<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
	xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
	xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
		http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
	<url>
		<loc>https://www.itsecurity.pt</loc>
		<changefreq>weekly</changefreq>
		<priority>1</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/pages/conhecer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/pages/privacidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/pages/utilizacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/pages/ficha-tecnica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/pages/estatuto-editorial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciiwa-lanca-curso-pratico-que-ajuda-empresas-a-implementar-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/responsavel-da-unc3t-nomeado-diretor-nacional-da-pj</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/c-days-2026-regressa-ao-porto-em-junho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/consolidacao-vs-best-of-breed-em-destaque-na-edicao-de-abril-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/empresa-portuguesa-identifica-falha-critica-no-openclaw</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercampanha-usa-avisos-legais-para-roubar-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fbi-liga-phishing-no-signal-a-russia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/empresas-reforcam-investimento-em-ia-para-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/operacao-internacional-desmantela-botnets-ddos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/finlandia-alerta-para-ciberespionagem-persistente-por-parte-da-russia-e-china</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-conclui-aquisicao-da-wiz-para-reforcar-seguranca-cloud-na-era-da-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/casa-branca-quer-reforcar-defesa-digital-e-reduzir-regras-para-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibergrupo-explora-listas-de-confianca-para-realizar-ataques-financeiros-massivos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fbi-investiga-atividade-suspeita-em-sistema-interno</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/forum-de-cibercrime-leakbase-desmantelado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/coligacao-projeta-futuro-das-redes-com-principios-de-seguranca-para-6g</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-registou-90-vulnerabilidades-zero-day-em-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/operacao-coordenada-pela-europol-desmantela-plataforma-de-phishing-tycoon2fa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/complexidade-de-ameacas-e-ia-projetam-crescimento-nos-investimentos-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/portugal-acolhe-hackathon-da-comissao-europeia-no-setor-da-defesa-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-alarga-restauro-no-windows-11</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aws-teve-duas-falhas-ligadas-a-ferramentas-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/incidente-expoe-mais-de-12-milhoes-de-contas-bancarias-em-franca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/diretor-de-ciberseguranca-do-grupo-nabeiro-e-o-entrevistado-da-proxima-it-insight-talks</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ia-e-identidade-redefinem-ameacas-em-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ameacas-a-api-crescem-com-expansao-da-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/android-17-reforca-modelo-secure-by-default</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/check-point-reforca-aposta-com-tres-aquisicoes-estrategicas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ue-quer-reforcar-protecao-de-infraestruturas-contra-ameacas-ciberneticas-e-hibridas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sophos-adquire-arco-cyber-para-reforcar-oferta-de-governacao-de-ciber-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/bruxelas-aprova-aquisicao-da-wiz-pela-google-por-32-mil-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cargos-de-ciso-ao-nivel-executivo-ganham-peso-nas-organizacoes-em-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/vasta-operacao-de-ciberespionagem-visa-governos-em-todo-o-mundo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-exige-substituicao-de-edge-devices-obsoletos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/visionware-alcanca-certificacao-ouro-em-privacidade-e-protecao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-recorreram-a-capacidades-ciberneticas-contra-defesas-aereas-do-irao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/preparado-para-a-nis2-it-insight-talks-debate-ciberseguranca-no-proximo-dia-25-de-fevereiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nsa-publica-novas-orientacoes-para-acelerar-a-adocao-de-zero-trust-nas-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/palo-alto-networks-conclui-aquisicao-da-chronosphere</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/zero-trust-para-la-do-hype-em-destaque-na-mais-recente-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-desmantela-vasta-rede-de-proxies-residenciais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/falta-de-governacao-de-ia-expoe-empresas-a-riscos-crescentes-de-seguranca-e-conformidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/berlim-endurece-postura-em-ciberseguranca-e-admite-retaliacao-no-estrangeiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/portugal-e-espanha-realizam-primeira-ligacao-transfronteirica-com-criptografia-quantica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/risco-interno-fragiliza-seguranca-das-organizacoes-europeias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mitre-lanca-framework-para-proteger-sistemas-embedded</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/oracle-corrige-centenas-de-falhas-no-primeiro-cpu-de-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/colt-testa-com-sucesso-encriptacao-quantica-em-ligacoes-transatlanticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/base-europeia-de-vulnerabilidades-entra-em-operacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ue-reforca-seguranca-com-restricoes-para-fornecedores-chineses-de-infraestruturas-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/china-prepara-exclusao-de-software-estrangeiro-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-e-cnpd-reforcam-cooperacao-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/agencias-ocidentais-alertam-para-ameacas-crescentes-a-tecnologia-operacional-industrial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-e-parceiros-lancam-principios-de-seguranca-para-ot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/crowdstrike-reforca-aposta-em-aquisicoes-com-compra-da-seraphic</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-e-autoridades-internacionais-desmantelam-servico-de-cibercrime-redvds</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/patch-tuesday-da-microsoft-corrige-zero-day-ativo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/crowdstrike-anuncia-nova-aquisicao-para-reforcar-seguranca-de-identidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-abandonam-forum-global-de-ciberseguranca-e-ameacas-hibridas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/trump-admite-acao-cyber-dos-eua-na-venezuela</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-apreendem-base-de-dados-usada-em-phishing-bancario</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mais-de-metade-das-passwords-expostas-em-2025-ja-eram-conhecidas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/servicenow-adquire-empresa-de-ciberseguranca-armis-por-775-mil-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cloudflare-aposta-em-seguranca-ia-responsavel-e-inclusao-digital-para-uma-internet-melhor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/franca-detem-jovem-suspeito-de-ciberataque-ao-ministerio-do-interior</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/novo-regime-juridico-reforca-papel-do-cncs-como-autoridade-nacional-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/encontro-reune-mais-de-cem-especialistas-de-ciberseguranca-em-lisboa-para-reforcar-cooperacao-setorial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/setor-da-industria-transformadora-bloqueia-mais-ataques-de-ransomware-mas-sofre-aumento-do-roubo-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-de-routers-de-acesso-cai-25-no-terceiro-trimestre-com-crescimento-de-21-no-sase</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/pagamentos-por-ransomware-nos-eua-ultrapassam-os-dois-mil-milhoes-de-dolares-em-tres-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-reforca-chrome-contra-ataques-de-injecoes-de-prompt</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cloudflare-registou-nova-falha-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/presidente-da-republica-promulga-diploma-que-transpoe-diretiva-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciiwa-volta-a-organizar-summit-no-inicio-de-dezembro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciber-resiliencia-em-destaque-na-mais-recente-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/pme-portuguesas-reforcam-ciber-resiliencia-apesar-do-aumento-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/conselhos-de-administracao-nao-confiam-no-investimento-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-testa-ia-com-agencia-no-windows-11-mas-alerta-para-riscos-de-seguranca-elevados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/2025-marcado-por-corrida-das-empresas-para-fazer-face-a-ataques-com-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/enisa-assume-papel-de-root-no-programa-cve</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/palo-alto-networks-expande-portfolio-com-aquisicao-da-chronosphere</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sophos-democratizar-a-ciberseguranca-tornou-se-essencial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/forum-de-ciberseguranca-da-administracao-local-decorre-a-24-e-25-de-novembro-em-famalicao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/falha-na-cloudflare-afeta-milhares-de-utilizadores-a-nivel-mundial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/exercicio-nacional-de-ciberseguranca-testa-capacidade-de-resposta-no-setor-comunicacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/marks-and-spencer-perde-quase-390-milhoes-de-libras-apos-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/deco-proteste-e-cmvm-lancam-plano-para-combater-fraudes-digitais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mitre-anuncia-versao-mais-recente-da-framework-attandck</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eset-por-cada-cem-euros-de-impacto-apenas-25-euros-sao-investidos-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/investimento-publico-em-ciberdefesa-ultrapassa-os-seis-mil-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/interrupcao-na-aws-afeta-sites-e-aplicacoes-a-nivel-mundial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/claranet-portugal-anuncia-solucao-para-ajudar-organizacoes-na-protecao-de-ativos-e-nas-exigencias-regulatorias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-publica-esquema-de-certificacao-de-servicos-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/investimento-em-ciberseguranca-cresce-37-no-terceiro-trimestre-de-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/novo-curso-alia-inteligencia-estrategica-e-capacitacao-pratica-aplicada-em-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/junte-se-a-nos-pelo-zoom-e-assista-a-it-security-conference-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/instancia-do-gitlab-atacada-levou-a-furto-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/escassez-de-talento-e-aumento-do-stress-as-dores-de-cabeca-que-continuam-a-marcar-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/organizacoes-fortemente-afetadas-por-ataques-dns-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/lisboa-recebe-conferencia-europeia-sobre-ciberdefesa-e-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-potenciados-por-ia-em-destaque-na-edicao-de-outubro-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberseguranca-ia-e-soberania-digital-o-retrato-do-it-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/balwurk-lanca-framework-para-avaliar-riscos-na-adocao-da-ia-generativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/deepfakes-e-exploracao-de-aplicacoes-de-ia-generativa-atingem-maioria-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/adocao-massiva-mas-informal-participe-no-webinar-da-ciiwa-e-conheca-as-conclusoes-do-estudo-sobre-a-ia-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/curso-da-ciiwa-prepara-lideres-para-transformar-o-potencial-da-ia-em-valor-de-negocio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/adocao-da-ia-em-portugal-ciiwa-organiza-webinar-para-apresentar-conclusoes-de-estudo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/identidade-digital-e-ciberseguranca-em-grande-destaque-no-iam-tech-day-europa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/falta-de-talento-em-ciberseguranca-leva-empresas-da-emea-a-recorrer-a-solucoes-de-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/porto-recebe-primeira-edicao-europeia-do-iam-tech-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/comissao-europeia-lanca-consulta-publica-para-definir-regras-de-transparencia-na-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ia-torna-ataques-de-phishing-mais-sofisticados-e-direcionados-a-dados-biometricos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/commvault-lanca-novas-solucoes-hyperscale-para-reforcar-ciberresiliencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/crowdstrike-anuncia-aquisicao-da-onum</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-reforca-seguranca-no-android-com-nova-verificacao-obrigatoria</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/enisa-recebe-financiamento-adicional-para-gerir-reserva-de-ciberseguranca-da-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciso-pressionados-entre-riscos-crescentes-e-governanca-da-ia-revela-relatorio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cloudflare-reforca-seguranca-da-ia-generativa-nas-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ia-e-dispositivos-conectados-redefinem-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nist-publica-diretrizes-de-sobreposicoes-de-controlo-para-gerir-seguranca-em-sistemas-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/falsas-ofertas-de-emprego-no-whatsapp-em-ascensao-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ue-abre-consulta-para-recolher-contributos-sobre-criptografia-pos-quantica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-lanca-guia-para-reforcar-ciberseguranca-de-infraestruturas-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/falta-de-talento-e-complexidade-dos-ataques-impulsionam-mercado-de-ciberseguranca-gerida</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-de-seguros-digitais-vai-duplicar-ate-2030</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ecossistema-quantico-global-prospera-com-mais-de-170-empresas-e-500-investidores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/comptia-atualiza-certificacao-linux-com-foco-em-ia-automacao-e-praticas-modernas-de-it</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/empresas-dos-eua-apostam-em-ia-e-zero-trust-para-combater-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/kali-linux-pode-ser-executado-em-containers-apple-no-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/brave-bloqueia-windows-recall-para-proteger-privacidade-dos-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-de-detecao-de-fraude-vai-duplicar-para-65-mil-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/portugal-subscreve-guia-para-organizacoes-durante-incidentes-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/gasto-mundial-em-ciberseguranca-devera-atingir-213-mil-milhoes-de-dolares-em-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/palo-alto-networks-em-negociacoes-para-adquirir-a-cyberark</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataques-de-ransomware-crescem-146-e-priorizam-extorsao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/varonis-lanca-plataforma-de-monitorizacao-de-bases-de-dados-com-foco-em-ia-e-seguranca-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/defesa-dita-novo-rumo-economico-europeu</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ethiack-reforca-equipa-tecnica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/palo-alto-networks-conclui-aquisicao-da-protect-ai-e-reforca-lideranca-na-seguranca-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/disponibilizado-desencriptador-para-vitimas-do-ransomware-phobos-e-8base</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nato-condena-ciberataques-da-russia-e-reforca-compromisso-com-a-ciberdefesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/harvest-now-decrypt-later-capgemini-alerta-para-novas-ameacas-quanticas-a-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/o-estado-da-nacao-em-destaque-na-edicao-25-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nsa-e-fbi-interromperam-campanhas-do-volt-typhoon</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/accenture-e-microsoft-reforcam-aposta-conjunta-em-ciberseguranca-alimentada-por-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciiwa-realiza-terceira-edicao-de-curso-dedicado-a-nis2-e-dora</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ue-apresenta-estrategia-quantica-para-proteger-dados-e-liderar-nova-era-da-computacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/visionware