-titan-2fa-security-keys.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/new-attack-could-let-hackers-clone-your-google-titan-2fa-security-keys.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-removes-parler-app-from-play-store/17349/</loc>
		<lastmod>2021-01-09T04:56:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/google-removes-parler-app-from-play-store.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/whatsapp-will-disable-your-account-if-you-dont-agree-sharing-data-with-facebook/17354/</loc>
		<lastmod>2021-01-10T04:10:28+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/whatsapp-will-disable-your-account-if-you-dont-agree-sharing-data-with-facebook.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/whatsapp-will-disable-your-account-if-you-dont-agree-sharing-data-with-facebook.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/some-ransomware-gangs-are-going-after-top-execs-to-pressure-companies-into-paying/17357/</loc>
		<lastmod>2021-01-10T04:39:30+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/some-ransomware-gangs-are-going-after-top-execs-to-pressure-companies-into-paying.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-does-your-ad-password-policy-compare-to-nists-password-recommendations/17351/</loc>
		<lastmod>2021-01-10T04:46:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/how-does-your-ad-password-policy-compare-to-nists-password-recommendations.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/how-does-your-ad-password-policy-compare-to-nists-password-recommendations.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fbi-cisa-nsa-officially-blame-russia-for-solarwinds-cyber-attack/17359/</loc>
		<lastmod>2021-01-11T04:43:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/fbi-cisa-nsa-officially-blame-russia-for-solarwinds-cyber-attack.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/fbi-cisa-nsa-officially-blame-russia-for-solarwinds-cyber-attack.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-speech-to-text-api-can-help-attackers-easily-bypass-google-recaptcha/17362/</loc>
		<lastmod>2021-01-11T05:02:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/google-speech-to-text-api-can-help-attackers-easily-bypass-google-recaptcha.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/google-speech-to-text-api-can-help-attackers-easily-bypass-google-recaptcha.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets/17365/</loc>
		<lastmod>2021-01-11T05:13:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/cisa-solarwinds-hackers-also-used-password-guessing-to-breach-targets.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/global-cyber-espionage-campaign-linked-to-russian-spying-tools/17370/</loc>
		<lastmod>2021-01-12T04:29:27+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/global-cyber-espionage-campaign-linked-to-russian-spying-tools.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-find-links-between-sunburst-and-russian-kazuar-malware/17372/</loc>
		<lastmod>2021-01-12T04:30:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/researchers-find-links-between-sunburst-and-russian-kazuar-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/researchers-find-links-between-sunburst-and-russian-kazuar-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/russian-hacker-gets-12-years-prison-for-massive-jp-morgan-chase-hack/17375/</loc>
		<lastmod>2021-01-12T04:49:48+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/russian-hacker-gets-12-years-prison-for-massive-jp-morgan-chase-hack.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/russian-hacker-gets-12-years-prison-for-massive-jp-morgan-chase-hack.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/third-malware-strain-discovered-in-solarwinds-supply-chain-attack/17378/</loc>
		<lastmod>2021-01-12T04:50:50+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/third-malware-strain-discovered-in-solarwinds-supply-chain-attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-reveals-sophisticated-windows-and-android-hacking-operation/17390/</loc>
		<lastmod>2021-01-13T04:32:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/google-reveals-sophisticated-windows-and-android-hacking-operation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/multiple-vulnerabilities-patched-in-orbit-fox-by-themeisle-plugin/17388/</loc>
		<lastmod>2021-01-13T04:43:48+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/multiple-vulnerabilities-patched-in-orbit-fox-by-themeisle-plugin-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/multiple-vulnerabilities-patched-in-orbit-fox-by-themeisle-plugin.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/multiple-vulnerabilities-patched-in-orbit-fox-by-themeisle-plugin-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/warning-5-new-trojanized-android-apps-spying-on-users-in-pakistan/17382/</loc>
		<lastmod>2021-01-13T05:01:44+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/warning-5-new-trojanized-android-apps-spying-on-users-in-pakistan.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/warning-5-new-trojanized-android-apps-spying-on-users-in-pakistan.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/experts-sound-alarm-on-new-android-malware-sold-on-hacking-forums/17385/</loc>
		<lastmod>2021-01-13T05:04:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/experts-sound-alarm-on-new-android-malware-sold-on-hacking-forums.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/experts-sound-alarm-on-new-android-malware-sold-on-hacking-forums.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/iranian-cyberspies-behind-major-christmas-sms-spear-phishing-campaign/17400/</loc>
		<lastmod>2021-01-14T04:56:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/iranian-cyberspies-behind-major-christmas-sms-spear-phishing-campaign.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/intel-adds-hardware-enabled-ransomware-detection-to-11th-gen-vpro-chips/17394/</loc>
		<lastmod>2021-01-14T05:04:45+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/intel-adds-hardware-enabled-ransomware-detection-to-11th-gen-vpro-chips.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/intel-adds-hardware-enabled-ransomware-detection-to-11th-gen-vpro-chips.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/buyers-guide-for-securing-internal-environment-with-a-small-cybersecurity-team/17397/</loc>
		<lastmod>2021-01-14T05:06:50+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/buyers-guide-for-securing-internal-environment-with-a-small-cybersecurity-team.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/buyers-guide-for-securing-internal-environment-with-a-small-cybersecurity-team.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/nsa-warns-against-using-doh-inside-enterprise-networks/17408/</loc>
		<lastmod>2021-01-15T04:54:23+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/nsa-warns-against-using-doh-inside-enterprise-networks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/experts-uncover-malware-attacks-against-colombian-government-and-companies/17402/</loc>
		<lastmod>2021-01-15T05:16:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/experts-uncover-malware-attacks-against-colombian-government-and-companies.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/experts-uncover-malware-attacks-against-colombian-government-and-companies.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/authorities-take-down-worlds-largest-illegal-dark-web-marketplace/17405/</loc>
		<lastmod>2021-01-15T05:20:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/authorities-take-down-worlds-largest-illegal-dark-web-marketplace.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/authorities-take-down-worlds-largest-illegal-dark-web-marketplace.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-steal-mimecast-certificate-used-to-securely-connect-with-microsoft-365/17415/</loc>
		<lastmod>2021-01-16T04:51:48+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/hackers-steal-mimecast-certificate-used-to-securely-connect-with-microsoft-365.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/hackers-steal-mimecast-certificate-used-to-securely-connect-with-microsoft-365.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/iconic-bugtraq-security-mailing-list-shuts-down-after-27-years/17420/</loc>
		<lastmod>2021-01-16T05:08:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/iconic-bugtraq-security-mailing-list-shuts-down-after-27-years.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-100-how-to-lose-6-figures-the-easy-way/17418/</loc>
		<lastmod>2021-01-16T05:16:50+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/episode-100-how-to-lose-6-figures-the-easy-way.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-disclose-undocumented-chinese-malware-used-in-recent-attacks/17412/</loc>
		<lastmod>2021-01-16T05:32:47+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/researchers-disclose-undocumented-chinese-malware-used-in-recent-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/researchers-disclose-undocumented-chinese-malware-used-in-recent-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/whatsapp-delays-controversial-data-sharing-privacy-policy-update-by-3-months/17422/</loc>
		<lastmod>2021-01-17T04:52:27+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/whatsapp-delays-controversial-data-sharing-privacy-policy-update-by-3-months.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/whatsapp-delays-controversial-data-sharing-privacy-policy-update-by-3-months.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/duckduckgo-surpasses-100-million-daily-search-queries-for-the-first-time/17428/</loc>
		<lastmod>2021-01-17T05:21:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/duckduckgo-surpasses-100-million-daily-search-queries-for-the-first-time.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/nsa-suggests-enterprises-use-designated-dns-over-https-resolvers/17425/</loc>
		<lastmod>2021-01-17T05:42:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/nsa-suggests-enterprises-use-designated-dns-over-https-resolvers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/nsa-suggests-enterprises-use-designated-dns-over-https-resolvers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-issues-patches-for-defender-zero-day-and-82-other-windows-flaws/17433/</loc>
		<lastmod>2021-01-18T05:09:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/microsoft-issues-patches-for-defender-zero-day-and-82-other-windows-flaws.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/microsoft-issues-patches-for-defender-zero-day-and-82-other-windows-flaws.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/jokers-stash-the-internets-largest-carding-forum-is-shutting-down/17436/</loc>
		<lastmod>2021-01-18T05:23:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/jokers-stash-the-internets-largest-carding-forum-is-shutting-down.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/jokers-stash-the-largest-carding-marketplace-announces-shutdown/17430/</loc>
		<lastmod>2021-01-18T05:44:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/jokers-stash-the-largest-carding-marketplace-announces-shutdown.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/jokers-stash-the-largest-carding-marketplace-announces-shutdown.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/uncovering-potential-issues-with-the-contact-form-7-vulnerability-more-data-needed/17445/</loc>
		<lastmod>2021-01-19T05:00:08+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/uncovering-potential-issues-with-the-contact-form-7-vulnerability-more-data-needed.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/unveiled-sunspot-malware-was-used-to-inject-solarwinds-backdoor/17442/</loc>
		<lastmod>2021-01-19T05:11:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/unveiled-sunspot-malware-was-used-to-inject-solarwinds-backdoor.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/unveiled-sunspot-malware-was-used-to-inject-solarwinds-backdoor.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/openwrt-reports-data-breach-after-hacker-gained-access-to-forum-admin-account/17447/</loc>
		<lastmod>2021-01-19T05:20:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/openwrt-reports-data-breach-after-hacker-gained-access-to-forum-admin-account.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/apple-removes-macos-feature-that-allowed-apps-to-bypass-firewall-security/17439/</loc>
		<lastmod>2021-01-19T05:42:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/apple-removes-macos-feature-that-allowed-apps-to-bypass-firewall-security.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/apple-removes-macos-feature-that-allowed-apps-to-bypass-firewall-security.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-year-new-password-protections-in-chrome/17449/</loc>
		<lastmod>2021-01-20T04:59:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/new-year-new-password-protections-in-chrome-5.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/new-year-new-password-protections-in-chrome.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/new-year-new-password-protections-in-chrome-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/new-year-new-password-protections-in-chrome-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/new-year-new-password-protections-in-chrome-3.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/malwarebytes-said-it-was-hacked-by-the-same-group-who-breached-solarwinds/17458/</loc>
		<lastmod>2021-01-20T05:15:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/malwarebytes-said-it-was-hacked-by-the-same-group-who-breached-solarwinds.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/solarwinds-hackers-also-breached-malwarebytes-cybersecurity-firm/17452/</loc>
		<lastmod>2021-01-20T05:51:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/solarwinds-hackers-also-breached-malwarebytes-cybersecurity-firm.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/solarwinds-hackers-also-breached-malwarebytes-cybersecurity-firm.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-discover-raindrop-4th-malware-linked-to-the-solarwinds-attack/17455/</loc>
		<lastmod>2021-01-20T06:00:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/researchers-discover-raindrop-4th-malware-linked-to-the-solarwinds-attack.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/researchers-discover-raindrop-4th-malware-linked-to-the-solarwinds-attack.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/nsa-urges-system-administrators-to-replace-obsolete-tls-protocols/17468/</loc>
		<lastmod>2021-01-21T05:38:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/nsa-urges-system-administrators-to-replace-obsolete-tls-protocols.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-details-patched-bugs-in-signal-fb-messenger-jiochat-apps/17462/</loc>
		<lastmod>2021-01-21T05:45:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/google-details-patched-bugs-in-signal-fb-messenger-jiochat-apps.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/google-details-patched-bugs-in-signal-fb-messenger-jiochat-apps.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-set-of-severe-flaws-affect-popular-dnsmasq-dns-forwarder/17465/</loc>
		<lastmod>2021-01-21T06:06:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/a-set-of-severe-flaws-affect-popular-dnsmasq-dns-forwarder.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/a-set-of-severe-flaws-affect-popular-dnsmasq-dns-forwarder.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mrbminer-crypto-mining-malware-links-to-iranian-software-company/17477/</loc>
		<lastmod>2021-01-22T12:58:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/mrbminer-crypto-mining-malware-links-to-iranian-software-company.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/mrbminer-crypto-mining-malware-links-to-iranian-software-company.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/announcing-free-site-cleaning-site-security-audits-for-k-12-public-schools/17483/</loc>
		<lastmod>2021-01-22T13:01:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/announcing-free-site-cleaning-site-security-audits-for-k-12-public-schools.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/qnap-warns-users-of-a-new-crypto-miner-named-dovecat-infecting-their-devices/17485/</loc>
		<lastmod>2021-01-22T13:18:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/qnap-warns-users-of-a-new-crypto-miner-named-dovecat-infecting-their-devices.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/people-of-wordpress-thelma-mutete/17475/</loc>
		<lastmod>2021-01-22T13:29:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/people-of-wordpress-thelma-mutete.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/people-of-wordpress-thelma-mutete.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/malware-reportedly-found-on-laptops-given-to-children-in-england/17473/</loc>
		<lastmod>2021-01-22T13:34:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/malware-reportedly-found-on-laptops-given-to-children-in-england.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/heres-how-solarwinds-hackers-stayed-undetected-for-long-enough/17480/</loc>
		<lastmod>2021-01-22T13:53:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/heres-how-solarwinds-hackers-stayed-undetected-for-long-enough.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/heres-how-solarwinds-hackers-stayed-undetected-for-long-enough.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/smart-giga-video-giga-games-giga-work-giga-music-giga-stories/16974/</loc>
		<lastmod>2021-01-22T19:00:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2020/05/smart-prepaid-giga-video-offers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-101-supporting-remote-students-with-free-site-audits-cleanings/17497/</loc>
		<lastmod>2021-01-23T13:18:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/episode-101-supporting-remote-students-with-free-site-audits-cleanings.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/experts-detail-a-recent-remotely-exploitable-windows-vulnerability/17491/</loc>
		<lastmod>2021-01-23T13:27:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/experts-detail-a-recent-remotely-exploitable-windows-vulnerability.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/experts-detail-a-recent-remotely-exploitable-windows-vulnerability.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/beware-fully-functional-released-online-for-sap-solution-manager-flaw/17494/</loc>
		<lastmod>2021-01-23T13:30:28+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/beware-fully-functional-released-online-for-sap-solution-manager-flaw.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/beware-fully-functional-released-online-for-sap-solution-manager-flaw.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/sonicwall-says-it-was-hacked-using-zero-days-in-its-own-products/17499/</loc>
		<lastmod>2021-01-23T13:50:32+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/sonicwall-says-it-was-hacked-using-zero-days-in-its-own-products.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/rogue-cctv-technician-spied-on-hundreds-of-customers-during-intimate-moments/17507/</loc>
		<lastmod>2021-01-24T13:24:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/rogue-cctv-technician-spied-on-hundreds-of-customers-during-intimate-moments.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/beware-fully-functional-exploit-released-online-for-sap-solution-manager-flaw/17501/</loc>
		<lastmod>2021-01-24T13:35:38+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/beware-fully-functional-exploit-released-online-for-sap-solution-manager-flaw.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/beware-fully-functional-exploit-released-online-for-sap-solution-manager-flaw.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/exclusive-sonicwall-hacked-using-0-day-bugs-in-its-own-vpn-product/17504/</loc>
		<lastmod>2021-01-24T13:59:40+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/exclusive-sonicwall-hacked-using-0-day-bugs-in-its-own-vpn-product.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/exclusive-sonicwall-hacked-using-0-day-bugs-in-its-own-vpn-product.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/pen-testing-by-numbers-tracking-pen-testing-trends-and-challenges/17518/</loc>
		<lastmod>2021-01-25T13:40:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/pen-testing-by-numbers-tracking-pen-testing-trends-and-challenges.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/pen-testing-by-numbers-tracking-pen-testing-trends-and-challenges.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/dreambus-botnet-targets-enterprise-apps-running-on-linux-servers/17521/</loc>
		<lastmod>2021-01-25T13:51:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/dreambus-botnet-targets-enterprise-apps-running-on-linux-servers.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/beware-a-new-wormable-android-malware-spreading-through-whatsapp/17515/</loc>
		<lastmod>2021-01-25T13:57:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/beware-a-new-wormable-android-malware-spreading-through-whatsapp.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/beware-a-new-wormable-android-malware-spreading-through-whatsapp.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/insurers-funding-organised-crime-by-paying-ransomware-claims/17513/</loc>
		<lastmod>2021-01-25T14:00:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/insurers-funding-organised-crime-by-paying-ransomware-claims.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-north-korean-hackers-have-targeted-security-researchers-via-social-media/17530/</loc>
		<lastmod>2021-01-26T13:24:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/google-north-korean-hackers-have-targeted-security-researchers-via-social-media.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/tiktok-bug-could-have-exposed-users-profile-data-and-phone-numbers/17527/</loc>
		<lastmod>2021-01-26T13:25:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/tiktok-bug-could-have-exposed-users-profile-data-and-phone-numbers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/tiktok-bug-could-have-exposed-users-profile-data-and-phone-numbers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/targeted-phishing-attacks-strike-high-ranking-company-executives/17524/</loc>
		<lastmod>2021-01-26T13:28:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/targeted-phishing-attacks-strike-high-ranking-company-executives.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/targeted-phishing-attacks-strike-high-ranking-company-executives.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fake-ico-consultant-sentenced-for-embezzling-cryptocurrency-now-worth-20-million/17539/</loc>
		<lastmod>2021-01-27T13:18:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/fake-ico-consultant-sentenced-for-embezzling-cryptocurrency-now-worth-20-million.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-attack-could-let-remote-hackers-target-devices-on-internal-networks/17533/</loc>
		<lastmod>2021-01-27T13:41:48+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/new-attack-could-let-remote-hackers-target-devices-on-internal-networks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/new-attack-could-let-remote-hackers-target-devices-on-internal-networks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/top-cyber-attacks-of-2020/17536/</loc>
		<lastmod>2021-01-27T14:00:50+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/top-cyber-attacks-of-2020.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/top-cyber-attacks-of-2020.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/authorities-seize-dark-web-site-linked-to-the-netwalker-ransomware/17541/</loc>
		<lastmod>2021-01-28T13:43:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/authorities-seize-dark-web-site-linked-to-the-netwalker-ransomware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/authorities-seize-dark-web-site-linked-to-the-netwalker-ransomware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/pirated-themes-and-plugins-are-the-most-widespread-threat-to-wordpress-sites/17549/</loc>
		<lastmod>2021-01-28T13:43:42+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/pirated-themes-and-plugins-are-the-most-widespread-threat-to-wordpress-sites.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-wordfence-2020-wordpress-threat-report/17547/</loc>
		<lastmod>2021-01-28T13:48:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/the-wordfence-2020-wordpress-threat-report.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/the-wordfence-2020-wordpress-threat-report.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hezbollah-hacker-group-targeted-telecoms-hosting-isps-worldwide/17555/</loc>
		<lastmod>2021-01-29T13:43:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/hezbollah-hacker-group-targeted-telecoms-hosting-isps-worldwide.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/hezbollah-hacker-group-targeted-telecoms-hosting-isps-worldwide.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-cisos-survey-reveals-how-small-cybersecurity-teams-can-confront-2021/17553/</loc>
		<lastmod>2021-01-29T13:50:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/new-cisos-survey-reveals-how-small-cybersecurity-teams-can-confront-2021.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/new-cisos-survey-reveals-how-small-cybersecurity-teams-can-confront-2021.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/electronic-health-records-provider-athena-to-pay-18m-settlement-in-kickback-lawsuit/17557/</loc>
		<lastmod>2021-01-29T14:25:06+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/google-uncovers-new-ios-security-feature-apple-quietly-added-after-zero-day-attacks/17562/</loc>
		<lastmod>2021-01-30T13:43:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/google-uncovers-new-ios-security-feature-apple-quietly-added-after-zero-day-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/google-uncovers-new-ios-security-feature-apple-quietly-added-after-zero-day-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/data-driven-security-hardening-in-android/17560/</loc>
		<lastmod>2021-01-30T13:45:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/data-driven-security-hardening-in-android.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/data-driven-security-hardening-in-android.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/data-driven-security-hardening-in-android-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/data-driven-security-hardening-in-android-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/data-driven-security-hardening-in-android.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/data-driven-security-hardening-in-android-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/data-driven-security-hardening-in-android-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fonixcrypter-ransomware-gang-releases-master-decryption-key/17567/</loc>
		<lastmod>2021-01-30T13:47:07+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/italy-cert-warns-of-a-new-credential-stealing-android-malware/17564/</loc>
		<lastmod>2021-01-30T13:59:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/italy-cert-warns-of-a-new-credential-stealing-android-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/01/italy-cert-warns-of-a-new-credential-stealing-android-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-102-disruption-presents-opportunity/17566/</loc>
		<lastmod>2021-01-30T14:14:04+00:00</lastmod>
	</url>
	<url>
		<loc>https://jeffric.com/warning-issued-over-hackable-adts-lifeshield-home-security-cameras/17574/</loc>
		<lastmod>2021-01-31T19:39:47+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/warning-issued-over-hackable-adts-lifeshield-home-security-cameras.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/warning-issued-over-hackable-adts-lifeshield-home-security-cameras.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-deploys-chrome-mitigations-against-new-nat-slipstreaming-attack/17577/</loc>
		<lastmod>2021-01-31T19:49:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/google-deploys-chrome-mitigations-against-new-nat-slipstreaming-attack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-docker-container-escape-bug-affects-microsoft-azure-functions/17571/</loc>
		<lastmod>2021-01-31T20:26:45+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/new-docker-container-escape-bug-affects-microsoft-azure-functions.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/new-docker-container-escape-bug-affects-microsoft-azure-functions.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-trickbot-module-uses-masscan-for-local-network-reconnaissance/17590/</loc>
		<lastmod>2021-02-01T19:49:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/new-trickbot-module-uses-masscan-for-local-network-reconnaissance.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/live-webinar-major-lessons-to-be-learned-from-top-cyber-attacks-in-2020/17587/</loc>
		<lastmod>2021-02-01T20:01:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/live-webinar-major-lessons-to-be-learned-from-top-cyber-attacks-in-2020.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/live-webinar-major-lessons-to-be-learned-from-top-cyber-attacks-in-2020.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-new-software-supply%e2%80%91chain-attack-targeted-millions-with-spyware/17584/</loc>
		<lastmod>2021-02-01T20:03:50+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/a-new-software-supplye28091chain-attack-targeted-millions-with-spyware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/a-new-software-supplye28091chain-attack-targeted-millions-with-spyware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/agent-tesla-malware-spotted-using-new-delivery-evasion-techniques/17593/</loc>
		<lastmod>2021-02-02T19:44:23+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/agent-tesla-malware-spotted-using-new-delivery-evasion-techniques.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/agent-tesla-malware-spotted-using-new-delivery-evasion-techniques.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-funds-project-to-secure-apache-web-server-project-with-new-rust-component/17599/</loc>
		<lastmod>2021-02-02T19:55:28+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/google-funds-project-to-secure-apache-web-server-project-with-new-rust-component.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/data-breach-exposes-1-6-million-jobless-claims-filed-in-the-washington-state/17596/</loc>
		<lastmod>2021-02-02T20:17:24+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/data-breach-exposes-1-6-million-jobless-claims-filed-in-the-washington-state.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/data-breach-exposes-1-6-million-jobless-claims-filed-in-the-washington-state.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/machine-learning-gives-wordfence-an-advantage/17613/</loc>
		<lastmod>2021-02-03T19:41:39+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/machine-learning-gives-wordfence-an-advantage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-january-2021/17605/</loc>
		<lastmod>2021-02-03T19:57:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/the-month-in-wordpress-january-2021.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/3-new-severe-security-vulnerabilities-found-in-solarwinds-software/17610/</loc>
		<lastmod>2021-02-03T20:15:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/3-new-severe-security-vulnerabilities-found-in-solarwinds-software.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/3-new-severe-security-vulnerabilities-found-in-solarwinds-software.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/over-a-dozen-chrome-extensions-caught-hijacking-google-search-results-for-millions/17607/</loc>
		<lastmod>2021-02-03T20:24:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/over-a-dozen-chrome-extensions-caught-hijacking-google-search-results-for-millions.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/over-a-dozen-chrome-extensions-caught-hijacking-google-search-results-for-millions.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/trucking-company-forward-air-said-its-ransomware-incident-cost-it-7-5-million/17615/</loc>
		<lastmod>2021-02-03T20:37:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/trucking-company-forward-air-said-its-ransomware-incident-cost-it-7-5-million.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/know-prevent-fix-a-framework-for-shifting-the-discussion-around-vulnerabilities-in-open-source/17602/</loc>
		<lastmod>2021-02-03T20:40:27+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/know-prevent-fix-a-framework-for-shifting-the-discussion-around-vulnerabilities-in-open-source.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/know-prevent-fix-a-framework-for-shifting-the-discussion-around-vulnerabilities-in-open-source.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/know-prevent-fix-a-framework-for-shifting-the-discussion-around-vulnerabilities-in-open-source-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/know-prevent-fix-a-framework-for-shifting-the-discussion-around-vulnerabilities-in-open-source.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/know-prevent-fix-a-framework-for-shifting-the-discussion-around-vulnerabilities-in-open-source-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/know-prevent-fix-a-framework-for-shifting-the-discussion-around-vulnerabilities-in-open-source-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-6-1-maintenance-release/17621/</loc>
		<lastmod>2021-02-04T19:58:45+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-6-1-maintenance-release.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-paid-6-7-million-to-bug-bounty-hunters-in-2020/17631/</loc>
		<lastmod>2021-02-04T20:24:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/google-paid-6-7-million-to-bug-bounty-hunters-in-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/vulnerability-reward-program-2020-year-in-review/17618/</loc>
		<lastmod>2021-02-04T20:39:40+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/vulnerability-reward-program-2020-year-in-review.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/vulnerability-reward-program-2020-year-in-review.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/vulnerability-reward-program-2020-year-in-review-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/vulnerability-reward-program-2020-year-in-review.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/vulnerability-reward-program-2020-year-in-review-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/vulnerability-reward-program-2020-year-in-review-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-to-audit-password-changes-in-active-directory/17623/</loc>
		<lastmod>2021-02-04T20:44:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/how-to-audit-password-changes-in-active-directory.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/how-to-audit-password-changes-in-active-directory.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/beware-new-matryosh-ddos-botnet-targeting-android-based-devices/17626/</loc>
		<lastmod>2021-02-04T20:44:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/beware-new-matryosh-ddos-botnet-targeting-android-based-devices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/beware-new-matryosh-ddos-botnet-targeting-android-based-devices.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/unpatched-vulnerability-50000-wp-sites-must-find-alternative-for-contact-form-7-style/17629/</loc>
		<lastmod>2021-02-04T20:44:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/unpatched-vulnerability-50000-wp-sites-must-find-alternative-for-contact-form-7-style.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-chrome-sync-feature-can-be-abused-for-cc-and-data-exfiltration/17646/</loc>
		<lastmod>2021-02-05T19:58:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/google-chrome-sync-feature-can-be-abused-for-cc-and-data-exfiltration.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-chrome-browser-0-day-under-active-attack-update-immediately/17643/</loc>
		<lastmod>2021-02-05T20:10:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/new-chrome-browser-0-day-under-active-attack-update-immediately.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/new-chrome-browser-0-day-under-active-attack-update-immediately.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/launching-osv-better-vulnerability-triage-for-open-source/17635/</loc>
		<lastmod>2021-02-05T20:11:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/launching-osv-better-vulnerability-triage-for-open-source.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/launching-osv-better-vulnerability-triage-for-open-source.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/launching-osv-better-vulnerability-triage-for-open-source.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/launching-osv-better-vulnerability-triage-for-open-source.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/launching-osv-better-vulnerability-triage-for-open-source-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/launching-osv-better-vulnerability-triage-for-open-source-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-flaws-reported-in-cisco-vpn-routers-for-businesses-patch-asap/17640/</loc>
		<lastmod>2021-02-05T20:37:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/critical-flaws-reported-in-cisco-vpn-routers-for-businesses-patch-asap.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/critical-flaws-reported-in-cisco-vpn-routers-for-businesses-patch-asap.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-7-beta-1/17638/</loc>
		<lastmod>2021-02-05T20:50:07+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-7-beta-1-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-7-beta-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-7-beta-1-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-7-beta-1-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/warning-hugely-popular-the-great-suspender-chrome-extension-contains-malware/17650/</loc>
		<lastmod>2021-02-06T20:07:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/warning-hugely-popular-the-great-suspender-chrome-extension-contains-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/warning-hugely-popular-the-great-suspender-chrome-extension-contains-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cybercriminals-now-using-plex-media-servers-to-amplify-ddos-attacks/17653/</loc>
		<lastmod>2021-02-06T20:41:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/cybercriminals-now-using-plex-media-servers-to-amplify-ddos-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/cybercriminals-now-using-plex-media-servers-to-amplify-ddos-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-103-wordfence-innovates-with-machine-learning-and-security-for-schools/17656/</loc>
		<lastmod>2021-02-06T20:49:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/episode-103-wordfence-innovates-with-machine-learning-and-security-for-schools.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/webdev-tutorials-site-sitepoint-discloses-data-breach/17658/</loc>
		<lastmod>2021-02-06T20:49:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/webdev-tutorials-site-sitepoint-discloses-data-breach.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-bugs-found-in-popular-realtek-wi-fi-module-for-embedded-devices/17664/</loc>
		<lastmod>2021-02-07T20:23:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/critical-bugs-found-in-popular-realtek-wi-fi-module-for-embedded-devices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/critical-bugs-found-in-popular-realtek-wi-fi-module-for-embedded-devices.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/why-human-error-is-1-cyber-security-threat-to-businesses-in-2021/17661/</loc>
		<lastmod>2021-02-07T20:38:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/why-human-error-is-1-cyber-security-threat-to-businesses-in-2021.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/why-human-error-is-1-cyber-security-threat-to-businesses-in-2021.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hacktivists-deface-multiple-sri-lankan-domains-including-google-lk/17667/</loc>
		<lastmod>2021-02-07T20:54:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/hacktivists-deface-multiple-sri-lankan-domains-including-google-lk.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-to-add-nation-state-activity-alerts-to-defender-for-office-365/17680/</loc>
		<lastmod>2021-02-08T20:24:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/microsoft-to-add-nation-state-activity-alerts-to-defender-for-office-365.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/severe-vulnerabilities-patched-in-nextgen-gallery-affect-over-800000-wordpress-sites/17678/</loc>
		<lastmod>2021-02-08T20:30:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/severe-vulnerabilities-patched-in-nextgen-gallery-affect-over-800000-wordpress-sites.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/top-5-bug-bounty-programs-to-watch-in-2021/17675/</loc>
		<lastmod>2021-02-08T20:53:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/top-5-bug-bounty-programs-to-watch-in-2021.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/top-5-bug-bounty-programs-to-watch-in-2021.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/detailed-heres-how-iran-spies-on-dissidents-with-the-help-of-hackers/17672/</loc>
		<lastmod>2021-02-08T20:54:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/detailed-heres-how-iran-spies-on-dissidents-with-the-help-of-hackers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/detailed-heres-how-iran-spies-on-dissidents-with-the-help-of-hackers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fears-over-dna-privacy-as-23andme-goes-public-in-deal-with-richard-branson/17682/</loc>