-celebra-20-anos-com-nova-imagem-e-posicionamento-estrategico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cloudflare-lanca-funcao-que-bloqueia-rastreadores-de-ia-por-padrao-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/assistentes-de-codigo-com-ia-geram-pacotes-ficticios-em-cada-cinco-respostas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nato-aprova-ciberseguranca-como-gastos-de-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/senadores-dos-eua-propoem-proibicao-do-uso-de-ia-estrangeira-em-agencias-federais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/quase-metade-das-empresas-paga-o-resgate-em-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/commvault-e-kyndryl-estabelecem-parceria-para-reforcar-ciberresiliencia-das-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/c-days-volta-esta-semana-ao-estoril</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/compuworks-anuncia-parceria-com-a-keeper-security-para-reforcar-seguranca-digital-das-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/departamento-de-justica-dos-eua-investiga-aquisicao-da-wiz-pela-google</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-reforca-soberania-digital-e-seguranca-na-europa-com-novas-solucoes-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/falha-global-na-google-cloud-deixa-servicos-indisponiveis-durante-varias-horas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-afetam-cuidados-a-pacientes-em-19-das-instituicoes-de-saude</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/c-days-regressa-a-lisboa-entre-os-dias-24-e-26-de-junho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/colt-nokia-e-honeywell-anunciam-parceria-para-testar-criptografia-quantica-segura-no-espaco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-e-psp-reforcam-alerta-contra-fraudes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/malware-destrutivo-utilizado-contra-infraestrutura-critica-na-ucrania</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/crowdstrike-e-microsoft-anunciam-colaboracao-estrategica-para-taxonomia-de-agentes-de-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-lanca-programa-gratuito-para-governos-europeus-reforcarem-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mitre-publica-roadmap-de-migracao-para-criptografia-pos-quantica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/check-point-adquire-veriti-para-reforcar-gestao-de-exposicao-a-ameacas-e-ciber-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/commvault-alarga-protecao-a-vm-no-red-hat-openshift-virtualization</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/os-negocios-estao-a-transformar-se-em-managed-services-watchguard-apresenta-nova-narrativa-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberguerra-e-it-security-summit-em-destaque-na-mais-recente-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/channel-on-2025-debate-o-futuro-das-tecnologias-empresariais-e-da-ciberseguranca-em-lisboa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/netskope-sase-summit-lisbon-inovacao-seguranca-e-testemunhos-reais-no-centro-da-transformacao-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mais-de-metade-dos-executivos-financeiros-enfrentam-dificuldades-na-prevencao-de-fraudes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/check-point-volta-a-realizar-evento-em-troia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/proofpoint-assina-acordo-para-adquirir-hornetsecurity</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-realiza-workshop-sobre-gestao-de-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/esquema-de-certificacao-de-servicos-de-ciberseguranca-esta-em-consulta-publica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/dashlane-abre-novo-escritorio-em-lisboa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/encontrar-um-bom-ciso-e-talvez-o-primeiro-e-principal-desafio-a-ultrapassar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aip-procura-reforcar-ciberdefesa-das-pme</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/redshift-cyber-summit-estreia-abordagem-ativa-para-travar-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/commvault-expande-parceria-estrategica-com-crowdstrike</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-atingem-os-paises-baixos-antes-da-cimeira-da-nato</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/qualys-atualiza-plataforma-de-protecao-dos-ciclos-de-vida-das-aplicacoes-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/bluetooth-61-reforca-privacidade-e-eficiencia-energetica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/europol-anuncia-detencoes-relacionadas-com-servicos-ddos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/watchguard-inicia-transicao-planeada-do-ceo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/esgotado-casa-cheia-para-a-estreia-da-it-security-summit-porto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberseguranca-continua-a-ser-a-maior-preocupacao-dos-cio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/palo-alto-networks-combater-ia-com-ia-precisa-de-uma-nova-estrategia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/redshift-organiza-cyber-summit-dedicada-a-doutrina-ativa-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/casa-branca-propoe-corte-de-491-milhoes-de-dolares-ao-orcamento-da-cisa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/descubra-os-workshops-da-it-security-summit-porto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/conheca-o-programa-do-ignite-on-tour-da-palo-alto-networks</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/programa-da-it-security-summit-porto-esta-oficialmente-fechado-conheca-os-nomes-da-primeira-edicao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-corrige-erro-no-exchange</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/apple-alerta-utilizadores-em-cem-paises-para-possiveis-ataques-com-spyware-avancado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cio-lutam-para-obter-valor-dos-investimentos-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/lisboa-recebe-tour-da-palo-alto-networks</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/franca-acusa-grupo-russo-de-ciberataques-a-entidades-locais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-identifica-exploracao-ativa-de-tres-vulnerabilidades-graves</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mais-de-um-terco-das-empresas-sofreram-multiplas-violacoes-de-seguranca-na-cloud-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/apagao-iberico-data-centers-e-internet-fixa-mostraram-grande-resiliencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/palo-alto-networks-vai-adquirir-empresa-de-ciberseguranca-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberseguranca-e-protecao-de-dados-lideram-prioridades-na-videovigilancia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/92-das-contas-empresariais-da-microsoft-usam-mfa-resistente-a-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/qualys-anuncia-melhorias-na-sua-solucao-policy-audit</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/orcamentos-de-ciberseguranca-deverao-crescer-40-em-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/westcon-comstor-lanca-soc-gerido-com-tecnologia-cisco-xdr-para-regiao-emea</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/maioria-dos-ceo-colocam-ciberseguranca-como-pilar-estrategico-para-expansao-empresarial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-assiste-a-crescimento-de-esquemas-potenciados-por-ia-em-anuncios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fraude-de-pagamentos-atinge-79-das-organizacoes-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/comunidade-de-ciberseguranca-em-alerta-sobre-possivel-fim-do-financiamento-do-mitre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/china-tera-admitido-ciberataques-contra-infraestrutura-dos-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fortinet-expande-fortiai-e-reforca-protecao-com-ia-em-toda-a-plataforma-security-fabric</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/hp-lanca-as-primeiras-impressoras-com-protecao-contra-ataques-quanticos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/executivos-colocam-instabilidade-regulatoria-no-topo-dos-riscos-emergentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/openssl-350-estreia-algoritmos-de-criptografia-resistentes-a-era-quantica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/oracle-confirma-violacao-de-dados-de-clientes-em-sistemas-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/apoio-ocidental-a-ucrania-contra-ciberataques-russos-diminui</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-simplifica-envio-de-e-mails-encriptados-no-gmail</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/idc-security-summit-ciber-resiliencia-e-uma-das-prioridades-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ue-quer-novo-cybersecurity-act</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/openai-quadruplica-recompensa-monetaria-para-descoberta-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/navegar-entre-as-alteracoes-regulatorias-em-destaque-na-mais-recente-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-realiza-workshop-sobre-regulamento-da-inteligencia-artificial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberameacas-potencializadas-por-ia-aumentaram-200-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/coordenador-do-cncs-abre-it-security-summit-porto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/dados-de-clientes-da-worten-estarao-a-venda-na-dark-web</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/colt-conclui-teste-de-criptografia-quantica-segura-na-sua-rede-de-fibra-otica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/candidaturas-abertas-para-o-novo-mandato-do-advisory-group-da-enisa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/gastos-mundiais-com-seguranca-deverao-crescer-122-em-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-anuncia-acordo-para-adquirir-empresa-de-ciberseguranca-por-32-mil-milhoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/servicos-de-seguranca-de-rede-cloud-e-ia-impulsionam-mercado-de-firewall-empresarial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/divida-de-ciberseguranca-coloca-organizacoes-em-risco-crescente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-de-dispositivos-de-seguranca-cresce-15-no-quarto-trimestre-de-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/inscricoes-abertas-para-a-it-security-summit-porto-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/governo-alemao-nega-interferencia-bem-sucedida-nas-eleicoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-afirma-que-vai-continuar-a-monitorizar-ciberameacas-russas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/australia-proibe-instalacao-de-software-da-kaspersky-em-sistemas-governamentais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/desinformacao-russa-teve-eleicoes-alemas-como-alvo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/parceria-estrategica-de-sophos-e-pax8-fortalece-ciberseguranca-dos-msp</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-apresenta-primeiro-chip-quantico-do-mundo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/economia-e-ciberseguranca-lideram-preocupacoes-dos-executivos-nos-proximos-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eventos-it-security-it-insight-e-it-channel-marque-na-agenda-as-principais-datas-de-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/apenas-14-dos-lideres-de-seguranca-equilibram-protecao-de-dados-e-objetivos-de-negocio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-defende-que-cibercrime-deve-ser-tratado-como-uma-ameaca-a-seguranca-nacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-portugal-anuncia-novo-national-security-officer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-comemora-dia-da-internet-mais-segura-em-aveiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/projeto-europeu-cyssde-fortalece-ciberresiliencia-das-organizacoes-europeias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fortinet-reforca-iniciativa-de-aquisicao-de-competencias-de-ciberseguranca-na-uniao-europeia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nova-edicao-da-formacao-em-ciberseguranca-para-gestores-da-ciiwa-com-inscricoes-abertas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminosos-ligados-a-russia-suspeitos-de-invadir-email-do-primeiro-ministro-britanico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sophos-conclui-aquisicao-da-secureworks-e-expande-servicos-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercrime-podera-gerar-despesas-globais-de-138-bilioes-de-dolares-ate-2028</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/desafio-aceite-it-security-summit-chega-ao-porto-em-maio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/pypi-lanca-sistema-para-melhorar-seguranca-da-cadeia-de-valor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/visionware-lanca-nova-oferta-formativa-em-ciberseguranca-para-capacitar-trabalhadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/claranet-portugal-vai-atuar-sob-a-mesma-marca-apos-aquisicao-pela-nos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ransomware-e-cibercrime-como-um-servico-na-mais-recente-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/alibaba-lanca-nova-versao-de-modelo-de-ia-e-intensifica-competicao-tecnologica-na-china</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/unitedhealth-atualiza-numero-de-vitimas-de-ataque-de-ransomware-para-190-milhoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/claranet-portugal-adquirida-pela-nos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/novo-grupo-de-ameacas-chines-ataca-fornecedor-de-vpn-sul-coreano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminosos-utilizam-falsa-identidade-do-cert-ucraniano-para-ataques-remotos-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-lanca-correcao-temporaria-para-falha-no-outlook</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-impoem-sancoes-a-cibercriminoso-e-empresa-chinesa-por-ataques-ao-departamento-do-tesouro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/inovacoes-tecnologicas-e-desafios-eticos-entre-as-tendencias-para-o-setor-da-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/comissao-europeia-anuncia-plano-para-reforcar-ciberseguranca-no-setor-da-saude</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/treino-e-colaboracao-marcam-abertura-do-port-cyber-arena-no-porto-de-sines</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/formacao-avancada-em-compliance-e-resiliencia-no-curso-nis2-e-dora-da-ciiwa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataque-a-universidade-de-eindhoven-obriga-a-cancelamento-de-atividades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/problema-na-autenticacao-multifator-da-microsoft-bloqueia-acesso-de-utilizadores-do-office-365</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/frustracao-cresce-entre-ciso-devido-a-responsabilizacao-juridica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fase-de-apresentacao-de-propostas-para-programa-europa-digital-decorre-ate-27-de-marco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/financiamento-em-ciberseguranca-atinge-95-mil-milhoes-de-dolares-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/watchguard-adquire-actzero-para-expandir-servicos-mdr-alimentados-por-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataques-de-ia-superam-ameacas-de-endpoint-como-principal-preocupacao-entre-msp</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sophos-antecipa-o-cenario-das-ciberameacas-com-o-threat-report-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/utilizadores-do-windows-10-aconselhados-a-atualizarem-sistemas-antes-do-fim-do-suporte</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/investigador-demonstra-metodo-para-ultrapassar-encriptacao-bitlocker</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-emite-aviso-urgente-para-atualizar-net</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-acrescenta-nova-operadora-a-lista-de-vitimas-de-campanha-de-ciberespionagem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fortinet-adquire-perception-point-para-reforcar-seguranca-end-to-end</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nova-versao-do-kali-linux-conta-com-14-novas-ferramentas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/arctic-wolf-adquire-cylance-da-blackberry-por-160-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-lanca-guia-para-selecionar-solucoes-de-mfa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/individuos-e-entidades-russas-sancionados-pela-ue-em-resposta-a-ameacas-hibridas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/startup-portuguesa-de-ciberseguranca-recebe-investimento-de-quatro-milhoes-de-euros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/tendencias-para-2025-destacam-centralizacao-e-automatizacao-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/russia-testa-internet-soberana-e-causa-instabilidade-em-diversas-regioes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/assista-ao-proximo-webinar-da-it-security-e-tenha-acesso-antecipado-ao-threat-report-da-sophos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sistemas-eleitorais-da-romenia-alvos-de-mais-de-85-mil-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/hornetsecurity-lanca-novas-solucoes-para-msp-e-ciso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/hp-lanca-solucao-de-seguranca-para-pc-empresariais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/o-papel-dos-ciso-em-destaque-na-mais-recente-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/portugal-lidera-avanco-europeu-com-comunicacoes-quanticas-para-a-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciiwa-realiza-evento-para-aproximar-e-consolidar-a-comunidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-exigem-mais-de-sete-meses-para-recuperacao-total</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/congresso-dos-eua-enfrenta-corrida-contra-o-tempo-para-reformular-as-regulamentacoes-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-lancam-framework-para-utilizacao-de-ia-em-infraestruturas-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/apple-reforca-seguranca-com-reinicio-automatico-no-ios-181</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/russia-bloqueia-sites-que-utilizem-funcionalidade-da-cloudflare</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/agencia-norte-americana-pede-a-colaboradores-para-limitar-utilizacao-de-smartphones</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/crowdstrike-vai-adquirir-adaptive-shield-por-300-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-cloud-obriga-utilizadores-a-utilizar-autenticacao-multifator</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/autoridades-removem-mais-de-22-mil-ip-maliciosos-ligados-a-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-usa-ia-para-detetar-vulnerabilidade-no-sqlite</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aws-captura-dominios-utilizados-por-cibergrupo-russo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/avast-disponibiliza-desencriptador-para-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-propoe-regras-para-protecao-de-dados-pessoais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sophos-organiza-evento-em-lisboa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/commvault-expande-parceria-com-a-google-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/visionware-e-inventia-anunciam-evento-com-foco-no-impacto-da-ia-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-anuncia-primeira-edicao-do-forum-de-ciberseguranca-da-administracao-local</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-confirma-incidente-de-ransomware-nas-infraestruturas-da-ama</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataque-de-ddos-atingiu-os-38-tbps-e-214-mil-milhoes-pps</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/check-point-conclui-aquisicao-de-fornecedor-de-solucoes-de-gestao-de-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/operacao-internacional-desmantela-infraestrutura-critica-da-lockbit-com-quatro-detencoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/maioria-das-empresas-considera-ia-um-beneficio-para-a-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-reforca-seguranca-do-windows-recall-apos-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/crowdstrike-anuncia-alteracoes-na-atualizacao-do-software</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/a-consolidacao-da-ciberseguranca-em-destaque-na-edicao-de-outubro-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/casa-branca-quer-banir-tecnologia-de-veiculos-conectados-oriunda-da-china-e-da-russia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/estudo-revela-que-61-dos-executivos-espera-aumento-significativo-do-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-recebe-certificacao-do-gabinete-nacional-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-passa-a-sincronizar-passkeys-entre-desktop-e-dispositivos-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/policia-australiana-invade-aplicacao-de-comunicacoes-ghost-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/atandt-paga-13-milhoes-de-dolares-para-terminar-processo-sobre-data-breach</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-incentiva-empresas-a-rever-software-para-nao-ter-vulnerabilidades-xss</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/portugal-em-posicao-de-destaque-no-global-cybersecurity-index-de-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/radio-alema-forcada-a-emitir-cassete-de-emergencia-apos-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aeroporto-de-seattle-confirma-furto-de-dados-em-ciberataque-de-agosto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-exige-atualizacao-ou-remocao-de-equipamentos-ivanti-apos-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/empregados-dos-transportes-de-londres-tem-de-fazer-reset-as-passwords-presencialmente-apos-ciberincidente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-redesenha-acesso-do-edr-ao-kernel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/visionware-lanca-terceira-edicao-de-bolsas-de-merito</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-inclui-algoritmos-pos-quanticos-na-biblioteca-symcrypt</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/wordpressorg-vai-obrigar-developers-de-plugins-a-usarem-autenticacao-de-dois-fatores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/grupo-de-cibercriminosos-russo-e-dissolvido-pelo-governo-polaco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/governo-norte-americano-retira-necessidade-de-curso-de-quatro-anos-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-encerram-sites-de-desinformacao-antes-das-eleicoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/palo-alto-networks-conclui-aquisicao-dos-ativos-saas-do-ibm-qradar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/clearview-ai-multada-em-305-milhoes-de-euros-por-uso-ilegal-de-imagens-faciais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/congresso-dos-eua-convoca-crowdstrike-apos-interrupcao-mundial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/apt-russos-reutilizam-exploits-do-grupo-nso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/auditoria-ao-fbi-revela-falhas-de-seguranca-na-gestao-de-armazenamento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nist-lanca-plataforma-open-source-para-testar-seguranca-da-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/violacao-de-dados-em-empresa-de-saude-dos-eua-impacta-43-milhoes-de-pessoas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/grupos-russos-recebem-a-maioria-do-dinheiro-resultante-de-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/seguradoras-estimam-milhares-de-milhoes-de-dolares-em-perdas-por-falha-na-crowdstrike</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-oferecem-recompensa-de-dez-milhoes-por-informacoes-sobre-cibercriminoso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/check-point-apresenta-resultados-do-segundo-trimestre-e-novo-ceo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/alteracao-de-configuracao-no-azure-impacta-varios-servicos-a-nivel-mundial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/estado-da-nacao-em-destaque-na-edicao-de-agosto-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-e-pj-reforcam-cooperacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciber-riscos-relacionados-com-os-jogos-olimpicos-vao-ser-difundidos-na-europa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-e-fbi-incita-empresas-a-eliminar-vulnerabilidades-de-injecao-de-comando</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/russia-inicia-campanha-de-influencia-nas-eleicoes-presidenciais-dos-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/decisao-da-supremo-tribunal-dos-eua-ameaca-framework-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ovhcloud-afirma-que-mitigou-maior-ataque-de-ddos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/assista-gratuitamente-ao-live-event-estado-da-nacao-no-dia-12-de-julho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/hpe-aruba-reforca-importancia-de-colocar-seguranca-nas-prioridades-das-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/receitas-de-produtos-de-seguranca-devera-continuar-a-crescer-a-dois-digitos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/exercicio-nacional-de-ciberseguranca-testou-resiliencia-do-setor-da-energia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-lanca-guia-de-adocao-de-single-sign-on-para-pme</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/estados-unidos-banem-kaspersky</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/g7-procura-estabelecer-framework-coletiva-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-e-fbi-lancam-guia-de-abordagem-a-seguranca-de-acesso-a-rede</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-realiza-exercicio-de-ciberseguranca-dedicado-ao-setor-da-energia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/opeanai-nomeia-antigo-diretor-da-nsa-para-o-conselho-de-administracao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-realiza-primeiro-exercicio-de-resposta-a-ciberataques-com-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/russia-estara-a-interferir-em-referendo-e-eleicao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-adia-funcionalidade-recall</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-de-sase-continua-a-crescer-no-primeiro-trimestre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/crescimento-do-mercado-de-seguranca-de-rede-diminui</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/campanha-de-ciberespionagem-da-china-e-mais-extensiva-do-que-se-pensava</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nato-deve-ser-mais-proativa-na-ciberdefesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cloudflare-faz-aquisicao-para-aumentar-capacidades-de-zero-trust</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nist-vai-receber-ajuda-externa-com-base-de-dados-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nis2-em-destaque-na-edicao-de-junho-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/edicao-de-2024-do-cybersecurity-challenge-pt-ja-arrancou</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciiwa-promove-evento-para-debater-futuro-da-regulacao-e-impacto-nas-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/palo-alto-networks-e-preciso-ser-eficaz-e-responder-em-tempo-real</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/palo-alto-networks-anuncia-novo-country-manager-para-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-assina-compromisso-com-entidades-intermunicipais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/intel-apresenta-correcoes-para-mais-de-90-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/android-e-ios-passam-a-alertar-utilizadores-de-localizadores-nao-desejados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/check-point-reforca-o-que-os-ciso-devem-saber-sobre-ferramentas-de-seguranca-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/russia-acusada-de-atacar-sites-do-governo-de-kosovo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/bei-aprova-atualizacao-das-regras-sobre-o-financiamento-na-industria-de-seguranca-e-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/china-suspeita-de-atacar-sistema-de-pagamento-do-exercito-britanico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-divulgam-estrategia-internacional-para-o-ciberespaco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/identificado-alegado-criador-e-administrador-do-grupo-lockbit</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-lanca-novos-produtos-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/campanha-de-ciberespionagem-apoiada-pelo-estado-do-irao-continua-a-imitar-meios-de-comunicacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/site-lockbit-e-reativado-pela-policia-com-novas-revelacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-reve-estrategia-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nato-e-ue-condenam-cibercampanhas-maliciosas-russas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/hacktivistas-estao-a-atacar-estacoes-de-tratamento-de-agua-nos-estados-unidos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/conheca-os-oradores-do-meo-empresas-talks</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/grupo-afirma-ter-infiltrado-servicos-de-seguranca-da-bielorrussia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/estrategia-people-first-devoteam-cyber-trust-quer-simplificar-respostas-e-acao-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/meo-empresas-talk-vai-focar-se-no-tema-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ibm-realiza-evento-dedicado-a-ciberseguranca-em-evora</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/governo-norte-americano-lanca-guia-para-proteger-infraestrutura-eleitoral</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/oracle-corrigiu-230-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-vai-combater-spam-com-limitacoes-de-emails-em-massa-do-exchange-online</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-lanca-referencial-de-comunicacao-de-risco-e-crise</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-lanca-sistema-de-analise-de-malware-de-ultima-geracao-para-uso-publico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-workspace-lanca-recurso-de-aprovacao-de-multi-admin-para-alteracoes-de-alto-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-cloud-anuncia-novas-ofertas-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-corrige-duas-vulnerabilidades-zero-day-exploradas-para-entregar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-reforca-seguranca-do-chrome-v8-com-nova-sandbox</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/chrome-vai-combater-roubo-de-cookies</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/airbus-anuncia-compra-de-empresa-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/reino-unido-e-nova-zelandia-acusam-china-de-ataques-a-entidades-governamentais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/engenharia-social-em-destaque-na-mais-recente-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-e-fbi-urgem-fabricantes-de-software-a-eliminar-vulnerabilidades-de-sql-injection</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/kyndryl-e-cloudflare-anunciam-alianca-estrategica-global</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fortinet-disponibiliza-certificacoes-em-ciberseguranca-para-estudantes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/check-point-cria-solucao-com-a-nvidia-para-proteger-a-infraestrutura-cloud-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/pentagono-recebeu-mais-de-50-mil-relatorios-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/grupo-ligado-a-coreia-do-norte-lanca-ciberataque-com-oito-fases-a-coreia-do-sul</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-continuam-a-investigar-operacao-de-hacking-chinesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ncsc-lanca-guia-de-seguranca-para-migracao-de-solucoes-scada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-expande-acesso-ao-copilot-for-security-com-novas-funcionalidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/diana-o-acelerador-de-inovacao-da-nato-expande-a-sua-rede-transatlantica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/visionware-assume-funcoes-como-dpo-em-mais-de-60-entidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-pagou-dez-milhoes-de-dolares-em-recompensas-por-bugs-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fortinet-junta-se-a-cybersecurity-skills-academy-da-comissao-europeia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/falhas-do-governo-britanico-deixam-o-pais-exposto-e-despreparado-face-ao-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-indica-que-cibercriminosos-russos-furtaram-codigo-fonte</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-e-nsa-partilham-melhores-praticas-para-proteger-servicos-de-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-de-sase-cresce-31-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/crowdstrike-aumenta-capacidades-de-seguranca-de-cloud-com-aquisicao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nsa-partilha-guia-para-ajudar-organizacoes-a-adotar-zero-trust</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/it-security-e-sophos-organizam-live-event-sobre-adversarios-ativos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ransomware-as-a-service-leva-a-aumento-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/industria-de-semicondutores-sul-coreana-alvo-de-ciberespionagem-pela-coreia-do-norte</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cpcecho-assina-acordo-de-parceria-com-a-cynet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/securnet-adquirida-por-grupo-espanhol</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nist-lanca-oficialmente-versao-20-do-cybersecurity-framework</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/paypal-apresenta-patente-para-detetar-cookies-furtadas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ucrania-assina-acordo-com-aliados-para-apoio-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/lockbit-volta-a-aparecer-com-novo-site</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/atena-equity-partner-adquire-participacao-maioritaria-do-grupo-redshift</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/iniciativa-da-google-procura-aumentar-ciberseguranca-atraves-de-inteligencia-artificial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/forcas-internacionais-interrompem-acoes-do-grupo-lockbit</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/credenciais-de-antigo-empregado-utilizado-em-ciberataque-a-agencia-dos-estados-unidos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/conflito-entre-a-europa-e-a-russia-nao-comeca-necessariamente-no-campo-militar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/paulo-vieira-e-o-novo-country-manager-da-netskope</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/centro-nacional-de-ciberseguranca-lanca-novos-alertas-de-vulnerabilidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/investigadores-lancam-decryptor-do-ransomware-rhysida</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/tecnologicas-planeiam-assinar-acordo-para-combater-disrupcao-eleitoral-gerada-por-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