		<lastmod>2021-02-10T16:54:41+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/fears-over-dna-privacy-as-23andme-goes-public-in-deal-with-richard-branson.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/dependency-confusion-supply-chain-attack-hit-over-35-high-profile-companies/17686/</loc>
		<lastmod>2021-02-10T17:02:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/dependency-confusion-supply-chain-attack-hit-over-35-high-profile-companies.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/dependency-confusion-supply-chain-attack-hit-over-35-high-profile-companies.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/multiple-vulnerabilities-patched-in-responsive-menu-plugin/17692/</loc>
		<lastmod>2021-02-10T17:09:52+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/multiple-vulnerabilities-patched-in-responsive-menu-plugin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-7-beta-2/17684/</loc>
		<lastmod>2021-02-10T17:10:45+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-7-beta-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-7-beta-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-7-beta-2-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/authorities-arrest-sim-swapping-gang-that-targeted-celebrities/17694/</loc>
		<lastmod>2021-02-10T17:19:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/authorities-arrest-sim-swapping-gang-that-targeted-celebrities.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/lodarat-windows-malware-now-also-targets-android-devices/17689/</loc>
		<lastmod>2021-02-10T17:45:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/lodarat-windows-malware-now-also-targets-android-devices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/lodarat-windows-malware-now-also-targets-android-devices.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-uncover-android-spying-campaign-targeting-pakistan-officials/17699/</loc>
		<lastmod>2021-02-11T17:03:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/researchers-uncover-android-spying-campaign-targeting-pakistan-officials.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/researchers-uncover-android-spying-campaign-targeting-pakistan-officials.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/keepchange-said-it-stopped-hackers-from-stealing-user-funds-but-not-personal-data/17705/</loc>
		<lastmod>2021-02-11T17:36:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/keepchange-said-it-stopped-hackers-from-stealing-user-funds-but-not-personal-data.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-weakest-link-in-your-security-posture-misconfigured-saas-settings/17702/</loc>
		<lastmod>2021-02-11T17:40:58+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/the-weakest-link-in-your-security-posture-misconfigured-saas-settings.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/the-weakest-link-in-your-security-posture-misconfigured-saas-settings.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/10-sim-swappers-arrested-for-stealing-100m-in-crypto-from-celebrities/17714/</loc>
		<lastmod>2021-02-12T17:07:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/10-sim-swappers-arrested-for-stealing-100m-in-crypto-from-celebrities.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/10-sim-swappers-arrested-for-stealing-100m-in-crypto-from-celebrities.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/yandex-said-it-caught-an-employee-selling-access-to-users-inboxes/17717/</loc>
		<lastmod>2021-02-12T17:25:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/yandex-said-it-caught-an-employee-selling-access-to-users-inboxes.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/people-of-wordpress-pooja-derashri/17709/</loc>
		<lastmod>2021-02-12T17:35:39+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/people-of-wordpress-pooja-derashri-9.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/people-of-wordpress-pooja-derashri.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/people-of-wordpress-pooja-derashri-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/people-of-wordpress-pooja-derashri.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/people-of-wordpress-pooja-derashri-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/secret-chat-in-telegram-left-self-destructing-media-files-on-devices/17711/</loc>
		<lastmod>2021-02-12T17:58:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/secret-chat-in-telegram-left-self-destructing-media-files-on-devices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/secret-chat-in-telegram-left-self-destructing-media-files-on-devices.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/yandex-employee-caught-selling-access-to-users-email-inboxes/17720/</loc>
		<lastmod>2021-02-13T17:30:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/yandex-employee-caught-selling-access-to-users-email-inboxes.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/yandex-employee-caught-selling-access-to-users-email-inboxes.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/poor-password-security-led-to-recent-water-treatment-facility-hack/17723/</loc>
		<lastmod>2021-02-13T17:33:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/poor-password-security-led-to-recent-water-treatment-facility-hack.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/poor-password-security-led-to-recent-water-treatment-facility-hack.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google/17728/</loc>
		<lastmod>2021-02-13T17:35:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/apple-will-proxy-safe-browsing-traffic-on-ios-14-5-to-hide-user-ips-from-google.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-104-cryptography-demystified/17726/</loc>
		<lastmod>2021-02-13T18:06:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/episode-104-cryptography-demystified.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/iranian-hackers-utilize-screenconnect-to-spy-on-uae-kuwait-government-agencies/17730/</loc>
		<lastmod>2021-02-14T17:23:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/iranian-hackers-utilize-screenconnect-to-spy-on-uae-kuwait-government-agencies.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/iranian-hackers-utilize-screenconnect-to-spy-on-uae-kuwait-government-agencies.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/egregor-ransomware-operators-arrested-in-ukraine/17736/</loc>
		<lastmod>2021-02-14T17:42:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/egregor-ransomware-operators-arrested-in-ukraine.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/apple-patches-10-year-old-macos-sudo-root-privilege-escalation-bug/17733/</loc>
		<lastmod>2021-02-14T17:58:23+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/apple-patches-10-year-old-macos-sudo-root-privilege-escalation-bug.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/apple-patches-10-year-old-macos-sudo-root-privilege-escalation-bug.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/apple-will-proxy-safe-browsing-requests-to-hide-ios-users-ip-from-google/17740/</loc>
		<lastmod>2021-02-15T17:21:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/apple-will-proxy-safe-browsing-requests-to-hide-ios-users-ip-from-google.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/apple-will-proxy-safe-browsing-requests-to-hide-ios-users-ip-from-google.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-issues-patches-for-in-the-wild-0-day-and-55-others-windows-bugs/17743/</loc>
		<lastmod>2021-02-15T17:28:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/microsoft-issues-patches-for-in-the-wild-0-day-and-55-others-windows-bugs.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/microsoft-issues-patches-for-in-the-wild-0-day-and-55-others-windows-bugs.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/270-addreses-are-responsible-for-55-of-all-cryptocurrency-money-laundering/17746/</loc>
		<lastmod>2021-02-15T17:55:24+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/270-addreses-are-responsible-for-55-of-all-cryptocurrency-money-laundering.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/losses-to-romance-scams-reached-a-record-304-million-in-2020/17757/</loc>
		<lastmod>2021-02-16T17:18:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/losses-to-romance-scams-reached-a-record-304-million-in-2020.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/learn-how-to-manage-and-secure-active-directory-service-accounts/17751/</loc>
		<lastmod>2021-02-16T17:36:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/learn-how-to-manage-and-secure-active-directory-service-accounts.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/learn-how-to-manage-and-secure-active-directory-service-accounts.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/unpatched-shareit-android-app-flaw-could-let-hackers-inject-malware/17754/</loc>
		<lastmod>2021-02-16T17:43:50+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/unpatched-shareit-android-app-flaw-could-let-hackers-inject-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/unpatched-shareit-android-app-flaw-could-let-hackers-inject-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms/17771/</loc>
		<lastmod>2021-02-17T17:32:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/one-million-sites-affected-four-severe-vulnerabilities-patched-in-ninja-forms.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mitigating-memory-safety-issues-in-open-source-software/17760/</loc>
		<lastmod>2021-02-17T17:47:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/mitigating-memory-safety-issues-in-open-source-software.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/mitigating-memory-safety-issues-in-open-source-software.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/mitigating-memory-safety-issues-in-open-source-software-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/mitigating-memory-safety-issues-in-open-source-software-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/owner-of-app-that-hijacked-millions-of-devices-with-one-update-exposes-buy-to-infect-scam/17773/</loc>
		<lastmod>2021-02-17T17:52:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/owner-of-app-that-hijacked-millions-of-devices-with-one-update-exposes-buy-to-infect-scam.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/agora-sdk-bug-left-several-video-calling-apps-vulnerable-to-snooping/17765/</loc>
		<lastmod>2021-02-17T18:02:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/agora-sdk-bug-left-several-video-calling-apps-vulnerable-to-snooping.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/agora-sdk-bug-left-several-video-calling-apps-vulnerable-to-snooping.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-unmask-hackers-behind-apomacrosploit-malware-builder/17768/</loc>
		<lastmod>2021-02-17T18:05:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/researchers-unmask-hackers-behind-apomacrosploit-malware-builder.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/researchers-unmask-hackers-behind-apomacrosploit-malware-builder.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-7-beta-3/17763/</loc>
		<lastmod>2021-02-17T18:11:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-7-beta-3-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-7-beta-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-7-beta-3-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/u-s-charges-3-north-korean-hackers-over-1-3-billion-cryptocurrency-heist/17778/</loc>
		<lastmod>2021-02-18T17:38:47+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/u-s-charges-3-north-korean-hackers-over-1-3-billion-cryptocurrency-heist.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/u-s-charges-3-north-korean-hackers-over-1-3-billion-cryptocurrency-heist.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/crowdstrike-acquires-humio-for-400-million/17781/</loc>
		<lastmod>2021-02-18T17:38:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/crowdstrike-acquires-humio-for-400-million.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/first-malware-designed-for-apple-m1-chip-discovered-in-the-wild/17775/</loc>
		<lastmod>2021-02-18T18:10:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/first-malware-designed-for-apple-m1-chip-discovered-in-the-wild.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/first-malware-designed-for-apple-m1-chip-discovered-in-the-wild.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/masslogger-trojan-upgraded-to-steal-all-your-outlook-chrome-credentials/17788/</loc>
		<lastmod>2021-02-19T17:29:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/masslogger-trojan-upgraded-to-steal-all-your-outlook-chrome-credentials.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/masslogger-trojan-upgraded-to-steal-all-your-outlook-chrome-credentials.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-hack-lets-attackers-bypass-mastercard-pin-by-using-them-as-visa-card/17785/</loc>
		<lastmod>2021-02-19T18:15:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/new-hack-lets-attackers-bypass-mastercard-pin-by-using-them-as-visa-card.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/new-hack-lets-attackers-bypass-mastercard-pin-by-using-them-as-visa-card.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/brave-browser-leaks-onion-addresses-in-dns-traffic/17791/</loc>
		<lastmod>2021-02-19T18:21:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/brave-browser-leaks-onion-addresses-in-dns-traffic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-105-the-hottest-trend-in-wordpress/17802/</loc>
		<lastmod>2021-02-20T17:29:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/episode-105-the-hottest-trend-in-wordpress.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/solarwinds-hackers-stole-some-source-code-for-microsoft-azure-exchange-intune/17799/</loc>
		<lastmod>2021-02-20T17:29:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/solarwinds-hackers-stole-some-source-code-for-microsoft-azure-exchange-intune.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/solarwinds-hackers-stole-some-source-code-for-microsoft-azure-exchange-intune.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/reflecting-on-gutenbergs-100th-release/17794/</loc>
		<lastmod>2021-02-20T17:41:41+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/reflecting-on-gutenbergs-100th-release-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/reflecting-on-gutenbergs-100th-release.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/reflecting-on-gutenbergs-100th-release-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/privacy-bug-in-brave-browser-exposes-dark-web-browsing-history-of-its-users/17796/</loc>
		<lastmod>2021-02-20T17:41:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/privacy-bug-in-brave-browser-exposes-dark-web-browsing-history-of-its-users.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/privacy-bug-in-brave-browser-exposes-dark-web-browsing-history-of-its-users.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/malaysia-arrests-11-suspects-for-hacking-government-sites/17804/</loc>
		<lastmod>2021-02-20T18:17:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/malaysia-arrests-11-suspects-for-hacking-government-sites.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/malvertisers-exploited-webkit-0-day-to-redirect-browser-users-to-scam-sites/17807/</loc>
		<lastmod>2021-02-21T17:40:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/malvertisers-exploited-webkit-0-day-to-redirect-browser-users-to-scam-sites.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/malvertisers-exploited-webkit-0-day-to-redirect-browser-users-to-scam-sites.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/managed-service-provider-watch-this-video-to-learn-about-autonomous-xdr/17810/</loc>
		<lastmod>2021-02-21T18:17:28+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/managed-service-provider-watch-this-video-to-learn-about-autonomous-xdr.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/managed-service-provider-watch-this-video-to-learn-about-autonomous-xdr.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-says-solarwinds-hackers-downloaded-some-azure-exchange-and-intune-source-code/17813/</loc>
		<lastmod>2021-02-21T18:31:31+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/microsoft-says-solarwinds-hackers-downloaded-some-azure-exchange-and-intune-source-code.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/chinese-hackers-had-access-to-a-u-s-hacking-tool-years-before-it-was-leaked-online/17822/</loc>
		<lastmod>2021-02-22T18:01:52+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/chinese-hackers-had-access-to-a-u-s-hacking-tool-years-before-it-was-leaked-online.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/chinese-hackers-had-access-to-a-u-s-hacking-tool-years-before-it-was-leaked-online.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-to-fight-business-email-compromise-bec-with-email-authentication/17819/</loc>
		<lastmod>2021-02-22T18:12:50+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/how-to-fight-business-email-compromise-bec-with-email-authentication.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/how-to-fight-business-email-compromise-bec-with-email-authentication.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-6-2-maintenance-release/17817/</loc>
		<lastmod>2021-02-22T18:26:48+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-6-2-maintenance-release.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/powerhouse-vpn-products-can-be-abused-for-large-scale-ddos-attacks/17825/</loc>
		<lastmod>2021-02-22T18:41:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/powerhouse-vpn-products-can-be-abused-for-large-scale-ddos-attacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/flash-version-distributed-in-china-after-eol-is-installing-adware/17842/</loc>
		<lastmod>2021-02-23T18:10:24+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/flash-version-distributed-in-china-after-eol-is-installing-adware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/experts-find-a-way-to-learn-what-youre-typing-during-video-calls/17836/</loc>
		<lastmod>2021-02-23T18:19:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/experts-find-a-way-to-learn-what-youre-typing-during-video-calls.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/experts-find-a-way-to-learn-what-youre-typing-during-video-calls.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/5-security-lessons-for-small-security-teams-for-the-post-covid19-era/17839/</loc>
		<lastmod>2021-02-23T18:31:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/5-security-lessons-for-small-security-teams-for-the-post-covid19-era.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/5-security-lessons-for-small-security-teams-for-the-post-covid19-era.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/clubhouse-chatroom-app-closes-down-site-rebroadcasting-content/17831/</loc>
		<lastmod>2021-02-23T18:34:08+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/clubhouse-chatroom-app-closes-down-site-rebroadcasting-content.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-password-checkup-feature-coming-to-android/17833/</loc>
		<lastmod>2021-02-23T18:47:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/new-password-checkup-feature-coming-to-android.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/new-password-checkup-feature-coming-to-android.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/new-password-checkup-feature-coming-to-android-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/new-password-checkup-feature-coming-to-android-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/new-password-checkup-feature-coming-to-android-3.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-7-release-candidate/17844/</loc>
		<lastmod>2021-02-24T18:03:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-7-release-candidate.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-7-release-candidate.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/wordpress-5-7-release-candidate-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/experts-warns-of-notable-increase-in-quickbooks-data-files-theft-attacks/17849/</loc>
		<lastmod>2021-02-24T18:18:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/experts-warns-of-notable-increase-in-quickbooks-data-files-theft-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/experts-warns-of-notable-increase-in-quickbooks-data-files-theft-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ukraine-reports-cyber-attack-on-government-document-management-system/17852/</loc>
		<lastmod>2021-02-24T18:28:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/ukraine-reports-cyber-attack-on-government-document-management-system.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/online-trackers-increasingly-switching-to-invasive-cname-cloaking-technique/17846/</loc>
		<lastmod>2021-02-24T18:37:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/online-trackers-increasingly-switching-to-invasive-cname-cloaking-technique.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/online-trackers-increasingly-switching-to-invasive-cname-cloaking-technique.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/did-you-know-about-reusable-blocks/17857/</loc>