/falha-expoe-dados-de-utilizadores-do-expressvpn</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/pme-e-fornecedores-de-servicos-geridos-na-mira-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/motorola-solutions-e-google-cloud-aceleram-inovacao-em-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-realiza-exercicio-de-ciberseguranca-dedicado-as-eleicoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/onu-investiga-ciberataques-levados-a-cabo-pela-coreia-do-norte</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/data-breach-na-verizon-impacta-63-mil-empregados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/gil-shwed-vai-deixar-cargo-de-ceo-da-check-point</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/tecnologicas-formam-alianca-de-criptografia-pos-quantica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-sancionam-oficiais-do-irao-ligados-a-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/deepfakes-aumentarao-a-desconfianca-em-solucoes-de-verificacao-de-identidade-e-autenticacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-interrompe-botnet-de-cibergrupos-chines</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/equipas-de-it-e-de-seguranca-estao-cada-vez-mais-unidas-na-luta-contra-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/it-insight-realiza-mesa-redonda-em-formato-hibrido-dedicada-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/o-impacto-da-inteligencia-artificial-na-ciberseguranca-em-destaque-na-it-security-de-fevereiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/developer-do-trickbot-sentenciado-nos-estados-unidos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nova-versao-do-chrome-corrige-17-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/projeto-de-regulamento-de-implementacao-de-regime-juridico-em-consulta-publica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibergrupo-faz-se-passar-por-jornalista-em-ataques-de-spear-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/it-security-lanca-videocast-watch-o-observatorio-mensal-sobre-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/reducao-dos-custos-digitais-pode-por-em-risco-a-privacidade-e-seguranca-dos-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cinco-estrategias-de-ciber-resiliencia-que-as-empresas-devem-adotar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/juniper-networks-corrige-falha-critica-de-execucao-remota-de-codigo-em-firewalls-e-switches</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/maioria-das-organizacoes-nao-esta-confiante-na-sua-capacidade-de-superar-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mais-paises-vao-interferir-nas-eleicoes-norte-americanas-de-2024-diz-o-diretor-do-fbi</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/governo-do-reino-unido-acusado-de-ser-enganoso-sobre-novas-leis-que-afetam-a-criptografia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/5-tendencias-tecnologicas-que-vao-afetar-o-setor-da-seguranca-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fortinet-lanca-assistente-de-ia-generativa-para-acelerar-investigacao-e-correcao-de-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/registadas-mais-de-28-mil-novas-vulnerabilidades-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/russia-ataca-camaras-residenciais-na-ucrania-para-espiar-infraestrutura-de-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-faz-primeira-atualizacao-do-chrome-em-2024-com-correcao-de-seis-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-de-seguranca-iot-crescera-mais-de-20-nos-proximos-cinco-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-desativa-windows-app-installer-apos-abusos-de-cibercriminosos-para-entregar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/palo-alto-networks-conclui-aquisicao-da-talon</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-mundial-de-mfa-crescera-18-ate-2028</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/novo-decryptor-do-black-basta-explora-falha-de-ransomware-para-recuperar-ficheiros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-lanca-relatorio-sobre-ciberseguranca-ligada-a-sociedade-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/trabalhadores-remotos-ucranianos-sao-alvo-de-nova-campanha-de-espionagem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/irao-ataca-entidades-de-defesa-norte-americanas-atraves-de-novo-backdoor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-chrome-procura-por-palavras-passe-comprometidas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eleicoes-legislativas-podem-atrasar-transposicao-da-diretiva-nis2-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/informacao-pessoal-de-45-mil-pessoas-roubadas-em-ataque-a-laboratorio-norte-americano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-urge-fabricantes-a-eliminar-passwords-pre-definidas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/quatro-em-cada-dez-empresas-planeiam-subcontratar-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/lider-do-grupo-hacktivista-russo-killnet-reforma-se-e-nomeia-novo-chefe</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/descoberto-problema-de-envio-de-email-do-outlook-para-utilizadores-com-muitas-pastas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/agencia-federal-norte-americana-atacada-atraves-de-vulnerabilidade-no-adobe-coldfusion</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aberta-submissao-de-propostas-para-o-digital-2023-skills-05</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminosos-apoiados-pelo-kremlin-atacam-sistemas-outlook-nao-corrigidos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/industria-desportiva-e-cada-vez-mais-alvo-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-sanciona-grupo-de-ciberespionagem-norte-coreano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-urge-escolas-a-melhorar-a-sua-ciber-resiliencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-e-cncs-do-reino-unido-anunciam-diretrizes-para-desenvolvimento-seguro-de-sistemas-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/uma-em-cada-34-empresas-sofreram-tentativa-de-ataque-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ameacas-internas-em-destaque-na-edicao-de-dezembro-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/canon-emea-reforca-seguranca-contra-vulnerabilidades-atraves-da-autorizacao-cna</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataque-norte-coreano-a-dispositivos-cyberlink-afetou-mais-de-cem-dispositivos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/autenticacao-de-impressao-digital-do-windows-hello-contornada-em-portateis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-investiga-data-breach-em-laboratorio-de-investigacao-nuclear</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/marinha-dos-eua-revela-primeira-estrategia-cibernetica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-pagou-63-milhoes-de-dolares-em-recompensas-por-bugs-nos-ultimos-dez-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/morgan-stanley-multada-em-65-milhoes-de-dolares-por-expor-informacoes-de-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/investigacao-desvenda-taticas-de-ciberespionagem-russa-contra-entidades-ucranianas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/china-e-coreia-do-norte-sao-os-principais-autores-de-ataques-contra-a-russia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibergrupo-russo-explora-vulnerabilidade-do-winrar-para-atacar-embaixadas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/grupo-de-ransomware-reclama-a-sec-por-ataque-nao-reportado-pela-empresa-visada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-corrige-vm-do-windows-server-afetadas-por-atualizacao-previa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/intel-corrige-vulnerabilidade-grave-que-afeta-cpu</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-descreve-esforcos-de-ciberseguranca-assentes-em-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/palavra-passe-mais-utilizada-em-portugal-e-admin</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ue-formaliza-apoio-a-ucrania-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/grupo-de-ransomware-divulga-dados-exfiltrados-da-boeing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aliados-da-nato-apoiam-criacao-de-centro-cooperativo-para-combater-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/bitsight-nomeia-novo-vice-presidente-senior-consultor-global-de-ciber-risco-na-regiao-emea</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-lanca-secure-future-initiative</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/devoteam-cyber-trust-lanca-framework-de-ciber-resiliencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/palo-alto-networks-planeia-adquirir-a-talon-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-play-vai-adicionar-crachas-de-auditorias-de-seguranca-a-aplicacoes-de-vpn</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/accenture-inaugura-centro-de-excelencia-de-cloud-security-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/solarwinds-e-processada-por-reguladores-dos-eua-apos-ataque-em-2020</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciiwa-e-dlc-promovem-curso-para-desenvolver-competencias-em-seguranca-da-informacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/gastos-mundiais-com-ciberseguranca-aumentam-para-19-mil-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/developer-do-ragnar-locker-detido-em-acao-conjunta-de-11-paises</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/exercicio-nacional-de-ciberseguranca-com-balanco-positivo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-partilhara-mais-informacoes-sobre-vulnerabilidades-exploradas-por-agentes-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/exclusive-networks-a-frequencia-dos-ataques-e-mais-que-muita</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/equifax-multada-em-13-milhoes-de-euros-por-violacao-de-dados-em-2017</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/exercicio-nacional-de-ciberseguranca-tem-lugar-esta-semana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-expande-programa-bug-bounty-com-eventos-ctf</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-e-yahoo-anunciam-novos-requisitos-de-autenticacao-de-email</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cybers3c-selecionada-para-o-luxembourg-internet-days-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mas-configuracoes-reforcam-importancia-de-seguranca-por-design-diz-cisa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/visionware-conquista-o-ouro-nos-selos-de-maturidade-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/portugal-participa-em-campanha-internacional-de-prevencao-de-cibercrime-da-rede-intercop</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/a-nova-face-do-phishing-em-destaque-na-it-security-de-outubro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/luis-rato-e-o-novo-national-security-officer-da-microsoft-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/administracao-publica-portuguesa-investiu-mais-de-quatro-milhoes-de-euros-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/watchguard-adquire-cyglass-para-potenciar-ndr-baseada-em-ia-e-recursos-xdr</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/crowdstrike-adquire-empresa-israelense-bionic</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/hackers-eticos-testam-equipamentos-de-votacao-antes-das-eleicoes-nos-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/operacao-internacional-encerra-markerplace-na-dark-web</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/83-dos-profissionais-de-seguranca-de-ti-afirmam-que-o-burnout-causa-violacoes-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisco-adquire-splunk-e-reforca-capacidades-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/commvault-anuncia-nova-versao-da-sua-plataforma-com-reforco-de-protecao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fortinet-realiza-evento-para-clientes-e-parceiros-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-sase-ultrapassa-os-dois-mil-milhoes-de-dolares-pela-primeira-vez</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nova-ciberestrategia-do-pentagono-baseia-se-na-invasao-russa-da-ucrania</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sophos-organiza-eventos-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-de-dispositivos-de-seguranca-cresceu-76-no-segundo-trimestre-de-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/visionware-investe-20-mil-euros-em-bolsas-de-merito</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-e-mitre-lancam-ferramenta-para-emulacao-de-ataques-ot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/5g-huawei-avanca-com-acao-administrativa-contra-entidade-do-estado-portugues</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/estrategia-nacional-de-seguranca-do-ciberespaco-em-destaque-no-novo-boletim-do-cncs</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/tratado-da-onu-sobre-cibercrimes-pode-ser-desastroso-para-os-direitos-humanos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-proposta-de-lei-quer-politica-de-divulgacao-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/negociacoes-finais-do-tratado-da-onu-sobre-cibercrimes-estao-a-decorrer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/agencias-dos-eua-publicam-diretrizes-para-ajudar-empresas-na-migracao-para-a-criptografia-pos-quantica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/polonia-toma-medidas-contra-servico-de-hospedagem-usado-no-cibercrimes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/grupo-de-ciberespionagem-coloca-diplomatas-europeus-na-bielorrusia-como-alvo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/dez-formas-para-mitigar-a-probabilidade-de-sofrer-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cerca-de-11-milhoes-de-pacientes-afetados-por-violacao-de-dados-a-fornecedor-de-saude-nos-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mais-de-40-dos-zero-days-em-2022-tiveram-origem-em-variantes-de-vulnerabilidades-anteriores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sophos-lanca-managed-detection-and-response-para-o-microsoft-defender</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/o-estado-da-nacao-em-ciberseguranca-em-destaque-na-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-publica-plano-de-implementacao-de-estrategia-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-play-tem-novo-requisito-para-conter-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/falha-de-seguranca-revelada-pode-expor-dados-sensiveis-de-milhoes-de-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/duas-aplicacoes-no-google-play-enviavam-dados-para-servidores-na-china</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/reduzir-as-despesas-de-ciberseguranca-sem-comprometer-as-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataque-a-fornecedor-de-it-expoe-dados-de-gigante-de-semicondutores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/gchq-revela-que-governo-britanico-sofreu-ciberataque-de-espionagem-ha-20-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/varios-estados-norte-americanos-investigam-campanha-do-siegedsec</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/assista-gratuitamente-ao-estado-da-nacao-no-dia-12-de-julho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/gestao-da-superficie-de-ataque-e-principal-prioridade-para-ciso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/governo-norte-americano-coloca-ciberseguranca-como-prioridade-de-investimento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mais-de-seis-mil-presos-no-caso-da-plataforma-de-comunicacoes-criptografadas-encrochat</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-apoia-clinicas-de-ciberseguranca-com-doacao-de-20-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-corrige-vulnerabilidades-do-azure</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/novo-info-stealer-ganha-popularidade-entre-cibercriminosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-anuncia-investimento-em-sete-centros-de-competencias-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/reino-unido-duplica-financiamento-do-ukraine-cyber-program</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-oferece-recompensa-de-dez-milhoes-por-informacoes-do-ransomware-clop</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/visionware-e-universidade-de-coimbra-anunciam-acordo-estrategico-de-cooperacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/c-days-volta-esta-semana-ao-porto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sensibilizacao-e-capacitacao-dos-tecnicos-sao-principal-meio-de-reducao-de-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisco-portugal-prepara-se-para-lancar-academia-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataques-contra-grandes-infraestruturas-vao-continuar-a-aumentar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/check-point-2023-e-o-ano-da-ia-e-de-preparar-a-ciberseguranca-na-web3</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/huawei-excluida-da-rede-5g-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/agencias-norte-americanas-atualizam-guia-para-parar-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/account-takeover-e-siem-em-destaque-na-edicao-de-junho-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibergrupo-apoiado-pela-china-tera-comprometido-empresas-de-infraestruturas-criticas-nos-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-organiza-sessao-de-discussao-sobre-estrategia-nacional-de-seguranca-do-ciberespaco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/publicacao-do-grupo-medianext-realiza-encontro-com-leitores-a-1-de-junho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/colaboracao-entre-governos-empresas-e-reguladores-e-essencial-para-desenvolver-mecanismos-de-seguranca-para-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-avancam-com-legislacao-focada-na-seguranca-do-open-source</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cyber-defense-center-da-nato-tem-mais-quatro-paises-membros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-e-governo-lancam-campanha-para-o-bom-uso-do-ciberespaco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/dados-de-dois-milhoes-de-veiculos-estiveram-em-risco-durante-uma-decada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/faturacao-da-visionware-cresce-22-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/reino-unido-preocupado-com-incidentes-de-ransomware-mantidos-em-segredo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-vai-permitir-que-utilizadores-procurem-o-seu-id-do-gmail-na-dark-web</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/governo-dos-eua-desmantela-malware-de-ciberespionagem-russo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/grupo-pro-russia-coloca-site-do-senado-frances-em-baixo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-lanca-novo-programa-de-treino-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/check-point-tem-novo-presidente-de-vendas-para-a-emea</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/centro-nacional-de-ciberseguranca-lanca-relatorio-sobre-tecnologias-emergentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/84-dos-lideres-empresariais-portugueses-afirma-necessitar-de-ajuda-para-implementar-uma-estrategia-resiliente-eficaz</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/empresa-alema-de-servicos-de-it-desliga-sistemas-apos-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/utilizadores-de-iphone-reportam-problemas-ao-instalar-rapid-security-response</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aumentam-processos-judiciais-por-causa-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/finlandia-regista-aumento-de-ciberataques-depois-de-se-juntar-a-nato</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/comissao-europeia-lanca-cybersecurity-skills-academy</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/qualys-e-trend-micro-aliam-se-na-peninsula-iberica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/novo-malware-rouba-400-mil-dolares-em-criptomoedas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/joe-levy-passa-a-liderar-o-sophos-technology-group-e-bill-robbins-e-president-of-worldwide-field-operations</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/kaspersky-inclui-novas-protecoes-criptograficas-para-utilizadores-no-seu-portfolio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataques-de-ransomware-atingem-recorde-historico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/dark-web-e-porta-principal-para-cibercriminosos-venderem-aplicacoes-maliciosas-no-google-play</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fornecedor-europeu-de-ciberseguranca-adquire-empresa-portuguesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataque-causou-atrasos-em-tratamentos-em-hospital-do-canada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-de-protecao-de-infraestruturas-criticas-devera-movimentar-143-mil-milhoes-de-dolares-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/exfiltracao-de-dados-na-hyundai-expoe-informacoes-de-clientes-em-franca-e-italia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/openai-vai-pagar-ate-20-mil-dolares-a-utilizadores-que-reportem-vulnerabilidades-no-chatgpt</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-entre-os-riscos-que-mais-preocupam-as-empresas-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/western-digital-com-dificuldades-em-resolver-problemas-no-my-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/msi-confirma-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/grupo-apt-atacou-organizacoes-em-territorio-palestiniano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ministerio-da-economia-tera-sido-alvo-de-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/onenote-da-microsoft-vai-bloquear-mais-de-cem-extensoes-de-ficheiros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nato-procura-testar-seguranca-de-ativos-web</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/siresp-bootcamp-2023-contou-com-mais-de-360-participantes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/setores-dos-servicos-e-tecnologias-e-media-responsaveis-por-metade-dos-incidentes-de-ciberseguranca-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/a-seguranca-do-ot-em-destaque-na-edicao-de-abril-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sete-em-cada-dez-pessoas-em-portugal-preocupadas-sobre-o-que-e-real-e-falso-na-internet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/exfiltracao-de-dados-expoe-quase-oito-milhoes-de-cartas-de-conducao-na-australia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sophos-ajuda-a-transformar-chatgpt-num-copiloto-de-ciberdefesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/siresp-bootcamp-aborda-ciberseguranca-em-redes-de-comunicacoes-missao-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/maioria-das-empresas-acreditam-que-trabalho-remoto-possa-ser-causa-de-violacao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/a-it-security-conference-2023-vai-realizar-se-num-espaco-magnifico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/colt-implementa-plataforma-de-zero-trust-na-sua-jornada-de-transformacao-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/inteligencia-artificial-alavanca-defesa-de-redes-e-protecao-contra-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/reino-unido-considera-banir-tiktok-de-telemoveis-de-funcionarios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/perdas-por-causa-do-cibercrime-excederam-os-dez-mil-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/casa-branca-procura-aumentar-investimento-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/versao-pirateada-do-final-cut-pro-utilizado-para-instalar-cryptominers-em-dispositivos-apple</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aeroportos-e-operadores-de-avioes-norte-americanos-terao-de-aumentar-ciber-resiliencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/chefe-do-cyber-command-e-da-nsa-defende-estrutura-de-lideranca-conjunta</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/vulnerabilidade-em-plataforma-de-gestao-da-toyota-tera-dado-acesso-a-dados-de-consumidores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/acer-confirma-fuga-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/alemanha-e-ucrania-apreendem-equipamentos-de-suspeitos-por-detras-do-doppelpaymer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-lanca-nova-edicao-do-curso-cidadao-ciberinformado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fbi-e-cisa-alerta-para-ciberataques-com-ransomware-royal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/casa-branca-lanca-estrategia-nacional-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/conheca-o-programa-do-c-days-madeira</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/tempo-entre-divulgacao-de-vulnerabilidades-e-exploracao-esta-a-diminuir</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-defender-e-agora-descarregado-automaticamente-para-clientes-do-365</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fabricantes-de-tecnologia-estao-a-operar-no-limite-do-acidente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-lancam-novas-sancoes-a-entidades-que-ajudam-operacoes-ciberneticas-russas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-urge-remocao-de-exclusoes-do-antivirus-do-exchange</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nau-e-incode2030-lancam-curso-de-privacidade-e-seguranca-em-ambientes-digitais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/uniao-europeia-bane-tiktok-de-dispositivos-oficiais-de-funcionarios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-contra-a-ucrania-voltaram-se-para-os-paises-da-nato</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/pressao-e-stress-levarao-quase-metade-dos-lideres-de-ciberseguranca-a-mudarem-de-trabalho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-e-governo-regional-da-madeira-organizam-c-days-em-marco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/falhas-na-gestao-de-riscos-de-terceiros-estao-a-prejudicar-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-vai-reforcar-firmware-do-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercampanha-de-varios-anos-no-godaddy-infetou-sites-e-servidores-com-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/moldova-pede-apoio-apos-ciberataques-russos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/samsung-adiciona-protecao-contra-ataques-zero-click</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-de-sase-devera-exceder-os-60-mil-milhoes-de-dolares-em-cinco-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/alvos-diplomaticos-na-america-do-sul-vitimas-de-ciberespionagem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-de-tecnologias-de-seguranca-de-rede-vai-continuar-a-crescer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cloudflare-tera-parado-maior-ataque-ddos-de-que-ha-registo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nist-define-algoritmo-ascon-como-standard-para-proteger-dados-em-dispositivos-iot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/numero-de-pedidos-de-patentes-de-ciberseguranca-sobe-na-ultima-decada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/rede-tor-sob-pressao-de-ataques-ddos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminosos-norte-coreanos-roubaram-ativos-digitais-no-valor-de-630-milhoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/descobertas-multiplas-vulnerabilidades-no-sistema-operativo-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ministerio-alemao-nomeia-nova-chefe-de-ciberseguranca-depois-de-escandalo-ligado-a-russia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-lanca-script-para-recuperar-servidores-encriptados-nos-ataques-esxiargs</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/academia-fortinet-forma-tecnicos-em-ciberseguranca-no-politecnico-da-guarda</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/grupos-de-cibercriminosos-pro-russia-recorrem-a-ataques-de-ddos-personalizados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/save-the-date-segunda-edicao-da-it-security-conference-acontece-a-12-de-outubro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/parceria-entre-schneider-electric-e-bitsight-quer-melhorar-detecao-da-exposicao-da-tecnologia-operacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/soberania-e-compliance-de-dados-moldam-decisoes-do-it</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/red-team-vs-blue-team-em-destaque-na-mais-recente-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ups-sao-importantes-para-protecao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/administracao-publica-portuguesa-investiu-perto-de-nove-milhoes-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/agencia-dos-eua-publica-diretrizes-sobre-ciberseguranca-para-ajudar-na-transicao-para-o-ipv6</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibergrupo-norte-coreano-expande-metodos-de-ataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberguerra-preocupa-maioria-das-organizacoes-nacionais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/receitas-de-ataques-de-ransomware-terao-descido-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/diretor-do-fbi-mostra-se-preocupado-com-programa-de-ia-da-china</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/t-mobile-sofre-violacao-de-dados-de-37-milhoes-de-contas-de-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-baseados-na-cloud-aumentaram-48-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/diretor-da-nsa-incentiva-renovacao-de-poderes-de-agencias-de-espionagem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/grupo-apt-lancou-sete-ataques-bem-sucedidos-a-organizacoes-governamentais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/meta-multada-em-390-milhoes-de-euros-por-violacao-de-dados-na-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/base-de-dados-de-utilizadores-do-twitter-disponibilizada-online</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/palavra-password-e-123456-foram-as-senhas-mais-usadas-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercomando-norte-americano-tem-mais-poder-e-obrigacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminosos-terao-tentado-atacar-refinaria-de-petroleo-de-pais-da-nato</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aws-recebe-certificacao-do-gabinete-nacional-de-seguranca-portugues</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/juiza-ordena-que-arguidos-no-caso-da-botnet-glupteba-paguem-despesas-legais-da-google</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminoso-envolvido-em-esquema-de-sim-swapping-condenado-a-prisao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/gabinete-dos-eua-incita-agencias-de-servicos-criticos-a-realizarem-avaliacoes-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ransomware-devera-crescer-15-em-relacao-a-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/infraestruturas-criticas-em-destaque-na-edicao-9-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/identificada-campanha-de-spyware-que-visa-utilizadores-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cidadaos-estonios-presos-por-fraude-de-milhoes-com-criptomoeda</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberameacas-e-governacao-do-it-entre-as-principais-preocupacoes-dos-auditores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminosos-usam-microsoft-customer-voice-para-lancar-ataques-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-multada-em-quase-400-milhoes-por-rastrear-localizacao-de-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/redacao-da-it-security-recebe-senior-security-advisor-da-sophos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/agencia-europeia-de-defesa-reforca-cooperacao-para-protecao-do-ciberespaco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/2023-pode-trazer-mais-ataques-a-escala-mundial-e-regulamentacao-governamental</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/utilities-foi-industria-mais-atacada-em-portugal-em-outubro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/industria-transformadora-e-o-setor-que-paga-resgates-de-ransomware-mais-elevados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/assista-gratuitamente-ao-webinar-sobre-a-maturidade-de-ciberseguranca-das-organizacoes-nacionais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/riscos-ciberneticos-entre-os-menos-valorizados-pelos-lideres-empresariais-do-g20</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-lanca-atualizacao-para-resolver-vulnerabilidade-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/vitimas-de-incidente-de-violacao-de-dados-processam-servico-publico-de-transporte-nos-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/linkedin-lanca-novas-funcionalidades-para-combater-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/openssl-project-vai-lancar-patch-para-vulnerabilidade-considerada-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/d-link-lanca-firewall-empresarial-dbg-2000-sd-wan-cloud-gateway</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/zoom-para-macos-possui-vulnerabilidade-de-alta-gravidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/qualys-adquire-plataforma-de-ia-e-ml-da-blue-hexagon</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/organizacoes-governamentais-alvo-de-ransomware-tem-taxa-mais-elevada-de-encriptacao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/edicao-de-2022-da-it-security-conference-esta-esgotada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciiwa-lanca-formacao-de-ciberseguranca-para-gestores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/conselhos-de-administracao-acreditam-que-vao-sofrer-ciberataques-em-um-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminosos-atacam-software-corporativo-de-atendimento-ao-cliente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/exploracao-de-vulnerabilidades-e-principal-vetor-de-acesso-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/enisa-promove-mes-europeu-de-ciberseguranca-pelo-decimo-ano-consecutivo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ransomware-em-destaque-na-mais-recente-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/hackers-ajudam-protestantes-iranianos-atraves-do-telegram-signal-e-dark-web-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/equipas-de-secops-inundadas-com-dezenas-de-incidentes-por-dia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/vendas-de-dados-confidenciais-de-hospitais-e-clinicas-na-dark-web-aumentam</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/estudo-aponta-para-diminuicao-de-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/malware-em-repositorios-de-open-source-cresce-700-em-tres-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ministerio-publico-investiga-ciberataque-a-tap</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminoso-responsavel-por-violacao-de-dados-na-uber-com-ligacoes-ao-lapsuss</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/as-recomendacoes-na-hora-de-gerir-o-orcamento-de-seguranca-da-empresa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/it-security-conference-anuncia-programa-completo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/setor-do-retalho-foi-o-segundo-mais-afetado-por-ataques-de-ransomware-em-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/expostos-dados-de-mais-de-50-mil-utilizadores-do-revolut</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminosos-apagam-dados-de-grupo-hoteleiro-por-diversao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/tentativas-de-intrusao-aumentaram-50-desde-o-ano-passado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/malware-agent-tesla-afetou-21-das-empresas-em-agosto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fbi-alerta-para-ciberataques-a-servicos-de-cuidados-de-saude</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/melhoradas-protecoes-do-chrome-contra-bugs</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminoso-acede-a-dados-da-uber-nos-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-e-fbi-juntam-se-para-combater-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/wetransfer-usado-para-espalhar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sites-do-sporting-e-do-fc-porto-alvos-de-ataques-ddos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisco-garante-que-ciberataque-nao-impactou-negocio-e-servicos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/operacao-wt1shop-pj-e-fbi-desmantelam-site-de-compra-e-venda-de-milhoes-de-dados-pessoais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ministerio-publico-abre-inquerito-sobre-documentos-da-nato-a-venda-na-dark-web</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/vulnerabilidade-log4j-utilizada-em-campanha-contra-setor-energetico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/montenegro-alvo-de-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/supply-chain-volatil-a-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cysource-chega-a-portugal-com-foco-na-detecao-de-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mais-de-1500-ciberataques-contra-redes-empresariais-ucranianas-por-semana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/documentos-enviados-pela-nato-para-portugal-a-venda-na-dark-web</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/grupo-de-hackers-killnet-ataca-instituicoes-governamentais-do-japao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/jornal-i-alvo-de-novo-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/custos-de-ciberataques-continuam-a-subir</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/setor-energetico-italiano-alvo-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/estudo-indica-que-numero-de-ciberataques-ligados-ao-conflito-russia-ucrania-e-baixo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-abre-programa-de-recompensas-para-descobrir-bugs-em-projetos-open-source</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/visibilidade-dos-ativos-e-dos-maiores-desafios-para-os-profissionais-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciber-resiliencia-devera-ser-integrada-no-armazenamento-empresarial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/lastpass-confirma-roubo-de-parte-do-codigo-fonte-e-dados-sensiveis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/gastos-com-ciberseguranca-vao-aumentar-quase-11-na-europa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/landing-pages-utilizadas-para-roubar-credenciais-de-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/2022-assiste-a-grande-volume-de-fusoes-e-aquisicoes-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/balanco-de-riscos-ciberneticos-constante-pode-proteger-melhor-as-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-aumentam-42-no-primeiro-semestre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/boas-praticas-de-gestao-de-risco-e-planos-de-seguranca-de-informacao-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/colt-lanca-solucao-sase</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/maioria-dos-ciberataques-teve-como-principal-entrada-a-exploracao-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/custo-medio-global-de-violacoes-de-dados-atinge-maximo-historico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aumento-de-fraude-no-e-commerce-inviabiliza-crescimento-das-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/segmento-de-xdr-podera-crescer-mais-de-800-ate-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/empresas-estao-a-redirecionar-a-estrategia-de-seguranca-para-a-observacao-dos-riscos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/portugal-inverte-tendencia-mundial-e-regista-queda-de-4-nos-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nvidia-utilizada-em-esquema-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aprovada-candidatura-para-implementacao-de-segmento-de-rede-de-comunicacao-quantica-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/linkedin-e-a-marca-mais-imitada-em-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-incita-organizacoes-a-instalar-correcao-para-bug-do-windows-11</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/o-estado-da-nacao-em-ciberseguranca-em-destaque-na-edicao-de-agosto-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sap-lanca-patches-para-vulnerabilidades-de-alta-gravidade-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/agencias-norte-americanas-criam-post-quantum-cryptography-initiative</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/vector-capital-compra-posicao-maioritaria-na-watchguard</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/abertas-as-inscricoes-para-fazer-parte-da-equipa-cybersecuritychallengept</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/assista-gratuitamente-ao-live-event-da-it-security---estado-da-nacao-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/volume-de-ransomware-cresce-rapidamente-no-primeiro-trimestre-de-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/carnival-cruises-paga-multa-de-125-milhoes-por-data-breach</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/capgemini-abre-novos-centros-dedicados-a-ciberseguranca-e-a-servicos-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/setor-da-saude-foi-o-que-registou-percentagem-mais-elevada-de-ataques-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/avancos-na-inteligencia-de-ciberameacas-ajudam-ucrania-na-resistencia-a-ataques-russos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/desmantelamento-de-grupo-criminoso-de-phishing-leva-a-nove-detencoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/quem-vende-mais-ciberseguranca-a-administracao-publica-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-arranca-nova-edicao-do-curso-cidadao-cibersocial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cloudflare-deteta-maior-ataque-ddos-alguma-vez-registado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/lancada-operacao-de-spear-phishing-para-roubo-de-identidade-de-altos-perfis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/exercicio-nacional-de-ciberseguranca-contou-com-a-participacao-de-45-entidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/tempo-de-permanencia-dos-atacantes-aumentou-36-em-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/commvault-anuncia-sistema-de-alerta-para-detecao-e-resposta-a-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminosos-aproveitam-se-de-relacoes-da-cadeia-de-valor-para-distribuir-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-assina-memorando-de-entendimento-para-formar-dez-mil-profissionais-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fbi-alerta-para-grupo-cibercriminoso-que-conduz-campanhas-de-assedio-em-troca-de-resgate</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/c-days-2022-quer-descentralizar-a-ciberseguranca-dos-incidentes-e-colocar-a-aposta-na-prevencao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/lideres-empresariais-menos-confiantes-nas-suas-capacidades-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/descobertas-oito-vulnerabilidades-que-ameacam-infraestruturas-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mcafee-anuncia-novo-ceo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/o-fator-humano-em-destaque-na-edicao-de-junho-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/estudo-indica-que-setor-dos-servicos-e-o-que-tem-menos-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/c-days-regressa-ja-no-inicio-de-junho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-contra-paises-da-uniao-europeia-vao-aumentar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberespionagem-chinesa-aponta-a-institutos-de-investigacao-de-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/activesys-reune-parceiros-e-clientes-em-percurso-pelo-douro-vinhateiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/conferencia-cyber-pesco-projects-realiza-se-este-mes-em-lisboa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ransomware-cresce-14-a-nivel-global</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/thales-group-assina-acordo-de-aquisicao-por-holding-que-agrega-s21sec-e-excellium</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/casa-branca-quer-dar-prioridade-a-investigacao-contra-a-kaspersky</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/centro-de-ciberseguranca-do-reino-unido-enviou-33-milhoes-de-alertas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/apple-google-e-microsoft-aumentam-suporte-para-sign-in-sem-password</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-de-grupo-conti-leva-a-decreto-de-emergencia-nacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fortinet-instala-se-no-politecnico-da-guarda</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sophos-adquire-empresa-com-solucao-para-alertas-de-seguranca-baseada-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/lacuna-de-competencias-possibilita-ocorrencia-de-violacoes-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/incidencia-de-ataques-ransomware-em-portugal-aumentou-13</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/save-the-date-it-security-conference-realiza-se-a-20-de-outubro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/pagamento-medio-de-resgate-aumentou-quase-cinco-vezes-em-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/numero-de-bases-de-dados-expostas-aumentou-em-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/hospital-garcia-de-orta-alvo-de-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/governo-norte-americano-da-mais-importancia-a-seguranca-da-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-disponibiliza-referencial-de-competencias-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/empresas-de-ciberseguranca-dos-eua-procuram-standards-tecnologicos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-toma-controlo-de-dominios-usados-em-ciberataques-contra-a-ucrania</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/digitalizacao-do-setor-da-educacao-aumentou-as-vulnerabilidades-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/99-dos-utilizadores-de-servicos-cloud-concedem-permissoes-em-excesso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/detido-hacker-portugues-que-encabecava-um-dos-maiores-foruns-de-hacking-do-mundo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/estudo-indica-que-profissionais-de-ciberseguranca-consideram-desistir</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/numero-de-dados-bancarios-a-venda-na-deep-web-aumenta-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminosos-utilizam-documentos-sobre-guerra-russia-ucrania-para-distribuir-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/casa-branca-propoe-109-mil-milhoes-de-dolares-para-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/seguranca-por-design-em-destaque-na-mais-recente-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/vitimas-de-cibercrime-nos-eua-perderam-69-mil-milhoes-de-dolares-em-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/uma-em-cada-cinco-organizacoes-teve-uma-conta-de-e-mail-comprometida-em-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/comissao-europeia-propoe-pacote-regulatorio-de-ciberseguranca-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataques-provenientes-da-china-contra-paises-da-nato-disparam</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/joe-biden-alerta-empresas-para-ciberataques-de-retaliacao-russa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/regulador-britanico-mostra-se-preocupado-com-aquisicao-da-avast-pela-nortonlifelock</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eset-suspende-vendas-na-russia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-anuncia-intencao-de-adquirir-a-mandiant</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ucrania-aceite-como-participante-no-centro-de-ciberdefesa-da-nato</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/senado-norte-americano-aprova-pacote-de-ciberseguranca-para-proteger-infraestrutura-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-contra-administracao-publica-ucraniana-aumentam-quase-200</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataques-a-cadeias-de-abastecimento-vao-continuar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/detetado-novo-malware-destrutivo-em-sistemas-ucranianos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ministro-dos-negocios-estrangeiros-confirma-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-vai-limitar-rastreamento-de-anuncios-em-aplicacoes-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/procura-por-profissionais-de-ciberseguranca-continua-a-aumentar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/portugal-entre-os-paises-mais-afetados-por-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/enisa-e-cert-eu-emitem-declaracao-conjunta-para-aumentar-ciber-resiliencia-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/assista-live-event-ciberseguranca----sexta-feira-18</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/capacidades-de-advanced-remediation-minimizam-riscos-das-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/emotet-volta-ao-topo-da-lista-de-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/campanha-de-ciberespionagem-podera-estar-por-tras-do-ataque-a-news-corp</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/vodafone-ja-notificou-comissao-nacional-de-protecao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/banco-central-europeu-alerta-bancos-para-potenciais-ciberataques-russos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/germano-de-sousa-alvo-de-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/clientes-da-movistar-nao-tiveram-acesso-a-rede</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/vodafone-portugal-foi-alvo-de-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/adocao-de-autenticacao-forte-de-identidade-foi-baixa-em-2021-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/you-deserve-the-best-security-e-o-novo-lema-da-check-point</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fbi-alerta-para-potenciais-ciberataques-nos-jogos-olimpicos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/a-ciberseguranca-da-cloud-em-destaque-na-edicao-de-fevereiro-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/maioria-de-ataques-ransomware-em-2021-comecaram-em-erros-humanos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/governo-norte-americano-anuncia-estrategia-zero-trust-para-agencias-federais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/requisitos-do-decreto-lei-652021-reforcam-aposta-na-seguranca-da-informacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/parceria-procura-tornar-colaboradores-no-principal-agente-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/russia-desmantela-grupo-de-ransomware-revil</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/observado-malware-destrutivo-nos-sistemas-de-agencias-governamentais-ucranianas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/governo-da-ucrania-atingido-por-ciberataque-e-aumentam-tensoes-com-a-russia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataques-ransom-ddos-aumentaram-significativamente-em-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-lanca-alerta-sobre-ameacas-de-grupos-patrocinados-pelo-estado-russo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/lisboa-recebe-arranque-de-projeto-para-desenvolver-redes-de-comunicacao-quantica-para-cenarios-de-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/riscos-tecnologicos-integram-principais-riscos-globais-nos-proximos-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/o-que-avizinha-2022-para-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-a-organizacoes-portuguesas-aumentaram-81-em-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataques-de-malware-contra-empresas-diminui-22</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/comunicacao-social-podera-ser-o-novo-alvo-favorito-dos-hackers</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/numero-de-ficheiros-maliciosos-diarios-aumenta-57-em-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/o-que-se-sabe-do-ataque-a-sic-pelo-lapsuss-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/instituto-portugues-integra-projeto-europeu-de-ciberseguranca-na-industria</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/o-universo-da-ciberseguranca-em-2021-resumido</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/empresas-despedem-menos-executivos-de-it-apos-incidentes-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataque-impresa-paginas-da-opto-e-olhares-em-baixo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataque-ao-grupo-impresa-constitui-atentado-nunca-visto-a-liberdade-de-imprensa-em-portugal-na-era-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/violacoes-de-dados-aumentaram-drasticamente-no-terceiro-trimestre-de-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/lancada-correcao-para-apache-server-para-corrigir-duas-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/casa-branca-pede-a-empresas-para-discutir-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/europol-olha-para-2021-como-ano-de-luta-contra-cibercriminalidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fraudes-de-criptomoedas-cresceram-consideravelmente-no-ultimo-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/log4shell-grupo-de-ransomware-conti-desenvolveu-cadeia-de-ataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/investigadores-acreditam-que-custo-de-seguros-vai-impulsionar-adocao-de-autenticacao-multifator</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/vulnerabilidade-no-log4j-poe-parte-da-rede-do-governo-belga-em-baixo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/passos-para-uma-estrategia-de-ciberseguranca-de-sucesso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/desenvolvida-politica-de-ciberseguranca-para-dispositivos-bionicos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/detido-suspeito-de-ataques-ransomware-na-romenia-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/18-legisladores-dos-eua-exigem-sancoes-a-empresas-estrangeiras-de-vigilancia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-divulga-relatorio-centrado-nas-politicas-publicas-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sophos-desenvolve-sophos-cloud-optix-para-resposta-a-incidentes-mais-rapida</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/trickbot-permanece-como-malware-mais-popular-a-nivel-global</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/reaparecimento-do-emotet-avizinha-novos-ataques-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/telemoveis-de-oficiais-dos-eua-atacados-por-spyware-do-nso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/seguros-ciberneticos-poderao-ser-mais-valia-para-o-negocio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ia-e-machine-learning-ajudam-a-melhorar-seguranca-empresarial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-propoe-novos-compromissos-com-cookies-em-browsers</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/japao-e-vietname-aumentam-ciberdefesa-com-receio-da-china</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/o-fim-da-password-em-destaque-na-mais-recente-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cisa-publica-livro-de-procedimentos-de-resposta-a-incidentes-e-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sites-no-wordpress-invadidos-por-falso-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/emails-falsos-enviados-a-partir-de-servidor-do-fbi</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/check-point-lanca-portal-de-formacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/primeira-edicao-da-conferencia-power-of-intelligence-tem-lugar-em-dezembro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/autoridades-detem-membros-pertencentes-ao-revil</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/agencias-federais-dos-eua-obrigadas-a-resolver-vulnerabilidades-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/empresa-que-criou-spyware-pegasus-na-lista-negra-dos-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/experis-lanca-soc-para-proteger-empresas-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/academia-militar-abre-candidaturas-para-mestrados-relacionados-com-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/operacao-dos-eua-e-paises-aliados-encerra-atividade-do-revil-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sibs-inaugura-centro-de-operacoes-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/assista-gratuitamente-a-mesa-redonda-focada-no-flagelo-do-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/redes-sociais-sao-principal-alvo-de-ataques-de-brand-phishing-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/casa-branca-apela-a-colaboracao-das-empresas-na-luta-contra-o-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/burnout-aumenta-riscos-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mais-de-metade-das-empresas-europeias-expostas-a-ataques-da-cadeia-de-valor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/accenture-confirma-publicacao-de-dados-roubados-apos-ataque-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/estudo-da-google-analisa-80-amostras-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/apple-alerta-para-ameacas-criadas-por-leis-antitrust-da-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-anuncia-equipa-de-acao-de-ciberseguranca-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/apple-confirma-vulnerabilidade-zero-day-no-ios-15</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/indice-global-de-ameacas-coloca-trickbot-no-topo-da-lista</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/casa-branca-discute-cibercrime-com-30-paises</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mcafee-enterprise-e-fireeye-fundem-se-ate-ao-final-do-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/malware-em-portugal-aumentou-mais-de-10</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-de-seguranca-de-aplicacoes-cresce-ate-129-mil-milhoes-ate-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataques-em-cadeia-sao-os-mais-dispendiosos-para-as-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/formalizada-a-criacao-do-polo-de-inovacao-digital-de-ciberseguranca-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/insatisfacao-dos-colaboradores-pode-levar-equipas-de-it-a-facilitar-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/preocupacoes-com-ciberseguranca-nao-impedem-empresas-de-migrar-para-a-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/kaspersky-lanca-plataforma-com-dicas-de-ciberseguranca-para-pme</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/gastos-do-setor-financeiro-em-recuperacao-de-ransomware-ultrapassam-16-milhoes-de-euros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/brasil-discute-criacao-de-estrategia-nacional-de-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/publicada-chave-de-desencriptacao-universal-para-ransomware-revilsodinokibi</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-corrige-falhas-que-estao-a-ser-exploradas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/google-lanca-patches-para-duas-vulnerabilidades-zero-day-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/revil-divulga-acidentalmente-chave-universal-de-desencriptacao-do-ataque-a-kaseya</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/yandex-afirma-que-sofreu-o-maior-ataque-ddos-ja-registado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataques-maliciosos-traduzem-80-do-aumento-de-sinistros-ciberneticos-em-2020-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/colaboradores-mais-capazes-de-identificar-e-mails-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/danos-por-ransomware-rondam-os-20-mil-milhoes-de-dolares-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ransomware-de-dupla-extorsao-em-destaque-na-segunda-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/dados-de-clientes-da-fujitsu-a-venda-na-dark-web</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/check-point-adquire-empresa-especializada-em-protecao-de-email</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/maior-ataque-de-ddos-e-tres-vezes-maior-do-que-o-anterior</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/tecnologicas-prometem-reforcar-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/presidente-dos-eua-e-tecnologicas-reunem-se-para-falar-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/custos-de-phishing-quadruplicaram-nos-ultimos-seis-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-ao-setor-de-gaming-continuam-a-crescer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/as-principais-aquisicoes-em-ciberseguranca-na-primeira-metade-de-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/uniao-europeia-propoe-legislacao-para-criptomoedas-para-travar-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/biden-define-diretiva-de-conduta-de-seguranca-para-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/hp-wolf-protege-os-dispositivos-onde-quer-que-estejam</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/sophos-adquire-braintrace</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/kaseya-disponibiliza-chave-de-desencriptacao-aos-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/vulnerabilidade-no-windows-hello-abre-porta-a-atacantes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-colocam-empresas-russas-em-lista-negra-de-comercio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/nato-eua-e-ue-acusam-china-de-campanha-global-de-ataque-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/trojan-milum-amplia-alcance-com-novas-versoes-multiplataforma</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/websites-do-grupo-revil-terao-desaparecido</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/biden-a-putin-tem-de-agir-para-acabar-com-os-grupos-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/portugal-e-o-pais-europeu-mais-disposto-a-partilhar-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/dados-de-700-milhoes-de-utilizadores-do-linkedin-a-venda-na-dark-web</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/kaseya-vsa-comprometido-em-ataque-massivo-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/autoridades-coordenam-ataque-a-nivel-global-para-eliminar-doublevpn</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ue-aprova-acordo-de-transferencia-de-dados-com-reino-unido</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/devoteam-anuncia-aquisicao-da-integrity</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/falhas-na-plataforma-atlassian-permitiam-roubar-contas-com-um-clique</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/webinar-destaca-inovacao-capacitacao-e-ciberseguranca-num-contexto-de-recuperacao-economica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/assista-gratuitamente-ao-webinar-da-it-security-sobre-protecao-dos-endpoints</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/pandemia-melhorou-competencias-de-ciberseguranca-do-it</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/as-estrategias-de-seguranca-ofensiva-como-forma-de-antecipar-ameacas-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/estudo-refere-que-confianca-digital-induzida-pela-pandemia-cria-efeitos-colaterais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/pandemia-de-ransomware-ameaca-organizacoes-a-nivel-nacional-e-global</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/atualizacoes-de-software-utilizadas-como-razao-para-faltar-a-reunioes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/huawei-inaugura-o-seu-maior-centro-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-corrige-seis-bugs-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-recuperam-maioria-do-pagamento-feito-depois-do-ataque-a-colonial-pipeline</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataque-a-empresa-de-carnes-atrasa-producao-nos-eua-e-australia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-lanca-segunda-edicao-do-curso-cidadao-ciberinformado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/eua-propoe-750-milhoes-de-dolares-para-melhorar-infraestruturas-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ia-e-zero-trust-em-destaque-na-primeira-edicao-da-it-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/maioria-dos-trabalhadores-usam-dispositivos-de-trabalho-para-tarefas-pessoais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ciberataques-em-portugal-crescem-quase-80</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cdays-volta-ao-porto-em-junho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/carta-portuguesa-de-direitos-humanos-na-era-digital-publicada-em-diario-da-republica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ransomware-encerra-parte-da-rede-norte-americana-de-oleodutos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/s21sec-desenvolve-skill-para-alexa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/escolas-sao-um-dos-principais-alvos-dos-cibercriminosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/pj-realiza-31-buscas-relacionadas-com-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/portugal-vai-receber-um-dos-maiores-data-center-da-europa-em-sines</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/metade-das-organizacoes-apostam-em-estrategias-de-encriptacao-consistente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/huawei-portugal-nomeia-cybersecurity-officer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/paypal-utilizado-como-forma-de-fraude</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/malware-disfarca-se-de-netflix-para-se-espalhar-atraves-do-whatsapp</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/fbi-e-cisa-alertam-para-exploracao-de-vulnerabilidades-do-fortios-da-fortinet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/curso-cidadao-ciberseguro-do-cncs-tem-nova-versao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/empresas-nacionais-estao-mais-preocupadas-com-ataques-ciberneticos-do-que-covid-19</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/grupo-de-hackers-clona-ferramenta-ofensiva-cibernetica-norte-americana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/menos-de-um-terco-das-empresas-portuguesas-apresenta-politicas-de-seguranca-definidas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-vai-coordenar-o-centro-internet-segura</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/publicadas-na-internet-milhares-de-passwords-roubadas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/equipas-de-ciberseguranca-lutam-contra-burnout</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mais-protecao-para-armazenamento-de-cloud-distribuida</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercrime-vai-focar-se-no-trabalho-remoto-criptomoedas-e-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/orcamentos-de-ciberseguranca-crescerao-mais-de-20-em-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataques-ddos-caem-73-no-ultimo-trimestre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/relatorio-revela-aumento-de-risco-no-trabalho-remoto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/2020-marcado-pelo-uso-crescente-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aumentam-ciberataques-na-area-de-tecnologias-operacionais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/covid-19-despoletou-grande-surto-de-roubo-de-passwords</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/organizacoes-atingidas-por-ransomware-nao-voltam-a-ser-as-mesmas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/enisa-e-comissao-europeia-celebram-mes-europeu-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/os-riscos-de-aplicacoes-fleeceware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/as-novas-prioridades-dos-lideres-de-seguranca-e-gestao-de-riscos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataques-ddos-contra-recursos-de-educacao-aumenta-350</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/gartner-espera-que-ceo-se-responsabilizem-por-incidentes-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/ataques-ddos-triplicam-no-segundo-trimestre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/especialistas-preveem-vulnerabilidade-recorde-em-2020</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/bases-de-dados-de-cloud-expostas-sao-atacadas-18-vezes-por-dia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/covid-19-expoe-lacunas-na-recuperacao-de-negocios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/portugueses-ponderam-partilha-de-maus-comportamentos-online</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/covid-19-foi-o-tema-mais-explorado-para-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aumentam-ataques-com-recurso-ao-botnet-phorpiex</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/a-ciberameaca-que-marcou-o-primeiro-semestre-de-2020</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/aumenta-a-necessidade-de-ciberseguranca-para-dispositivos-iot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/a-seguranca-do-bloqueio-de-ecra-do-smartphone</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/as-ciberameacas-das-apps-de-rastreio-de-covid-19</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/covid-19-maioria-dos-ataques-de-phishing-provem-de-enderecos-ip-dos-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cncs-lanca-curso-cidadao-ciberinformado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/facebook-processa-sites-que-vendiam-informacoes-do-seus-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/95-das-empresas-sofrem-interrupcoes-de-servico-nao-programadas-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/o-novo-desafio-dos-ceo-no-mundo-pos-covid-19</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/covid-19-fotografias-com-mascaras-utilizadas-para-melhorar-reconhecimento-facial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/microsoft-aposta-na-autenticacao-sem-palavra-passe</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/a-alta-fiabilidade-e-a-ciberseguranca-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cibercriminosos-roubam-13-milhoes-de-dolares-em-transferencias-bancarias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/covid-19-oms-hackers-divulgam-25-mil-credenciais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/startup-portuguesa-alerta-para-seguranca-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/quase-metade-das-violacoes-de-dados-afetam-informacao-dos-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/dez-medidas-para-tornar-o-zoom-mais-seguro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/covid-19-aumento-dos-desafios-na-seguranca-das-empresas-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/zoom-enfrenta-problemas-de-seguranca-e-privacidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mastercard-cria-centro-de-ciber-resiliencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