		<lastmod>2021-02-25T18:07:48+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/did-you-know-about-reusable-blocks-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/did-you-know-about-reusable-blocks.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/did-you-know-about-reusable-blocks-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/this-chart-shows-the-connections-between-cybercrime-groups/17865/</loc>
		<lastmod>2021-02-25T18:12:39+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/this-chart-shows-the-connections-between-cybercrime-groups.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-top-free-tools-for-sysadmins-in-2021/17862/</loc>
		<lastmod>2021-02-25T18:15:35+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/the-top-free-tools-for-sysadmins-in-2021.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/the-top-free-tools-for-sysadmins-in-2021.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/celebrating-the-influence-and-contributions-of-black-security-privacy-googlers/17854/</loc>
		<lastmod>2021-02-25T18:33:38+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/celebrating-the-influence-and-contributions-of-black-security-privacy-googlers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/celebrating-the-influence-and-contributions-of-black-security-privacy-googlers.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/celebrating-the-influence-and-contributions-of-black-security-privacy-googlers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/celebrating-the-influence-and-contributions-of-black-security-privacy-googlers-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/celebrating-the-influence-and-contributions-of-black-security-privacy-googlers-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/chinese-hackers-using-firefox-extension-to-spy-on-tibetan-organizations/17859/</loc>
		<lastmod>2021-02-25T18:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/chinese-hackers-using-firefox-extension-to-spy-on-tibetan-organizations.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/chinese-hackers-using-firefox-extension-to-spy-on-tibetan-organizations.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/berlin-resident-jailed-for-threatening-to-bomb-nhs-hospital-unless-bitcoin-ransom-was-paid/17875/</loc>
		<lastmod>2021-02-26T18:20:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/berlin-resident-jailed-for-threatening-to-bomb-nhs-hospital-unless-bitcoin-ransom-was-paid.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/north-korean-hackers-targeting-defense-firms-with-threatneedle-malware/17869/</loc>
		<lastmod>2021-02-26T19:05:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/north-korean-hackers-targeting-defense-firms-with-threatneedle-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/north-korean-hackers-targeting-defense-firms-with-threatneedle-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/alert-malicious-amazon-alexa-skills-can-easily-bypass-vetting-process/17872/</loc>
		<lastmod>2021-02-26T19:18:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/alert-malicious-amazon-alexa-skills-can-easily-bypass-vetting-process.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/alert-malicious-amazon-alexa-skills-can-easily-bypass-vetting-process.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/chrome-will-soon-try-https-first-when-you-type-an-incomplete-url/17885/</loc>
		<lastmod>2021-02-27T18:34:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/chrome-will-soon-try-https-first-when-you-type-an-incomplete-url.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-106-admin-password-resets-blockchain-botnets-and-a-central-management-rce/17883/</loc>
		<lastmod>2021-02-27T18:54:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/episode-106-admin-password-resets-blockchain-botnets-and-a-central-management-rce.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/russian-hackers-targeted-ukraine-authorities-with-supply-chain-malware-attack/17880/</loc>
		<lastmod>2021-02-27T19:00:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/russian-hackers-targeted-ukraine-authorities-with-supply-chain-malware-attack.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/russian-hackers-targeted-ukraine-authorities-with-supply-chain-malware-attack.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cisco-releases-security-patches-for-critical-flaws-affecting-its-products/17877/</loc>
		<lastmod>2021-02-27T19:15:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/cisco-releases-security-patches-for-critical-flaws-affecting-its-products.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/02/cisco-releases-security-patches-for-critical-flaws-affecting-its-products.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-rce-flaws-affect-vmware-esxi-and-vsphere-client-patch-now/17890/</loc>
		<lastmod>2021-02-28T18:42:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-rce-flaws-affect-vmware-esxi-and-vsphere-client-patch-now.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-rce-flaws-affect-vmware-esxi-and-vsphere-client-patch-now.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/go-malware-is-now-common-having-been-adopted-by-both-apts-and-e-crime-groups/17893/</loc>
		<lastmod>2021-02-28T18:52:30+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/go-malware-is-now-common-having-been-adopted-by-both-apts-and-e-crime-groups.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/everything-you-need-to-know-about-evolving-threat-of-ransomware/17887/</loc>
		<lastmod>2021-02-28T19:31:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/everything-you-need-to-know-about-evolving-threat-of-ransomware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/everything-you-need-to-know-about-evolving-threat-of-ransomware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/gootkit-rat-using-seo-to-distribute-malware-through-compromised-sites/17900/</loc>
		<lastmod>2021-03-01T19:11:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/gootkit-rat-using-seo-to-distribute-malware-through-compromised-sites.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/gootkit-rat-using-seo-to-distribute-malware-through-compromised-sites.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/sharethemicincyber-rob-duhart/17897/</loc>
		<lastmod>2021-03-01T19:36:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/sharethemicincyber-rob-duhart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/sharethemicincyber-rob-duhart.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/sharethemicincyber-rob-duhart.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/sharethemicincyber-rob-duhart-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/sharethemicincyber-rob-duhart-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-exploit-websites-to-give-them-excellent-seo-before-deploying-malware/17906/</loc>
		<lastmod>2021-03-01T19:41:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/hackers-exploit-websites-to-give-them-excellent-seo-before-deploying-malware.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/why-do-companies-fail-to-stop-breaches-despite-soaring-it-security-investment/17903/</loc>
		<lastmod>2021-03-01T19:46:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/why-do-companies-fail-to-stop-breaches-despite-soaring-it-security-investment.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/why-do-companies-fail-to-stop-breaches-despite-soaring-it-security-investment.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-unc0ver-tool-can-jailbreak-all-iphone-models-running-ios-11-0-14-3/17912/</loc>
		<lastmod>2021-03-02T19:39:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/new-unc0ver-tool-can-jailbreak-all-iphone-models-running-ios-11-0-14-3.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/new-unc0ver-tool-can-jailbreak-all-iphone-models-running-ios-11-0-14-3.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-unearth-links-between-suncrypt-and-qnapcrypt-ransomware/17909/</loc>
		<lastmod>2021-03-02T19:41:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/researchers-unearth-links-between-suncrypt-and-qnapcrypt-ransomware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/researchers-unearth-links-between-suncrypt-and-qnapcrypt-ransomware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/obliquerat-trojan-now-lurks-in-images-on-compromised-websites/17915/</loc>
		<lastmod>2021-03-02T19:48:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/obliquerat-trojan-now-lurks-in-images-on-compromised-websites.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-february-2021/17919/</loc>
		<lastmod>2021-03-03T18:59:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/the-month-in-wordpress-february-2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-now-hiding-obliquerat-payload-in-images-to-evade-detection/17921/</loc>
		<lastmod>2021-03-03T19:04:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/hackers-now-hiding-obliquerat-payload-in-images-to-evade-detection.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/hackers-now-hiding-obliquerat-payload-in-images-to-evade-detection.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ursnif-trojan-has-targeted-over-100-italian-banks/17929/</loc>
		<lastmod>2021-03-03T19:09:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/ursnif-trojan-has-targeted-over-100-italian-banks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/replacing-edr-ngav-with-autonomous-xdr-makes-a-big-difference-for-small-security-teams/17924/</loc>
		<lastmod>2021-03-03T19:45:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/replacing-edr-ngav-with-autonomous-xdr-makes-a-big-difference-for-small-security-teams.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/replacing-edr-ngav-with-autonomous-xdr-makes-a-big-difference-for-small-security-teams.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/medium-severity-vulnerability-patched-in-user-profile-picture-plugin/17927/</loc>
		<lastmod>2021-03-03T19:55:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/medium-severity-vulnerability-patched-in-user-profile-picture-plugin.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/medium-severity-vulnerability-patched-in-user-profile-picture-plugin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-vulnerability-patched-in-woocommerce-upload-files/17938/</loc>
		<lastmod>2021-03-04T19:14:58+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-vulnerability-patched-in-woocommerce-upload-files.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/extortion-gang-breaches-cybersecurity-firm-qualys-using-accellion-exploit/17935/</loc>
		<lastmod>2021-03-04T19:46:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/extortion-gang-breaches-cybersecurity-firm-qualys-using-accellion-exploit.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/extortion-gang-breaches-cybersecurity-firm-qualys-using-accellion-exploit.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/accellion-zero-day-claims-a-new-victim-in-cybersecurity-company-qualys/17940/</loc>
		<lastmod>2021-03-04T19:50:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/accellion-zero-day-claims-a-new-victim-in-cybersecurity-company-qualys.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-will-use-floc-for-ad-targeting-once-3rd-party-cookies-are-dead/17932/</loc>
		<lastmod>2021-03-04T20:01:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/google-will-use-floc-for-ad-targeting-once-3rd-party-cookies-are-dead.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/google-will-use-floc-for-ad-targeting-once-3rd-party-cookies-are-dead.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ftc-joins-38-states-in-takedown-of-massive-charity-robocall-operation/17953/</loc>
		<lastmod>2021-03-05T19:40:24+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/ftc-joins-38-states-in-takedown-of-massive-charity-robocall-operation.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/bug-in-apples-find-my-feature-couldve-exposed-users-location-histories/17945/</loc>
		<lastmod>2021-03-05T19:42:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/bug-in-apples-find-my-feature-couldve-exposed-users-location-histories.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/bug-in-apples-find-my-feature-couldve-exposed-users-location-histories.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/airline-data-hack-hundreds-of-thousands-of-star-alliance-passengers-details-stolen/17943/</loc>
		<lastmod>2021-03-05T19:49:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/airline-data-hack-hundreds-of-thousands-of-star-alliance-passengers-details-stolen.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-cloud-certifications-get-prep-courses-and-practice-tests-at-95-discount/17948/</loc>
		<lastmod>2021-03-05T19:55:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/google-cloud-certifications-get-prep-courses-and-practice-tests-at-95-discount.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/google-cloud-certifications-get-prep-courses-and-practice-tests-at-95-discount.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-107-two-plugin-vulnerabilities-target-file-upload-capabilities/17951/</loc>
		<lastmod>2021-03-05T20:11:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/episode-107-two-plugin-vulnerabilities-target-file-upload-capabilities.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mazafaka-elite-hacking-and-cybercrime-forum-got-hacked/17955/</loc>
		<lastmod>2021-03-06T19:38:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/mazafaka-elite-hacking-and-cybercrime-forum-got-hacked.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/mazafaka-elite-hacking-and-cybercrime-forum-got-hacked.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-find-3-new-malware-strains-used-by-solarwinds-hackers/17958/</loc>
		<lastmod>2021-03-06T19:52:31+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/researchers-find-3-new-malware-strains-used-by-solarwinds-hackers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/researchers-find-3-new-malware-strains-used-by-solarwinds-hackers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/check-to-see-if-youre-vulnerable-to-microsoft-exchange-server-zero-days-using-this-tool/17961/</loc>
		<lastmod>2021-03-06T19:56:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/check-to-see-if-youre-vulnerable-to-microsoft-exchange-server-zero-days-using-this-tool.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/100-in-crypto-for-a-kilo-of-gold-scammer-pleads-guilty-to-investor-fraud/17970/</loc>
		<lastmod>2021-03-07T20:00:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/100-in-crypto-for-a-kilo-of-gold-scammer-pleads-guilty-to-investor-fraud.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cisa-issues-emergency-directive-on-in-the-wild-microsoft-exchange-flaws/17964/</loc>
		<lastmod>2021-03-07T20:01:31+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/cisa-issues-emergency-directive-on-in-the-wild-microsoft-exchange-flaws.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/cisa-issues-emergency-directive-on-in-the-wild-microsoft-exchange-flaws.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-50000-bug-couldve-allowed-hackers-access-any-microsoft-account/17967/</loc>
		<lastmod>2021-03-07T20:22:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/a-50000-bug-couldve-allowed-hackers-access-any-microsoft-account.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/a-50000-bug-couldve-allowed-hackers-access-any-microsoft-account.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-0-day-in-the-plus-addons-for-elementor-allows-site-takeover/17980/</loc>
		<lastmod>2021-03-08T19:44:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-0-day-in-the-plus-addons-for-elementor-allows-site-takeover.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/iranian-hackers-using-remote-utilities-software-to-spy-on-its-targets/17974/</loc>
		<lastmod>2021-03-08T20:09:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/iranian-hackers-using-remote-utilities-software-to-spy-on-its-targets.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/iranian-hackers-using-remote-utilities-software-to-spy-on-its-targets.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/supernova-malware-clues-link-chinese-threat-group-spiral-to-solarwinds-server-hacks/17982/</loc>
		<lastmod>2021-03-08T20:23:27+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/supernova-malware-clues-link-chinese-threat-group-spiral-to-solarwinds-server-hacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/malware-can-exploit-new-flaw-in-intel-cpus-to-launch-side-channel-attacks/17977/</loc>
		<lastmod>2021-03-08T20:32:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/malware-can-exploit-new-flaw-in-intel-cpus-to-launch-side-channel-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/malware-can-exploit-new-flaw-in-intel-cpus-to-launch-side-channel-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/9-android-apps-on-google-play-caught-distributing-alienbot-banker-and-mrat-malware/17987/</loc>
		<lastmod>2021-03-09T19:47:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/9-android-apps-on-google-play-caught-distributing-alienbot-banker-and-mrat-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/9-android-apps-on-google-play-caught-distributing-alienbot-banker-and-mrat-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/people-of-wordpress-olga-gleckler/17985/</loc>
		<lastmod>2021-03-09T19:48:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/people-of-wordpress-olga-gleckler-31.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/people-of-wordpress-olga-gleckler.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/people-of-wordpress-olga-gleckler-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/people-of-wordpress-olga-gleckler-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/people-of-wordpress-olga-gleckler-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/people-of-wordpress-olga-gleckler.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cybersecurity-webinar-solarwinds-sunburst-the-big-picture/17990/</loc>
		<lastmod>2021-03-09T20:34:58+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/cybersecurity-webinar-solarwinds-sunburst-the-big-picture.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/cybersecurity-webinar-solarwinds-sunburst-the-big-picture.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/malicious-apps-on-google-play-dropped-banking-trojans-on-user-devices/17993/</loc>
		<lastmod>2021-03-09T20:47:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/malicious-apps-on-google-play-dropped-banking-trojans-on-user-devices.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fuzzing-java-in-oss-fuzz/17998/</loc>
		<lastmod>2021-03-10T19:56:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/fuzzing-java-in-oss-fuzz.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/fuzzing-java-in-oss-fuzz.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/fuzzing-java-in-oss-fuzz-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/fuzzing-java-in-oss-fuzz-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-7-esperanza/18001/</loc>
		<lastmod>2021-03-10T20:13:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/wordpress-5-7-esperanza-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/wordpress-5-7-esperanza.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/wordpress-5-7-esperanza.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/2020-was-a-record-breaking-year-in-us-school-hacks-security-failures/18009/</loc>
		<lastmod>2021-03-10T20:23:08+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/2020-was-a-record-breaking-year-in-us-school-hacks-security-failures.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fin8-hackers-return-with-more-powerful-version-of-badhatch-pos-malware/18006/</loc>
		<lastmod>2021-03-10T20:36:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/fin8-hackers-return-with-more-powerful-version-of-badhatch-pos-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/fin8-hackers-return-with-more-powerful-version-of-badhatch-pos-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-unveil-new-linux-malware-linked-to-chinese-hackers/18003/</loc>
		<lastmod>2021-03-10T20:45:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/researchers-unveil-new-linux-malware-linked-to-chinese-hackers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/researchers-unveil-new-linux-malware-linked-to-chinese-hackers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fixing-the-weakest-link-the-passwords-in-cybersecurity-today/18018/</loc>
		<lastmod>2021-03-11T20:15:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/fixing-the-weakest-link-the-passwords-in-cybersecurity-today.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/fixing-the-weakest-link-the-passwords-in-cybersecurity-today.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/introducing-sigstore-easy-code-signing-verification-for-supply-chain-integrity/18012/</loc>
		<lastmod>2021-03-11T20:31:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/introducing-sigstore-easy-code-signing-verification-for-supply-chain-integrity.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/introducing-sigstore-easy-code-signing-verification-for-supply-chain-integrity.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/introducing-sigstore-easy-code-signing-verification-for-supply-chain-integrity-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/introducing-sigstore-easy-code-signing-verification-for-supply-chain-integrity-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/introducing-sigstore-easy-code-signing-verification-for-supply-chain-integrity-3.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/icon-files-abused-in-malspam-to-spread-nanocore-trojan/18021/</loc>
		<lastmod>2021-03-11T20:33:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/icon-files-abused-in-malspam-to-spread-nanocore-trojan.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/proxylogon-poc-exploit-released-likely-to-fuel-more-disruptive-cyber-attacks/18015/</loc>
		<lastmod>2021-03-11T20:42:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/proxylogon-poc-exploit-released-likely-to-fuel-more-disruptive-cyber-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/proxylogon-poc-exploit-released-likely-to-fuel-more-disruptive-cyber-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-spotted-malware-written-in-nim-programming-language/18030/</loc>
		<lastmod>2021-03-12T19:57:41+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/researchers-spotted-malware-written-in-nim-programming-language.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/researchers-spotted-malware-written-in-nim-programming-language.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-spectre-proof-of-concept-for-a-spectre-proof-web/18027/</loc>
		<lastmod>2021-03-12T20:08:35+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/a-spectre-proof-of-concept-for-a-spectre-proof-web.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/a-spectre-proof-of-concept-for-a-spectre-proof-web.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/a-spectre-proof-of-concept-for-a-spectre-proof-web-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/a-spectre-proof-of-concept-for-a-spectre-proof-web-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-are-targeting-microsoft-exchange-servers-with-ransomware/18033/</loc>
		<lastmod>2021-03-12T20:15:42+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/hackers-are-targeting-microsoft-exchange-servers-with-ransomware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/hackers-are-targeting-microsoft-exchange-servers-with-ransomware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-108-hack-exposes-150000-security-cameras-at-tesla-cloudflare-and-others/18036/</loc>
		<lastmod>2021-03-12T20:26:44+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/episode-108-hack-exposes-150000-security-cameras-at-tesla-cloudflare-and-others.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/uber-lyft-to-share-data-on-drivers-banned-for-sexual-physical-assault/18038/</loc>
		<lastmod>2021-03-12T20:39:48+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/uber-lyft-to-share-data-on-drivers-banned-for-sexual-physical-assault.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/netflix-weighs-up-crackdown-on-password-sharing/18025/</loc>
		<lastmod>2021-03-12T20:53:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/netflix-weighs-up-crackdown-on-password-sharing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-future-of-data-privacy-confidential-computing-quantum-safe-cryptography-take-center-stage/18050/</loc>
		<lastmod>2021-03-13T20:02:08+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/the-future-of-data-privacy-confidential-computing-quantum-safe-cryptography-take-center-stage.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/another-google-chrome-0-day-bug-found-actively-exploited-in-the-wild/18047/</loc>
		<lastmod>2021-03-13T20:14:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/another-google-chrome-0-day-bug-found-actively-exploited-in-the-wild.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/another-google-chrome-0-day-bug-found-actively-exploited-in-the-wild.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/comptia-security-certification-prep-lifetime-access-for-just-30/18044/</loc>
		<lastmod>2021-03-13T20:30:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/comptia-security-certification-prep-lifetime-access-for-just-30.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/comptia-security-certification-prep-lifetime-access-for-just-30.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/continuing-to-raise-the-bar-for-verifiable-security-on-pixel/18041/</loc>
		<lastmod>2021-03-13T20:30:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/continuing-to-raise-the-bar-for-verifiable-security-on-pixel.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/continuing-to-raise-the-bar-for-verifiable-security-on-pixel.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/continuing-to-raise-the-bar-for-verifiable-security-on-pixel.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/continuing-to-raise-the-bar-for-verifiable-security-on-pixel-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/continuing-to-raise-the-bar-for-verifiable-security-on-pixel-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/netflix-wants-to-stop-you-sharing-your-password/18063/</loc>
		<lastmod>2021-03-14T20:09:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/netflix-wants-to-stop-you-sharing-your-password.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-browser-attack-allows-tracking-users-online-with-javascript-disabled/18057/</loc>
		<lastmod>2021-03-14T20:21:40+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/new-browser-attack-allows-tracking-users-online-with-javascript-disabled.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/new-browser-attack-allows-tracking-users-online-with-javascript-disabled.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/sharethemicincyber-brooke-pearson/18054/</loc>
		<lastmod>2021-03-14T20:28:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/sharethemicincyber-brooke-pearson.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/sharethemicincyber-brooke-pearson.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/sharethemicincyber-brooke-pearson.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/sharethemicincyber-brooke-pearson-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/sharethemicincyber-brooke-pearson-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-pre-auth-rce-flaw-found-in-f5-big-ip-platform-patch-asap/18060/</loc>
		<lastmod>2021-03-14T20:56:42+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-pre-auth-rce-flaw-found-in-f5-big-ip-platform-patch-asap.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-pre-auth-rce-flaw-found-in-f5-big-ip-platform-patch-asap.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ceo-of-encrypted-chat-platform-indicted-for-aiding-organised-criminals/18073/</loc>
		<lastmod>2021-03-15T20:09:38+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/ceo-of-encrypted-chat-platform-indicted-for-aiding-organised-criminals.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/ceo-of-encrypted-chat-platform-indicted-for-aiding-organised-criminals.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-fails-to-quash-incognito-mode-user-tracking-privacy-lawsuit/18078/</loc>
		<lastmod>2021-03-15T20:30:45+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/google-fails-to-quash-incognito-mode-user-tracking-privacy-lawsuit.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/rising-demand-for-ddos-protection-software-market-by-2020-2028/18070/</loc>
		<lastmod>2021-03-15T20:54:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/rising-demand-for-ddos-protection-software-market-by-2020-2028.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/rising-demand-for-ddos-protection-software-market-by-2020-2028.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/several-vulnerabilities-patched-in-tutor-lms-plugin/18076/</loc>
		<lastmod>2021-03-15T20:59:40+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/several-vulnerabilities-patched-in-tutor-lms-plugin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-https-and-device-compatibility/18067/</loc>
		<lastmod>2021-03-15T21:05:31+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/google-https-and-device-compatibility.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/google-https-and-device-compatibility.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/google-https-and-device-compatibility-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/google-https-and-device-compatibility-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-mirai-variant-and-zhtrap-botnet-malware-emerge-in-the-wild/18082/</loc>
		<lastmod>2021-03-16T20:41:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/new-mirai-variant-and-zhtrap-botnet-malware-emerge-in-the-wild.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/new-mirai-variant-and-zhtrap-botnet-malware-emerge-in-the-wild.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/use-this-one-click-mitigation-tool-from-microsoft-to-prevent-exchange-attacks/18085/</loc>
		<lastmod>2021-03-16T20:44:27+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/use-this-one-click-mitigation-tool-from-microsoft-to-prevent-exchange-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/use-this-one-click-mitigation-tool-from-microsoft-to-prevent-exchange-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/sec-charges-us-trader-for-allegedly-abusing-twitter-to-pump-cannabis-penny-stock-prices/18088/</loc>
		<lastmod>2021-03-16T20:47:31+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/sec-charges-us-trader-for-allegedly-abusing-twitter-to-pump-cannabis-penny-stock-prices.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/bit-con-twitter-teen-hacker-accepts-plea-agreement-three-years-behind-bars/18103/</loc>
		<lastmod>2021-03-17T20:32:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/bit-con-twitter-teen-hacker-accepts-plea-agreement-three-years-behind-bars.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites/18101/</loc>
		<lastmod>2021-03-17T20:50:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/cross-site-scripting-vulnerabilities-in-elementor-impact-over-7-million-sites.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/announcing-the-winners-of-the-2020-gcp-vrp-prize/18092/</loc>
		<lastmod>2021-03-17T20:50:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/announcing-the-winners-of-the-2020-gcp-vrp-prize.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/announcing-the-winners-of-the-2020-gcp-vrp-prize.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/announcing-the-winners-of-the-2020-gcp-vrp-prize.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/announcing-the-winners-of-the-2020-gcp-vrp-prize-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/announcing-the-winners-of-the-2020-gcp-vrp-prize-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mimecast-finds-solarwinds-hackers-stole-some-of-its-source-code/18095/</loc>
		<lastmod>2021-03-17T21:10:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/mimecast-finds-solarwinds-hackers-stole-some-of-its-source-code.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/mimecast-finds-solarwinds-hackers-stole-some-of-its-source-code.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/webinar-oy-vey-we-hired-a-large-hairy-hacker/18098/</loc>
		<lastmod>2021-03-17T21:17:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/webinar-oy-vey-we-hired-a-large-hairy-hacker.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/webinar-oy-vey-we-hired-a-large-hairy-hacker.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/solarwinds-linked-hacking-group-silverfish-abuses-enterprise-victims-for-sandbox-tests/18112/</loc>
		<lastmod>2021-03-18T20:39:28+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/solarwinds-linked-hacking-group-silverfish-abuses-enterprise-victims-for-sandbox-tests.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-rce-flaw-reported-in-mybb-forum-software-patch-your-sites/18106/</loc>
		<lastmod>2021-03-18T20:52:24+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-rce-flaw-reported-in-mybb-forum-software-patch-your-sites.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-rce-flaw-reported-in-mybb-forum-software-patch-your-sites.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-to-successfully-pursue-a-career-in-malware-analysis/18109/</loc>
		<lastmod>2021-03-18T21:24:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/how-to-successfully-pursue-a-career-in-malware-analysis.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/how-to-successfully-pursue-a-career-in-malware-analysis.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/tesla-ransomware-hacker-pleads-guilty-swiss-hacktivist-charged-for-fraud/18115/</loc>
		<lastmod>2021-03-19T21:03:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/tesla-ransomware-hacker-pleads-guilty-swiss-hacktivist-charged-for-fraud.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/tesla-ransomware-hacker-pleads-guilty-swiss-hacktivist-charged-for-fraud.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-infecting-apple-app-developers-with-trojanized-xcode-projects/18118/</loc>
		<lastmod>2021-03-19T21:18:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/hackers-infecting-apple-app-developers-with-trojanized-xcode-projects.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/hackers-infecting-apple-app-developers-with-trojanized-xcode-projects.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-109-this-attack-will-make-you-want-to-stop-using-sms-2fa/18121/</loc>
		<lastmod>2021-03-19T21:26:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/episode-109-this-attack-will-make-you-want-to-stop-using-sms-2fa-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/sec-charges-co-founders-of-bankrupt-ubiome-medical-testing-startup-with-operating-60m-fraud/18123/</loc>
		<lastmod>2021-03-19T21:34:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/sec-charges-co-founders-of-bankrupt-ubiome-medical-testing-startup-with-operating-60m-fraud.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fraudsters-jump-on-clubhouse-hype-to-push-malicious-android-app/18131/</loc>
		<lastmod>2021-03-20T21:09:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/fraudsters-jump-on-clubhouse-hype-to-push-malicious-android-app.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-f5-big-ip-bug-under-active-attacks-after-poc-exploit-posted-online/18125/</loc>
		<lastmod>2021-03-20T21:26:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-f5-big-ip-bug-under-active-attacks-after-poc-exploit-posted-online.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-f5-big-ip-bug-under-active-attacks-after-poc-exploit-posted-online.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-zoom-screen-sharing-bug-lets-other-users-access-restricted-apps/18128/</loc>
		<lastmod>2021-03-20T21:39:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/new-zoom-screen-sharing-bug-lets-other-users-access-restricted-apps.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/new-zoom-screen-sharing-bug-lets-other-users-access-restricted-apps.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/why-cached-credentials-can-cause-account-lockouts-and-how-to-stop-it/18133/</loc>
		<lastmod>2021-03-21T20:52:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/why-cached-credentials-can-cause-account-lockouts-and-how-to-stop-it.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/why-cached-credentials-can-cause-account-lockouts-and-how-to-stop-it.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-reveals-what-personal-data-chrome-and-its-apps-collect-on-you/18136/</loc>
		<lastmod>2021-03-21T21:00:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/google-reveals-what-personal-data-chrome-and-its-apps-collect-on-you.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/google-reveals-what-personal-data-chrome-and-its-apps-collect-on-you.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-defender-antivirus-now-automatically-mitigates-exchange-server-vulnerabilities/18139/</loc>
		<lastmod>2021-03-21T21:25:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/microsoft-defender-antivirus-now-automatically-mitigates-exchange-server-vulnerabilities.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/api-security-becomes-a-top-priority-for-enterprise-players/18149/</loc>
		<lastmod>2021-03-22T21:38:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/api-security-becomes-a-top-priority-for-enterprise-players.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/popular-netop-remote-learning-software-found-vulnerable-to-hacking/18143/</loc>
		<lastmod>2021-03-22T21:46:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/popular-netop-remote-learning-software-found-vulnerable-to-hacking.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/popular-netop-remote-learning-software-found-vulnerable-to-hacking.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-rce-vulnerability-found-in-apache-ofbiz-erp-software-patch-now/18146/</loc>
		<lastmod>2021-03-22T21:55:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-rce-vulnerability-found-in-apache-ofbiz-erp-software-patch-now.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-rce-vulnerability-found-in-apache-ofbiz-erp-software-patch-now.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-flaws-affecting-ges-universal-relay-pose-threat-to-electric-utilities/18151/</loc>
		<lastmod>2021-03-23T21:20:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-flaws-affecting-ges-universal-relay-pose-threat-to-electric-utilities.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-flaws-affecting-ges-universal-relay-pose-threat-to-electric-utilities.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/warning-a-new-android-zero-day-vulnerability-is-under-active-attack/18154/</loc>
		<lastmod>2021-03-23T21:35:44+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/warning-a-new-android-zero-day-vulnerability-is-under-active-attack.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/warning-a-new-android-zero-day-vulnerability-is-under-active-attack.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cybercriminals-exchange-tips-on-avoiding-arrest-jail-in-underground-forums/18157/</loc>
		<lastmod>2021-03-23T22:04:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/cybercriminals-exchange-tips-on-avoiding-arrest-jail-in-underground-forums.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/purple-fox-rootkit-can-now-spread-itself-to-other-windows-computers/18159/</loc>
		<lastmod>2021-03-24T21:14:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/purple-fox-rootkit-can-now-spread-itself-to-other-windows-computers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/purple-fox-rootkit-can-now-spread-itself-to-other-windows-computers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/recently-patched-vulnerability-in-thrive-themes-actively-exploited-in-the-wild/18165/</loc>
		<lastmod>2021-03-24T21:32:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/recently-patched-vulnerability-in-thrive-themes-actively-exploited-in-the-wild.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/flaws-in-two-popular-wordpress-plugins-affect-over-7-million-websites/18162/</loc>
		<lastmod>2021-03-24T21:38:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/flaws-in-two-popular-wordpress-plugins-affect-over-7-million-websites.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/flaws-in-two-popular-wordpress-plugins-affect-over-7-million-websites.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hundreds-of-fleeceware-apps-earn-dubious-ios-android-developers-over-400-million/18167/</loc>
		<lastmod>2021-03-24T22:07:40+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/hundreds-of-fleeceware-apps-earn-dubious-ios-android-developers-over-400-million.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/announcing-the-android-ready-se-alliance/18170/</loc>
		<lastmod>2021-03-25T21:10:24+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/announcing-the-android-ready-se-alliance.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/announcing-the-android-ready-se-alliance.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/announcing-the-android-ready-se-alliance-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/announcing-the-android-ready-se-alliance-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/black-kingdom-ransomware-hunting-unpatched-microsoft-exchange-servers/18173/</loc>
		<lastmod>2021-03-25T21:10:31+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/black-kingdom-ransomware-hunting-unpatched-microsoft-exchange-servers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/black-kingdom-ransomware-hunting-unpatched-microsoft-exchange-servers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/forcing-self-service-password-reset-sspr-registration-to-increase-roi/18176/</loc>
		<lastmod>2021-03-25T21:24:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/forcing-self-service-password-reset-sspr-registration-to-increase-roi.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/forcing-self-service-password-reset-sspr-registration-to-increase-roi.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/two-vulnerabilities-patched-in-facebook-for-wordpress-plugin/18179/</loc>
		<lastmod>2021-03-25T22:03:35+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/two-vulnerabilities-patched-in-facebook-for-wordpress-plugin.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/severe-vulnerabilities-patched-in-facebook-for-wordpress-plugin/18181/</loc>
		<lastmod>2021-03-25T22:27:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/severe-vulnerabilities-patched-in-facebook-for-wordpress-plugin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-5g-flaw-exposes-priority-networks-to-location-tracking-and-other-attacks/18189/</loc>
		<lastmod>2021-03-26T21:30:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/new-5g-flaw-exposes-priority-networks-to-location-tracking-and-other-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/new-5g-flaw-exposes-priority-networks-to-location-tracking-and-other-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/openssl-releases-patches-for-2-high-severity-security-vulnerabilities/18186/</loc>
		<lastmod>2021-03-26T21:44:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/openssl-releases-patches-for-2-high-severity-security-vulnerabilities.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/openssl-releases-patches-for-2-high-severity-security-vulnerabilities.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-110-active-exploitation-continues-on-unpatched-thrive-themes/18192/</loc>
		<lastmod>2021-03-26T21:54:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/episode-110-active-exploitation-continues-on-unpatched-thrive-themes.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-wordpress-improves/18184/</loc>
		<lastmod>2021-03-26T22:13:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/how-wordpress-improves.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hades-ransomware-operators-are-hunting-big-game-in-the-us/18194/</loc>
		<lastmod>2021-03-26T22:35:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/hades-ransomware-operators-are-hunting-big-game-in-the-us.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/watch-out-that-android-system-update-may-contain-a-powerful-spyware/18198/</loc>
		<lastmod>2021-03-27T21:33:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/watch-out-that-android-system-update-may-contain-a-powerful-spyware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/watch-out-that-android-system-update-may-contain-a-powerful-spyware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/apple-issues-urgent-patch-update-for-another-zero%e2%80%91day-under-attack/18201/</loc>
		<lastmod>2021-03-27T21:38:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/apple-issues-urgent-patch-update-for-another-zeroe28091day-under-attack.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/apple-issues-urgent-patch-update-for-another-zeroe28091day-under-attack.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wp-briefing-how-wordpress-improves/18196/</loc>
		<lastmod>2021-03-27T21:53:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/wp-briefing-how-wordpress-improves.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cloudflare-launches-page-shield-to-thwart-magecart-card-skimming-attacks/18204/</loc>
		<lastmod>2021-03-27T22:17:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/cloudflare-launches-page-shield-to-thwart-magecart-card-skimming-attacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wp-briefing-my-typical-day-as-wordpresss-executive-director/18206/</loc>
		<lastmod>2021-03-28T21:57:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/wp-briefing-my-typical-day-as-wordpresss-executive-director.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-cisco-jabber-bug-could-let-attackers-hack-remote-systems/18211/</loc>
		<lastmod>2021-03-28T21:59:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-cisco-jabber-bug-could-let-attackers-hack-remote-systems.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/critical-cisco-jabber-bug-could-let-attackers-hack-remote-systems.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/another-critical-rce-flaw-discovered-in-solarwinds-orion-platform/18208/</loc>
		<lastmod>2021-03-28T22:03:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/another-critical-rce-flaw-discovered-in-solarwinds-orion-platform.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/another-critical-rce-flaw-discovered-in-solarwinds-orion-platform.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/university-students-refunded-for-false-ads-touting-job-opportunities-with-microsoft-twitter/18214/</loc>
		<lastmod>2021-03-28T22:34:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/university-students-refunded-for-false-ads-touting-job-opportunities-with-microsoft-twitter.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wp-briefing-talking-full-site-editing-with-matias-ventura/18217/</loc>
		<lastmod>2021-03-29T21:37:51+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/wp-briefing-talking-full-site-editing-with-matias-ventura.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/flaws-in-ovarro-tbox-rtus-could-open-industrial-systems-to-remote-attacks/18219/</loc>
		<lastmod>2021-03-29T22:01:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/flaws-in-ovarro-tbox-rtus-could-open-industrial-systems-to-remote-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/flaws-in-ovarro-tbox-rtus-could-open-industrial-systems-to-remote-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/official-php-git-server-targeted-in-attempt-to-bury-malware-in-code-base/18227/</loc>
		<lastmod>2021-03-29T22:19:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/official-php-git-server-targeted-in-attempt-to-bury-malware-in-code-base.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/php-compromised-what-wordpress-users-need-to-know/18225/</loc>
		<lastmod>2021-03-29T22:30:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/php-compromised-what-wordpress-users-need-to-know-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/php-compromised-what-wordpress-users-need-to-know.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/php-compromised-what-wordpress-users-need-to-know-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/php-compromised-what-wordpress-users-need-to-know-2.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-bugs-could-let-hackers-bypass-spectre-attack-mitigations-on-linux-systems/18222/</loc>
		<lastmod>2021-03-29T22:37:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/new-bugs-could-let-hackers-bypass-spectre-attack-mitigations-on-linux-systems.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/new-bugs-could-let-hackers-bypass-spectre-attack-mitigations-on-linux-systems.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mobikwik-suffers-major-breach-kyc-data-of-3-5-million-users-exposed/18233/</loc>
		<lastmod>2021-03-30T21:51:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/mobikwik-suffers-major-breach-kyc-data-of-3-5-million-users-exposed.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/mobikwik-suffers-major-breach-kyc-data-of-3-5-million-users-exposed.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/so-you-want-to-make-block-patterns/18231/</loc>
		<lastmod>2021-03-30T22:34:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/so-you-want-to-make-block-patterns-29.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/so-you-want-to-make-block-patterns.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/so-you-want-to-make-block-patterns.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/so-you-want-to-make-block-patterns-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/so-you-want-to-make-block-patterns-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/so-you-want-to-make-block-patterns-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/so-you-want-to-make-block-patterns-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/so-you-want-to-make-block-patterns-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/so-you-want-to-make-block-patterns-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/so-you-want-to-make-block-patterns-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/so-you-want-to-make-block-patterns-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/so-you-want-to-make-block-patterns-4.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/so-you-want-to-make-block-patterns-6.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-to-effectively-prevent-email-spoofing-attacks-in-2021/18236/</loc>
		<lastmod>2021-03-30T22:48:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/how-to-effectively-prevent-email-spoofing-attacks-in-2021.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/how-to-effectively-prevent-email-spoofing-attacks-in-2021.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/department-of-homeland-security-email-accounts-exposed-in-solarwinds-hack/18239/</loc>
		<lastmod>2021-03-30T22:48:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/03/department-of-homeland-security-email-accounts-exposed-in-solarwinds-hack.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-are-implanting-multiple-backdoors-at-industrial-targets-in-japan/18244/</loc>
		<lastmod>2021-03-31T22:00:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-are-implanting-multiple-backdoors-at-industrial-targets-in-japan.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-are-implanting-multiple-backdoors-at-industrial-targets-in-japan.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/gaming-mods-cheat-engines-are-spreading-trojan-malware-and-planting-backdoors/18247/</loc>
		<lastmod>2021-03-31T22:25:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/gaming-mods-cheat-engines-are-spreading-trojan-malware-and-planting-backdoors.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/decided-to-move-on-from-your-ngav-edr-a-guide-for-small-security-teams-to-whats-next/18241/</loc>
		<lastmod>2021-03-31T22:30:58+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/decided-to-move-on-from-your-ngav-edr-a-guide-for-small-security-teams-to-whats-next.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/decided-to-move-on-from-your-ngav-edr-a-guide-for-small-security-teams-to-whats-next.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/22-year-old-charged-with-hacking-water-system-and-endangering-lives/18253/</loc>
		<lastmod>2021-04-01T22:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/22-year-old-charged-with-hacking-water-system-and-endangering-lives.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/22-year-old-charged-with-hacking-water-system-and-endangering-lives.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/deepdotweb-admin-pleads-guilty-to-money-laundering-charges/18250/</loc>
		<lastmod>2021-04-01T22:30:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/deepdotweb-admin-pleads-guilty-to-money-laundering-charges.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/deepdotweb-admin-pleads-guilty-to-money-laundering-charges.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/deepdotweb-dark-web-admin-pleads-guilty-to-gun-drug-purchase-kickbacks/18256/</loc>
		<lastmod>2021-04-01T22:33:31+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/deepdotweb-dark-web-admin-pleads-guilty-to-gun-drug-purchase-kickbacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-north-korean-hackers-are-targeting-researchers-through-fake-offensive-security-firm/18267/</loc>
		<lastmod>2021-04-02T22:13:16+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/google-north-korean-hackers-are-targeting-researchers-through-fake-offensive-security-firm.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-111-php-git-repository-compromised/18265/</loc>
		<lastmod>2021-04-02T22:23:12+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/episode-111-php-git-repository-compromised.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-to-vaccinate-against-the-poor-password-policy-pandemic/18259/</loc>
		<lastmod>2021-04-02T22:43:08+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/how-to-vaccinate-against-the-poor-password-policy-pandemic.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/how-to-vaccinate-against-the-poor-password-policy-pandemic.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-using-a-windows-os-feature-to-evade-firewall-and-gain-persistence/18262/</loc>
		<lastmod>2021-04-02T22:43:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-using-a-windows-os-feature-to-evade-firewall-and-gain-persistence.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-using-a-windows-os-feature-to-evade-firewall-and-gain-persistence.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/covid-19-myths-totoo-ba-ang-covid-plandemic/18271/</loc>
		<lastmod>2021-04-03T21:22:27+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/covid.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/google-limits-which-apps-can-access-the-list-of-installed-apps-on-your-device/18284/</loc>
		<lastmod>2021-04-03T22:20:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/google-limits-which-apps-can-access-the-list-of-installed-apps-on-your-device.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/google-limits-which-apps-can-access-the-list-of-installed-apps-on-your-device.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-cyrebro-can-unify-multiple-cybersecurity-defenses-to-optimize-protection/18281/</loc>
		<lastmod>2021-04-03T22:24:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/how-cyrebro-can-unify-multiple-cybersecurity-defenses-to-optimize-protection.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/how-cyrebro-can-unify-multiple-cybersecurity-defenses-to-optimize-protection.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/child-tweets-on-behalf-of-nuke-space-mission-agency-us-strategic-command/18287/</loc>
		<lastmod>2021-04-03T22:40:39+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/child-tweets-on-behalf-of-nuke-space-mission-agency-us-strategic-command.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-march-2021/18279/</loc>
		<lastmod>2021-04-03T22:48:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/the-month-in-wordpress-march-2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/533-million-facebook-users-phone-numbers-and-personal-data-leaked-online/18290/</loc>
		<lastmod>2021-04-04T22:33:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/533-million-facebook-users-phone-numbers-and-personal-data-leaked-online.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/533-million-facebook-users-phone-numbers-and-personal-data-leaked-online.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/vmware-patches-critical-vrealize-operations-platform-vulnerabilities/18296/</loc>
		<lastmod>2021-04-04T23:11:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/vmware-patches-critical-vrealize-operations-platform-vulnerabilities.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-set-up-a-fake-cybersecurity-firm-to-target-security-experts/18293/</loc>
		<lastmod>2021-04-04T23:13:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-set-up-a-fake-cybersecurity-firm-to-target-security-experts.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-set-up-a-fake-cybersecurity-firm-to-target-security-experts.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/facebook-data-leak-australians-urged-to-check-and-secure-social-media-accounts/18300/</loc>
		<lastmod>2021-04-05T22:45:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/facebook-data-leak-australians-urged-to-check-and-secure-social-media-accounts.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/pandemic-threats-the-common-threads-in-covid-19-scams-and-criminal-schemes/18308/</loc>
		<lastmod>2021-04-05T23:01:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/pandemic-threats-the-common-threads-in-covid-19-scams-and-criminal-schemes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-the-work-from-home-shift-impacts-saas-security/18302/</loc>
		<lastmod>2021-04-05T23:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/how-the-work-from-home-shift-impacts-saas-security.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/how-the-work-from-home-shift-impacts-saas-security.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/phps-git-server-hacked-to-insert-secret-backdoor-to-its-source-code/18305/</loc>
		<lastmod>2021-04-05T23:15:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/phps-git-server-hacked-to-insert-secret-backdoor-to-its-source-code.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/phps-git-server-hacked-to-insert-secret-backdoor-to-its-source-code.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/rust-in-the-android-platform/18311/</loc>
		<lastmod>2021-04-06T22:49:23+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/rust-in-the-android-platform.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/rust-in-the-android-platform.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/rust-in-the-android-platform-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/rust-in-the-android-platform-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/rust-in-the-android-platform-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/rust-in-the-android-platform.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/rust-in-the-android-platform-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/rust-in-the-android-platform-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/watch-out-mission-critical-sap-applications-are-under-active-attack/18314/</loc>
		<lastmod>2021-04-06T22:54:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/watch-out-mission-critical-sap-applications-are-under-active-attack.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/watch-out-mission-critical-sap-applications-are-under-active-attack.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/mitre-madness-a-guide-to-weathering-the-upcoming-vendor-positioning-storm/18317/</loc>
		<lastmod>2021-04-06T23:21:30+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/mitre-madness-a-guide-to-weathering-the-upcoming-vendor-positioning-storm.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/mitre-madness-a-guide-to-weathering-the-upcoming-vendor-positioning-storm.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/sap-issues-advisory-on-the-exploit-of-old-vulnerabilities-to-target-enterprise-applications/18320/</loc>
		<lastmod>2021-04-06T23:24:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/sap-issues-advisory-on-the-exploit-of-old-vulnerabilities-to-target-enterprise-applications.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/whatsapp-based-wormable-android-malware-spotted-on-the-google-play-store/18326/</loc>
		<lastmod>2021-04-07T22:52:07+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/whatsapp-based-wormable-android-malware-spotted-on-the-google-play-store.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/whatsapp-based-wormable-android-malware-spotted-on-the-google-play-store.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/android-to-support-rust-programming-language-to-prevent-memory-flaws/18323/</loc>
		<lastmod>2021-04-07T23:33:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/android-to-support-rust-programming-language-to-prevent-memory-flaws.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/android-to-support-rust-programming-language-to-prevent-memory-flaws.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/man-jailed-for-trying-to-buy-chemical-weapon-online-able-to-kill-hundreds-of-people/18331/</loc>
		<lastmod>2021-04-07T23:36:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/man-jailed-for-trying-to-buy-chemical-weapon-online-able-to-kill-hundreds-of-people.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ten-password-mistakes-that-could-get-your-wordpress-site-hacked/18329/</loc>
		<lastmod>2021-04-07T23:39:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/ten-password-mistakes-that-could-get-your-wordpress-site-hacked.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/ten-password-mistakes-that-could-get-your-wordpress-site-hacked.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/ten-password-mistakes-that-could-get-your-wordpress-site-hacked-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/ten-password-mistakes-that-could-get-your-wordpress-site-hacked-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/ten-password-mistakes-that-could-get-your-wordpress-site-hacked-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/ten-password-mistakes-that-could-get-your-wordpress-site-hacked-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/ten-password-mistakes-that-could-get-your-wordpress-site-hacked-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/ten-password-mistakes-that-could-get-your-wordpress-site-hacked-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/ten-password-mistakes-that-could-get-your-wordpress-site-hacked-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/ten-password-mistakes-that-could-get-your-wordpress-site-hacked-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/ten-password-mistakes-that-could-get-your-wordpress-site-hacked-9.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/vulnerabilities-patched-in-wp-page-builder/18339/</loc>
		<lastmod>2021-04-08T22:47:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/vulnerabilities-patched-in-wp-page-builder.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/facebook-tackles-deepfake-spread-and-troll-farms-in-latest-moderation-push/18341/</loc>
		<lastmod>2021-04-08T23:16:30+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/facebook-tackles-deepfake-spread-and-troll-farms-in-latest-moderation-push.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-exploit-unpatched-vpns-to-install-ransomware-on-industrial-targets/18336/</loc>
		<lastmod>2021-04-08T23:23:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-exploit-unpatched-vpns-to-install-ransomware-on-industrial-targets.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-exploit-unpatched-vpns-to-install-ransomware-on-industrial-targets.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-uncover-a-new-iranian-malware-used-in-recent-cyberattacks/18333/</loc>
		<lastmod>2021-04-08T23:40:23+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/researchers-uncover-a-new-iranian-malware-used-in-recent-cyberattacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/researchers-uncover-a-new-iranian-malware-used-in-recent-cyberattacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input/18353/</loc>
		<lastmod>2021-04-09T23:03:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/critical-zoom-vulnerability-triggers-remote-code-execution-without-user-input.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/alert-theres-a-new-malware-out-there-snatching-users-passwords/18345/</loc>
		<lastmod>2021-04-09T23:08:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/alert-theres-a-new-malware-out-there-snatching-users-passwords.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/alert-theres-a-new-malware-out-there-snatching-users-passwords.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/whitepaper-how-to-achieve-cmmc-security-compliance-for-your-business/18348/</loc>
		<lastmod>2021-04-09T23:17:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/whitepaper-how-to-achieve-cmmc-security-compliance-for-your-business.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/whitepaper-how-to-achieve-cmmc-security-compliance-for-your-business.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-112-wix-takes-aim-at-wordpress-with-new-ad-campaign/18351/</loc>
		<lastmod>2021-04-09T23:52:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/episode-112-wix-takes-aim-at-wordpress-with-new-ad-campaign.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-tampered-with-apkpure-store-to-distribute-malware-apps/18355/</loc>
		<lastmod>2021-04-10T23:03:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-tampered-with-apkpure-store-to-distribute-malware-apps.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-tampered-with-apkpure-store-to-distribute-malware-apps.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cisco-will-not-patch-critical-rce-flaw-affecting-end-of-life-business-routers/18358/</loc>
		<lastmod>2021-04-10T23:15:45+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/cisco-will-not-patch-critical-rce-flaw-affecting-end-of-life-business-routers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/cisco-will-not-patch-critical-rce-flaw-affecting-end-of-life-business-routers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/washington-state-educational-organizations-targeted-in-cryptojacking-spree/18361/</loc>
		<lastmod>2021-04-10T23:47:49+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/washington-state-educational-organizations-targeted-in-cryptojacking-spree.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/gigaset-android-update-server-hacked-to-install-malware-on-users-devices/18363/</loc>
		<lastmod>2021-04-11T23:32:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/gigaset-android-update-server-hacked-to-install-malware-on-users-devices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/gigaset-android-update-server-hacked-to-install-malware-on-users-devices.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/italian-man-arrested-after-allegedly-paying-hitman-in-cryptocurrency/18369/</loc>
		<lastmod>2021-04-11T23:35:18+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/italian-man-arrested-after-allegedly-paying-hitman-in-cryptocurrency.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/nist-and-hipaa-is-there-a-password-connection/18366/</loc>
		<lastmod>2021-04-11T23:40:14+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/nist-and-hipaa-is-there-a-password-connection.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/nist-and-hipaa-is-there-a-password-connection.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cybersecurity-firm-darktrace-plans-3bn-ipo-on-london-stock-exchange/18373/</loc>
		<lastmod>2021-04-12T23:23:45+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/cybersecurity-firm-darktrace-plans-3bn-ipo-on-london-stock-exchange.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wp-briefing-who-is-wordpress/18375/</loc>
		<lastmod>2021-04-12T23:36:52+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/wp-briefing-who-is-wordpress.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/what-does-it-take-to-be-a-cybersecurity-researcher/18380/</loc>
		<lastmod>2021-04-12T23:40:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/what-does-it-take-to-be-a-cybersecurity-researcher.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/what-does-it-take-to-be-a-cybersecurity-researcher.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/indian-brokerage-firm-upstox-suffers-data-breach-leaking-2-5-millions-users-data/18377/</loc>
		<lastmod>2021-04-12T23:51:32+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/indian-brokerage-firm-upstox-suffers-data-breach-leaking-2-5-millions-users-data.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/indian-brokerage-firm-upstox-suffers-data-breach-leaking-2-5-millions-users-data.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/vyveva-lazarus-hacking-groups-latest-weapon-strikes-south-african-freight/18383/</loc>
		<lastmod>2021-04-13T00:03:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/vyveva-lazarus-hacking-groups-latest-weapon-strikes-south-african-freight.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-using-websites-contact-forms-to-deliver-icedid-malware/18391/</loc>
		<lastmod>2021-04-13T23:19:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-using-websites-contact-forms-to-deliver-icedid-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-using-websites-contact-forms-to-deliver-icedid-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-namewreck-vulnerabilities-impact-nearly-100-million-iot-devices/18388/</loc>
		<lastmod>2021-04-13T23:22:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/new-namewreck-vulnerabilities-impact-nearly-100-million-iot-devices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/new-namewreck-vulnerabilities-impact-nearly-100-million-iot-devices.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/recent-patches-rock-the-elementor-ecosystem/18394/</loc>
		<lastmod>2021-04-13T23:50:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/recent-patches-rock-the-elementor-ecosystem.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-wormable-android-malware-poses-as-netflix-to-hijack-whatsapp-sessions/18396/</loc>
		<lastmod>2021-04-13T23:54:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/new-wormable-android-malware-poses-as-netflix-to-hijack-whatsapp-sessions.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/people-of-wordpress-tyler-lau/18386/</loc>
		<lastmod>2021-04-14T00:00:42+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/people-of-wordpress-tyler-lau-10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/people-of-wordpress-tyler-lau.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/people-of-wordpress-tyler-lau-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/people-of-wordpress-tyler-lau-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/people-of-wordpress-tyler-lau.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-javascript-exploit-can-now-carry-out-ddr4-rowhammer-attacks/18403/</loc>
		<lastmod>2021-04-14T23:32:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/new-javascript-exploit-can-now-carry-out-ddr4-rowhammer-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/new-javascript-exploit-can-now-carry-out-ddr4-rowhammer-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/data-of-553m-facebook-users-dumped-online-how-to-see-if-you-are-impacted/18406/</loc>
		<lastmod>2021-04-14T23:38:33+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/data-of-553m-facebook-users-dumped-online-how-to-see-if-you-are-impacted.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fbi-hacks-vulnerable-us-computers-to-fix-malicious-malware/18398/</loc>
		<lastmod>2021-04-15T00:06:48+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/fbi-hacks-vulnerable-us-computers-to-fix-malicious-malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-whatsapp-bugs-couldve-let-attackers-hack-your-phone-remotely/18400/</loc>
		<lastmod>2021-04-15T00:21:21+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/new-whatsapp-bugs-couldve-let-attackers-hack-your-phone-remotely.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/new-whatsapp-bugs-couldve-let-attackers-hack-your-phone-remotely.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-new-standard-for-mobile-app-security/18409/</loc>
		<lastmod>2021-04-15T23:58:58+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/a-new-standard-for-mobile-app-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/a-new-standard-for-mobile-app-security.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/a-new-standard-for-mobile-app-security.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/a-new-standard-for-mobile-app-security-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/a-new-standard-for-mobile-app-security-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/us-sanctions-russia-and-expels-10-diplomats-over-solarwinds-cyberattack/18414/</loc>
		<lastmod>2021-04-16T00:18:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/us-sanctions-russia-and-expels-10-diplomats-over-solarwinds-cyberattack.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/us-sanctions-russia-and-expels-10-diplomats-over-solarwinds-cyberattack.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wordpress-5-7-1-security-and-maintenance-release/18412/</loc>
		<lastmod>2021-04-16T00:28:07+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/wordpress-5-7-1-security-and-maintenance-release.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/industries-critical-to-covid-19-response-suffer-surge-in-cloud-cyberattacks/18420/</loc>
		<lastmod>2021-04-16T00:29:15+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/industries-critical-to-covid-19-response-suffer-surge-in-cloud-cyberattacks.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/1-click-hack-found-in-popular-desktop-apps-check-if-youre-using-them/18417/</loc>
		<lastmod>2021-04-16T00:35:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/1-click-hack-found-in-popular-desktop-apps-check-if-youre-using-them.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/1-click-hack-found-in-popular-desktop-apps-check-if-youre-using-them.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/meet-janeleiro-a-new-banking-trojan-striking-company-government-targets/18434/</loc>
		<lastmod>2021-04-16T23:41:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/meet-janeleiro-a-new-banking-trojan-striking-company-government-targets.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/rust-in-the-linux-kernel/18423/</loc>
		<lastmod>2021-04-16T23:57:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/rust-in-the-linux-kernel.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/rust-in-the-linux-kernel.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/rust-in-the-linux-kernel-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/rust-in-the-linux-kernel-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-113-an-unprecedented-fbi-operation-removes-webshells-from-infected-exchange-servers/18432/</loc>
		<lastmod>2021-04-17T00:02:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/episode-113-an-unprecedented-fbi-operation-removes-webshells-from-infected-exchange-servers.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/severe-bugs-reported-in-ethernet-ip-stack-for-industrial-systems/18426/</loc>
		<lastmod>2021-04-17T00:06:53+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/severe-bugs-reported-in-ethernet-ip-stack-for-industrial-systems.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/severe-bugs-reported-in-ethernet-ip-stack-for-industrial-systems.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/malware-variants-more-sophisticated-prevalent-and-evolving-in-2021/18429/</loc>
		<lastmod>2021-04-17T00:08:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/malware-variants-more-sophisticated-prevalent-and-evolving-in-2021.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/malware-variants-more-sophisticated-prevalent-and-evolving-in-2021.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/what-are-the-different-roles-within-cybersecurity/18442/</loc>
		<lastmod>2021-04-17T23:52:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/what-are-the-different-roles-within-cybersecurity.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/what-are-the-different-roles-within-cybersecurity.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/fbi-cisa-warn-fortinet-fortios-vulnerabilities-are-being-actively-exploited/18445/</loc>
		<lastmod>2021-04-17T23:58:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/fbi-cisa-warn-fortinet-fortios-vulnerabilities-are-being-actively-exploited.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/poppy-gustafsson-the-darktrace-tycoon-in-new-cybersecurity-era/18437/</loc>
		<lastmod>2021-04-18T00:09:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/poppy-gustafsson-the-darktrace-tycoon-in-new-cybersecurity-era.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/sysadmin-of-billion-dollar-hacking-group-gets-10-year-sentence/18439/</loc>
		<lastmod>2021-04-18T00:25:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/sysadmin-of-billion-dollar-hacking-group-gets-10-year-sentence.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/sysadmin-of-billion-dollar-hacking-group-gets-10-year-sentence.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/simplify-then-add-lightness-consolidating-the-technology-to-better-defend-ourselves/18450/</loc>
		<lastmod>2021-04-19T00:09:05+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/simplify-then-add-lightness-consolidating-the-technology-to-better-defend-ourselves.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/simplify-then-add-lightness-consolidating-the-technology-to-better-defend-ourselves.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/whistleblower-claims-ubiquiti-networks-data-breach-was-catastrophic/18453/</loc>
		<lastmod>2021-04-19T00:24:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/whistleblower-claims-ubiquiti-networks-data-breach-was-catastrophic.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/yikes-hackers-flood-the-web-with-100000-pages-offering-malicious-pdfs/18447/</loc>
		<lastmod>2021-04-19T00:45:03+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/yikes-hackers-flood-the-web-with-100000-pages-offering-malicious-pdfs.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/yikes-hackers-flood-the-web-with-100000-pages-offering-malicious-pdfs.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/everything-you-need-to-know-about-the-microsoft-exchange-server-hack/18465/</loc>
		<lastmod>2021-04-19T23:56:38+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/everything-you-need-to-know-about-the-microsoft-exchange-server-hack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/malware-that-spreads-via-xcode-projects-now-targeting-apples-m1-based-macs/18460/</loc>
		<lastmod>2021-04-20T00:03:28+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/malware-that-spreads-via-xcode-projects-now-targeting-apples-m1-based-macs.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/malware-that-spreads-via-xcode-projects-now-targeting-apples-m1-based-macs.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/passwordless-more-mirage-than-reality/18457/</loc>
		<lastmod>2021-04-20T00:20:27+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/passwordless-more-mirage-than-reality.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/passwordless-more-mirage-than-reality.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/widespread-attacks-continue-targeting-vulnerabilities-in-the-plus-addons-for-elementor-pro/18463/</loc>
		<lastmod>2021-04-20T00:41:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/widespread-attacks-continue-targeting-vulnerabilities-in-the-plus-addons-for-elementor-pro-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/widespread-attacks-continue-targeting-vulnerabilities-in-the-plus-addons-for-elementor-pro.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/widespread-attacks-continue-targeting-vulnerabilities-in-the-plus-addons-for-elementor-pro.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/over-750000-users-downloaded-new-billing-fraud-apps-from-google-play-store/18467/</loc>
		<lastmod>2021-04-20T23:50:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/over-750000-users-downloaded-new-billing-fraud-apps-from-google-play-store.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/over-750000-users-downloaded-new-billing-fraud-apps-from-google-play-store.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/internal-facebook-email-reveals-intent-to-frame-data-scraping-as-normalized-broad-industry-issue/18475/</loc>
		<lastmod>2021-04-20T23:52:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/internal-facebook-email-reveals-intent-to-frame-data-scraping-as-normalized-broad-industry-issue.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/severe-vulnerabilities-patched-in-redirection-for-contact-form-7-plugin/18473/</loc>
		<lastmod>2021-04-21T00:26:24+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/severe-vulnerabilities-patched-in-redirection-for-contact-form-7-plugin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ebook-why-autonomous-xdr-is-going-to-replace-ngav-edr/18470/</loc>
		<lastmod>2021-04-21T00:42:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/ebook-why-autonomous-xdr-is-going-to-replace-ngav-edr.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/ebook-why-autonomous-xdr-is-going-to-replace-ngav-edr.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-threaten-to-leak-stolen-apple-blueprints-if-50-million-ransom-isnt-paid/18482/</loc>
		<lastmod>2021-04-21T23:57:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-threaten-to-leak-stolen-apple-blueprints-if-50-million-ransom-isnt-paid.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-threaten-to-leak-stolen-apple-blueprints-if-50-million-ransom-isnt-paid.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/become-an-early-adopter-with-the-gutenberg-plugin/18480/</loc>
		<lastmod>2021-04-22T00:11:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/become-an-early-adopter-with-the-gutenberg-plugin-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/become-an-early-adopter-with-the-gutenberg-plugin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-we-fought-bad-apps-and-developers-in-2020/18477/</loc>
		<lastmod>2021-04-22T00:20:37+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/how-we-fought-bad-apps-and-developers-in-2020.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/how-we-fought-bad-apps-and-developers-in-2020.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/how-we-fought-bad-apps-and-developers-in-2020.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/how-we-fought-bad-apps-and-developers-in-2020-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/how-we-fought-bad-apps-and-developers-in-2020-2.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/psa-remove-kaswara-modern-wpbakery-page-builder-addons-plugin-immediately/18488/</loc>
		<lastmod>2021-04-22T00:39:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/psa-remove-kaswara-modern-wpbakery-page-builder-addons-plugin-immediately.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/instagram-debuts-new-tool-to-stop-abusive-message-salvos-made-through-new-accounts/18490/</loc>
		<lastmod>2021-04-22T00:40:01+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/instagram-debuts-new-tool-to-stop-abusive-message-salvos-made-through-new-accounts.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/improve-your-cyber-security-posture-by-combining-state-of-the-art-security-tools/18485/</loc>
		<lastmod>2021-04-22T00:54:55+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/improve-your-cyber-security-posture-by-combining-state-of-the-art-security-tools.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/improve-your-cyber-security-posture-by-combining-state-of-the-art-security-tools.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/signal-founder-i-hacked-police-phone-cracking-tool-cellebrite/18492/</loc>
		<lastmod>2021-04-23T00:04:26+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/signal-founder-i-hacked-police-phone-cracking-tool-cellebrite.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cost-of-account-unlocks-and-password-resets-add-up/18497/</loc>
		<lastmod>2021-04-23T00:04:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/cost-of-account-unlocks-and-password-resets-add-up.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/cost-of-account-unlocks-and-password-resets-add-up.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/solarwinds-hack-analysis-reveals-56-boost-in-command-server-footprint/18500/</loc>
		<lastmod>2021-04-23T00:08:02+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/solarwinds-hack-analysis-reveals-56-boost-in-command-server-footprint.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/researchers-find-additional-infrastructure-used-by-solarwinds-hackers/18494/</loc>
		<lastmod>2021-04-23T00:42:57+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/researchers-find-additional-infrastructure-used-by-solarwinds-hackers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/researchers-find-additional-infrastructure-used-by-solarwinds-hackers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-114-trifecta-of-compromises-affect-enterprise-systems/18509/</loc>
		<lastmod>2021-04-24T00:13:31+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/episode-114-trifecta-of-compromises-affect-enterprise-systems.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/prometei-botnet-exploiting-unpatched-microsoft-exchange-servers/18506/</loc>
		<lastmod>2021-04-24T00:15:30+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/prometei-botnet-exploiting-unpatched-microsoft-exchange-servers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/prometei-botnet-exploiting-unpatched-microsoft-exchange-servers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-qnap-nas-flaws-exploited-in-recent-ransomware-attacks-patch-it/18503/</loc>
		<lastmod>2021-04-24T00:38:28+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/new-qnap-nas-flaws-exploited-in-recent-ransomware-attacks-patch-it.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/new-qnap-nas-flaws-exploited-in-recent-ransomware-attacks-patch-it.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/toxiceye-trojan-abuses-telegram-platform-to-steal-your-data/18511/</loc>
		<lastmod>2021-04-24T00:45:35+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/toxiceye-trojan-abuses-telegram-platform-to-steal-your-data.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/passwordstate-password-manager-update-hijacked-to-install-backdoor-on-thousands-of-pcs/18516/</loc>
		<lastmod>2021-04-25T00:02:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/passwordstate-password-manager-update-hijacked-to-install-backdoor-on-thousands-of-pcs.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/passwordstate-password-manager-update-hijacked-to-install-backdoor-on-thousands-of-pcs.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/critical-rce-bug-found-in-homebrew-package-manager-for-macos-and-linux/18513/</loc>
		<lastmod>2021-04-25T00:20:54+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/critical-rce-bug-found-in-homebrew-package-manager-for-macos-and-linux.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/critical-rce-bug-found-in-homebrew-package-manager-for-macos-and-linux.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-us-justice-department-team-aims-to-disrupt-ransomware-operations/18519/</loc>
		<lastmod>2021-04-25T00:54:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/new-us-justice-department-team-aims-to-disrupt-ransomware-operations.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-exploit-vpn-to-deploy-supernova-malware-on-solarwinds-orion/18521/</loc>
		<lastmod>2021-04-26T00:42:07+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-exploit-vpn-to-deploy-supernova-malware-on-solarwinds-orion.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-exploit-vpn-to-deploy-supernova-malware-on-solarwinds-orion.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cybercriminals-using-telegram-messenger-to-control-toxiceye-malware/18524/</loc>
		<lastmod>2021-04-26T00:58:09+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/cybercriminals-using-telegram-messenger-to-control-toxiceye-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/cybercriminals-using-telegram-messenger-to-control-toxiceye-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/zero-day-vulnerabilities-in-sonicwall-email-security-are-being-actively-exploited/18527/</loc>
		<lastmod>2021-04-26T01:02:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/zero-day-vulnerabilities-in-sonicwall-email-security-are-being-actively-exploited.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/wp-briefing-your-opinion-is-our-opportunity/18533/</loc>
		<lastmod>2021-04-27T00:09:28+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/wp-briefing-your-opinion-is-our-opportunity.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/darktrace-slashes-valuation-price-estimate-ahead-of-ipo-report/18543/</loc>
		<lastmod>2021-04-27T00:48:34+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/darktrace-slashes-valuation-price-estimate-ahead-of-ipo-report.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/severe-unpatched-vulnerabilities-leads-to-closure-of-store-locator-plus-plugin/18541/</loc>
		<lastmod>2021-04-27T01:04:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/severe-unpatched-vulnerabilities-leads-to-closure-of-store-locator-plus-plugin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/minnesota-university-apologizes-for-contributing-malicious-code-to-the-linux-project/18535/</loc>
		<lastmod>2021-04-27T01:06:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/minnesota-university-apologizes-for-contributing-malicious-code-to-the-linux-project.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/minnesota-university-apologizes-for-contributing-malicious-code-to-the-linux-project.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cybersecurity-webinar-understanding-the-2020-mitre-attck-results/18551/</loc>
		<lastmod>2021-04-28T00:11:46+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/cybersecurity-webinar-understanding-the-2020-mitre-attck-results.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/cybersecurity-webinar-understanding-the-2020-mitre-attck-results.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/curious-about-full-site-editing/18546/</loc>
		<lastmod>2021-04-28T00:17:40+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/curious-about-full-site-editing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/adobe-releases-open-source-one-stop-shop-for-security-threat-data-anomaly-detection/18554/</loc>
		<lastmod>2021-04-28T00:35:52+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/adobe-releases-open-source-one-stop-shop-for-security-threat-data-anomaly-detection.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-threaten-to-leak-d-c-police-informants-info-if-ransom-is-not-paid/18548/</loc>
		<lastmod>2021-04-28T00:47:44+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-threaten-to-leak-d-c-police-informants-info-if-ransom-is-not-paid.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/hackers-threaten-to-leak-d-c-police-informants-info-if-ransom-is-not-paid.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/f5-big-ip-found-vulnerable-to-kerberos-kdc-spoofing-vulnerability/18562/</loc>
		<lastmod>2021-04-29T00:26:30+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/f5-big-ip-found-vulnerable-to-kerberos-kdc-spoofing-vulnerability.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/f5-big-ip-found-vulnerable-to-kerberos-kdc-spoofing-vulnerability.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/cybercriminals-widely-abusing-excel-4-0-macro-to-distribute-malware/18559/</loc>
		<lastmod>2021-04-29T00:32:29+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/cybercriminals-widely-abusing-excel-4-0-macro-to-distribute-malware.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/cybercriminals-widely-abusing-excel-4-0-macro-to-distribute-malware.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/getting-started-with-the-figma-wordpress-design-library/18557/</loc>
		<lastmod>2021-04-29T00:33:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-47.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-3.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-4.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-5.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-3.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-7.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-8.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-4.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-6.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-5.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-9.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-6.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-7.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-10.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-8.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-11.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/getting-started-with-the-figma-wordpress-design-library-9.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/apple-patches-macos-gatekeeper-bypass-vulnerability-exploited-in-the-wild/18565/</loc>
		<lastmod>2021-04-29T00:34:35+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/apple-patches-macos-gatekeeper-bypass-vulnerability-exploited-in-the-wild.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/luckymouse-hackers-target-banks-companies-and-governments-in-2020/18573/</loc>
		<lastmod>2021-04-30T00:29:56+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/luckymouse-hackers-target-banks-companies-and-governments-in-2020.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/luckymouse-hackers-target-banks-companies-and-governments-in-2020.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/paleohacks-data-leak-exposes-customer-records-password-reset-tokens/18576/</loc>
		<lastmod>2021-04-30T00:37:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/paleohacks-data-leak-exposes-customer-records-password-reset-tokens.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-new-php-composer-bug-could-enable-widespread-supply-chain-attacks/18570/</loc>
		<lastmod>2021-04-30T00:52:27+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/a-new-php-composer-bug-could-enable-widespread-supply-chain-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/a-new-php-composer-bug-could-enable-widespread-supply-chain-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/people-with-dyslexia-have-skills-that-we-need-says-gchq/18568/</loc>
		<lastmod>2021-04-30T01:15:04+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/04/people-with-dyslexia-have-skills-that-we-need-says-gchq.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/hackers-exploit-sonicwall-zero-day-bug-in-fivehands-ransomware-attacks/18582/</loc>
		<lastmod>2021-05-02T04:10:20+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/hackers-exploit-sonicwall-zero-day-bug-in-fivehands-ransomware-attacks.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/hackers-exploit-sonicwall-zero-day-bug-in-fivehands-ransomware-attacks.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/government-agencies-could-access-personal-data-without-consent-under-new-bill/18580/</loc>
		<lastmod>2021-05-02T04:16:11+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/government-agencies-could-access-personal-data-without-consent-under-new-bill.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/sap-admits-to-thousands-of-illegal-software-exports-to-iran/18590/</loc>
		<lastmod>2021-05-02T04:29:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/sap-admits-to-thousands-of-illegal-software-exports-to-iran.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/microsoft-finds-badalloc-flaws-affecting-wide-range-of-iot-and-ot-devices/18585/</loc>
		<lastmod>2021-05-02T04:45:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/microsoft-finds-badalloc-flaws-affecting-wide-range-of-iot-and-ot-devices.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/microsoft-finds-badalloc-flaws-affecting-wide-range-of-iot-and-ot-devices.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/episode-115-update-your-mac-gatekeeper-bypass-vulnerability-exploited-in-the-wild/18588/</loc>
		<lastmod>2021-05-02T05:04:25+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/episode-115-update-your-mac-gatekeeper-bypass-vulnerability-exploited-in-the-wild.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/westeal-a-shameless-cryptocurrency-stealer-sold-in-the-underground/18599/</loc>
		<lastmod>2021-05-03T04:41:43+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/westeal-a-shameless-cryptocurrency-stealer-sold-in-the-underground.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/passwordstate-warns-of-ongoing-phishing-attacks-following-data-breach/18596/</loc>
		<lastmod>2021-05-03T04:50:38+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/passwordstate-warns-of-ongoing-phishing-attacks-following-data-breach.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/passwordstate-warns-of-ongoing-phishing-attacks-following-data-breach.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-new-slack-channel-for-cybersecurity-leaders-outside-of-the-fortune-2000/18593/</loc>
		<lastmod>2021-05-03T05:00:36+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/a-new-slack-channel-for-cybersecurity-leaders-outside-of-the-fortune-2000.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/a-new-slack-channel-for-cybersecurity-leaders-outside-of-the-fortune-2000.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/sql-injection-vulnerability-patched-in-cleantalk-antispam-plugin/18609/</loc>
		<lastmod>2021-05-04T04:30:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/sql-injection-vulnerability-patched-in-cleantalk-antispam-plugin.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/isc-urges-updates-of-dns-servers-to-wipe-out-new-bind-vulnerabilities/18611/</loc>
		<lastmod>2021-05-04T04:34:19+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/isc-urges-updates-of-dns-servers-to-wipe-out-new-bind-vulnerabilities.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/over-40-apps-with-more-than-100-million-installs-found-leaking-aws-keys/18603/</loc>
		<lastmod>2021-05-04T04:54:08+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/over-40-apps-with-more-than-100-million-installs-found-leaking-aws-keys.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/over-40-apps-with-more-than-100-million-installs-found-leaking-aws-keys.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/a-rust-based-buer-malware-variant-has-been-spotted-in-the-wild/18606/</loc>
		<lastmod>2021-05-04T05:08:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/a-rust-based-buer-malware-variant-has-been-spotted-in-the-wild.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/a-rust-based-buer-malware-variant-has-been-spotted-in-the-wild.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/three-new-malware-families-found-in-global-finance-phishing-campaign/18624/</loc>
		<lastmod>2021-05-05T04:32:59+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/three-new-malware-families-found-in-global-finance-phishing-campaign.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/the-month-in-wordpress-april-2021/18617/</loc>
		<lastmod>2021-05-05T04:38:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/the-month-in-wordpress-april-2021.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/enabling-hardware-enforced-stack-protection-cetcompat-in-chrome/18614/</loc>
		<lastmod>2021-05-05T04:52:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/enabling-hardware-enforced-stack-protection-cetcompat-in-chrome.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/enabling-hardware-enforced-stack-protection-cetcompat-in-chrome.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/enabling-hardware-enforced-stack-protection-cetcompat-in-chrome-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/enabling-hardware-enforced-stack-protection-cetcompat-in-chrome.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/enabling-hardware-enforced-stack-protection-cetcompat-in-chrome-2.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/enabling-hardware-enforced-stack-protection-cetcompat-in-chrome-3.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/enabling-hardware-enforced-stack-protection-cetcompat-in-chrome-4.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-pingback-malware-using-icmp-tunneling-to-evade-cc-detection/18619/</loc>
		<lastmod>2021-05-05T05:02:22+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/new-pingback-malware-using-icmp-tunneling-to-evade-cc-detection.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/new-pingback-malware-using-icmp-tunneling-to-evade-cc-detection.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/how-should-the-service-desk-reset-passwords/18621/</loc>
		<lastmod>2021-05-05T05:08:28+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/how-should-the-service-desk-reset-passwords.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/how-should-the-service-desk-reset-passwords.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/banking-trojan-evolves-from-distribution-through-porn-to-phishing-schemes/18632/</loc>
		<lastmod>2021-05-06T04:30:17+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/banking-trojan-evolves-from-distribution-through-porn-to-phishing-schemes.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/new-study-warns-of-security-threats-linked-to-recycled-phone-numbers/18626/</loc>
		<lastmod>2021-05-06T04:31:10+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/new-study-warns-of-security-threats-linked-to-recycled-phone-numbers.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/new-study-warns-of-security-threats-linked-to-recycled-phone-numbers.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/bios-privesc-bugs-affect-hundreds-of-millions-of-dell-pcs-worldwide/18629/</loc>
		<lastmod>2021-05-06T04:39:13+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/bios-privesc-bugs-affect-hundreds-of-millions-of-dell-pcs-worldwide.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/bios-privesc-bugs-affect-hundreds-of-millions-of-dell-pcs-worldwide.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/ciso-challenge-check-your-cybersecurity-skills-on-this-new-competition-site/18637/</loc>
		<lastmod>2021-05-07T04:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/ciso-challenge-check-your-cybersecurity-skills-on-this-new-competition-site.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/ciso-challenge-check-your-cybersecurity-skills-on-this-new-competition-site.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://jeffric.com/making-the-internet-more-secure-one-signed-container-at-a-time/18634/</loc>
		<lastmod>2021-05-07T04:58:00+00:00</lastmod>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/making-the-internet-more-secure-one-signed-container-at-a-time.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/making-the-internet-more-secure-one-signed-container-at-a-time.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/making-the-internet-more-secure-one-signed-container-at-a-time.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/making-the-internet-more-secure-one-signed-container-at-a-time-1.gif</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://jeffric.com/blogs1/wp-content/uploads/2021/05/making-the-internet-more-secure-one-signed-container-at-a-time-2.gif</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Yoast SEO -->