/hackers-apostam-em-novo-metodo-para-desviar-dinheiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/claranet-lanca-servicos-de-ciberseguranca-avancados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/onu-tera-encoberto-hack</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cinco-conselhos-de-ciberseguranca-para-todos-os-tipos-de-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/detox-digital-e-a-nova-tendencia-para-2020</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/seresco-reforca-servicos-de-ciberseguranca-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/exploit-zero-day-no-google-chrome-utilizado-em-operacoes-maliciosas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/hackers-norte-coreanos-terao-roubado-informacao-sensivel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/mercado-portugues-de-ciberseguranca-cresceu-36</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/menos-de-50-das-organizacoes-estao-preparadas-para-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/cambridge-analytica-facebook-paga-multa-de-580-mil-euros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/amazon-echo-e-kindle-vulneraveis-a-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/websites-legitimos-tornam-se-plataforma-de-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/outubro-e-o-mes-europeu-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/portugal-e-um-dos-paises-que-mais-sofre-ataques-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/faltam-milhoes-de-profissionais-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/maioria-dos-pedidos-de-resposta-a-incidentes-e-feita-depois-de-ataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/schneider-electric-e-membro-isa-global-cybersecurity-alliance</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/99-dos-ciberataques-bem-sucedidos-dependem-do-fator-humano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/portugal-entra-em-centro-europeu-para-combater-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/smart-cities-precisam-de-investimento-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/maioria-dos-utilizadores-ja-teve-as-suas-passwords-roubadas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/s21sec-lanca-relatorio-de-ciberseguranca-para-a-primeira-metade-de-2019</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/gangue-rouba-dados-de-cartoes-de-credito-de-clientes-do-retalho-e-hotelaria</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/astronautas-vao-receber-formacao-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/huawei-promete-investir-em-forca-nos-paises-que-a-receberem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/porto-recebe-5a-edicao-do-c-days</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/publicada-a-estrategia-nacional-de-seguranca-do-ciberespaco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/china-ameaca-colocar-empresas-na-lista-de-entidades-duvidosas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/huawei-segue-para-a-justica-norte-americana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/huawei-envia-carta-aos-seus-parceiros-e-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/kaspersky-abre-novo-centro-de-transparencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/segunda-edicao-do-exercicio-nacional-de-ciberseguranca-decorre-esta-semana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/facebook-sera-mais-focado-na-privacidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/news/processo-eleitoral-em-destaque-no-exercicio-nacional-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/na-ciberseguranca-o-exemplo-tambem-vem-de-cima</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/a-ameaca-interna-um-risco-subestimado-nas-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/brain-hack-quando-a-confianca-se-torna-uma-vulnerabilidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/da-guerra-cognitiva</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/revolucao-na-ciberseguranca-o-fim-da-era-da-postura-zero-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/ser-ou-nao-ser-nunca-e-a-questao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/o-principe-da-nigeria-cresceu-agora-usa-ai</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/uma-nova-oportunidade-para-a-ciberseguranca-nacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/a-nova-lei-da-ciberseguranca-entre-o-avanco-e-o-desafio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/computacao-forense-digital-o-pilar-essencial-da-mitigacao-moderna</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/gestao-da-superficie-de-ataque-asm---attack-surface-management-pilar-estrategico-das-operacoes-modernas-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/ciberseguranca-o-longo-caminho-da-transposicao-da-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/a-diretiva-nis2-e-o-impacto-na-cadeia-de-valor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/plataformizacao--uma-nova-era-na-protecao-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/deepfake-voice-como-a-ia-esta-a-revolucionar-a-gestao-de-crises</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/estado-da-nacao-em-ciberseguranca-o-olhar-de-um-ciso-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/esg-e-a-ciberseguranca-alinhamento-implicacoes-e-desafios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/a-inteligencia-artificial-so-pode-ser-combatida-por-mais-inteligencia-artificial-ou-sera-que-a-partilha-pode-ter-um-papel-finalmente-determinante</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/nis2-dora-e-ai-a-ciberseguranca-e-os-proximos-desafios-estrategicos-da-nova-regulacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/o-erro-de-maslow</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/os-desafios-de-seguranca-da-informacao-na-era-da-inteligencia-artificial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/retencao-de-talentos-em-ciberseguranca-valorizando-as-novas-geracoes-e-o-teletrabalho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/incidentes-de-seguranca-uma-preparacao-diferente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/a-emergencia-da-gestao-do-risco-de-parceiros-as-oportunidades-e-os-desafios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/estado-da-nacao-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/a-ciberseguranca-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/ciberseguranca-em-portugal-tendencias-e-compliance</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/siem-necessario-mas-nao-suficiente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/silencio-ou-comunicacao-em-caso-de-cibercrise---o-que-fazer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/o-dora-numa-perspetiva-de-quem-trabalha-numa-empresa-no-vertical-financeiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/uma-reuniao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/a-resiliencia-nos-servicos-financeiros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/ciberseguranca-onde-estamos-e-para-onde-vamos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/framework-de-ciberseguranca-da-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/formacao-e-mais-simples-do-que-uma-simples-sessao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/sera-a-informacao-a-verdadeira-rosa-de-jericho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/tres-praticas-para-colocar-a-ciberseguranca-como-um-tema-do-negocio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/os-temas-da-seguranca-da-informacao-digital-informatica-de-computadores-e-ciberseguranca-nao-sao-novos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/o-ciberespaco-a-seguranca-e-a-corrida-pelo-ciber-talento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/estado-da-nacao-na-ciberseguranca-nunoneves2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/complexidade-torna-a-seguranca-complicada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/estarao-as-organizacoes-a-sentir-as-dores-dos-ataques-de-engenharia-social</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/o-que-aprendemos-com-a-colonial-pipeline--prognosticos-e-estrategias-para-proteger-contra-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/teletrabalho-com-seguranca---a-visao-da-camara-municipal-da-amadora</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/uma-breve-avaliacao-da-seguranca-cibernetica-na-area-da-saude-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/cribercrises-nao-e-um-assunto-so-de-ti-e-si</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/ciberesiliencia---estar-preparado-para-tudo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/portugal-mais-resiliente-regime-juridico-de-seguranca-do-ciberespaco-rjsc</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/preocupacoes-com-ciberseguranca-na-cm-amadora</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/ciberseguranca-colaborativa-uma-nova-abordagem-estrategica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/ciberconsciencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/seguranca-organizacional-na-era-da-informacao-o-caminho-para-uma-visao-integrada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/os-riscos-da-transformacao-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/por-uma-doutrina-ativa-de-sobrevivencia-em-ciberseguranca-a-dimensao-humana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/seguranca-e-defesa-no-ciberespaco-uma-questao-de-resiliencia-nacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/a-importancia-da-velocidade-nos-ciclos-de-decisao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/ver-ou-nao-ver-eis-a-questao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/expert/a-era-de-ouro-do-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/sase-entre-a-promessa-e-a-maturidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/consolidar-para-nao-fragmentar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/empresas-ignoram-riscos-da-ia-por-pressao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-pme-portuguesas-reforcaram-formacao-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/empresas-testam-apenas-parte-da-superficie-de-ataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/api-tornam-se-a-principal-superficie-de-ataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/conflito-no-medio-oriente-agrava-risco-cibernetico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/empresas-admitem-falhas-na-preparacao-dos-colaboradores-para-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/24-das-empresas-nunca-testam-disaster-recovery</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ia-expoe-lacunas-na-governacao-do-risco-ao-nivel-dos-conselhos-de-administracao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ia-amplia-desequilibrio-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/europa-precisa-de-acelerar-inovacao-na-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-impulsionados-por-ia-estao-a-intensificar-se-alerta-ibm</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-a-identidade-dominam-cenario-de-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/volt-typhoon-mantem-presenca-em-utilities-norte-americanas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-ransomware-crescem-49-em-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberataques-lideram-riscos-geopoliticos-para-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/europa-deve-adaptar-se-as-ameacas-ciberneticas-e-hibridas-permanentes-alerta-suecia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cibercriminosos-exploram-confianca-como-principal-vetor-de-ataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-ao-setor-financeiro-europeu-disparam-em-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/deepfakes-a-nova-fronteira-da-fraude-empresarial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/aumento-de-ameacas-digitais-marca-panorama-da-ciberseguranca-em-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/zero-trust-nao-vem-numa-caixa-vem-com-resistencia-interna</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/mercado-de-ciberseguranca-cresce-52-na-europa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-globais-atingem-niveis-recorde-em-2025-com-aceleracao-da-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/erro-humano-na-origem-da-maioria-das-perdas-de-dados-associadas-a-ameacas-internas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/novas-campanhas-de-phishing-exploram-qr-codes-e-plataformas-colaborativas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberataques-agravam-niveis-de-stress-e-esgotamento-nas-pme-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/66-das-organizacoes-nao-confiam-na-resposta-a-ameacas-cloud-em-tempo-real</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/relatorio-da-europol-define-migracao-para-criptografia-pos-quantica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/metade-das-organizacoes-devera-adotar-governacao-de-dados-zero-trust-ate-2028</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ue-apresenta-plano-para-excluir-fornecedores-de-alto-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-a-cadeia-de-fornecimento-digital-expoe-fragilidades-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/fraude-com-ia-e-abuso-de-identidades-vao-dominar-cibercrime-em-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ia-geopolitica-e-fraude-marcam-ciberseguranca-em-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/codigo-gerado-por-ia-expoe-novas-fragilidades-na-cadeia-de-valor-de-software</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/investimento-em-ciberseguranca-acelera-com-ameacas-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/da-fragmentacao-a-resiliencia-cooperativa-electrica-do-vale-deste-reforca-seguranca-com-fortinet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ransomware-alimentado-por-ia-marca-nova-fase-das-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-a-sistemas-de-ia-generalizam-se-e-revelam-limites-da-seguranca-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/quase-metade-das-pme-portuguesas-sofreram-ciberataques-relacionados-com-ia-no-ultimo-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciiwa-conhecimento-partilhado-e-poder-multiplicado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/soar-entre-a-promessa-de-automacao-e-a-preparacao-necessaria</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/recessao-desigualdade-social-e-ameacas-de-desinformacao-entre-os-principais-riscos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciber-resiliencia-a-preparacao-teorica-colide-com-a-realidade-dos-incidentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/universidade-de-coimbra-expoe-riscos-criticos-sobre-seguranca-dos-modelos-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/alteracao-de-permissoes-na-origem-de-interrupcao-na-cloudflare</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/falhas-de-seguranca-desconhecidas-impulsionam-ataques-de-ransomware-no-retalho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cloudflare-aws-e-crowdstrike-os-incidentes-que-obrigam-a-repensar-as-dependencias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/awareness-e-um-servico-para-as-pessoas-nao-um-teste</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/web-summit-2025-saber-onde-focar-e-o-mais-importante-porque-nao-e-possivel-garantir-a-seguranca-de-tudo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/web-summit-2025-estamos-no-inicio-de-uma-longa-corrida-armamentista</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-pme-europeias-nao-tem-estrategia-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-de-ransomware-contra-infraestruturas-criticas-aumentam-34</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/malware-transmitido-por-ligacoes-encriptadas-regista-aumento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/furto-de-dados-e-perda-de-clientes-ciberataques-sao-ameaca-estrategica-para-pme-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/portugal-e-o-12-pais-europeu-mais-afetado-por-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-de-ransomware-aumentam-em-2025-e-ja-afetam-um-quarto-das-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-pessoas-utiliza-ia-mas-desconhece-riscos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/e-preciso-olhar-para-as-organizacoes-e-perceber-se-a-seguranca-esta-na-mente-da-maioria-dos-colaboradores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-contra-tecnologias-operacionais-da-uniao-europeia-aumentam</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/dfir-entre-a-competencia-tecnica-e-a-realidade-operacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberataques-potenciados-por-ia-a-nova-realidade-que-os-ciso-enfrentam</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/nis2-em-portugal-aprovacao-no-parlamento-abre-caminho-mas-os-desafios-estao-so-a-comecar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/portugal-regista-aumento-de-incidentes-e-consolidacao-de-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/paulo-portas-na-nato-teremos-de-investir-num-quarto-ramo-das-forcas-o-ramo-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/educacao-enfrenta-ransomware-com-custos-mais-baixos-e-recuperacao-mais-rapida</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/computacao-quantica-ameaca-encriptacao-atual-alerta-estudo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/portugal-registou-mais-de-dois-milhoes-de-ameacas-online-no-segundo-trimestre-de-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/relatorio-revela-que-10-dos-colaboradores-representam-73-do-ciber-risco-nas-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-empresas-nao-consegue-reduzir-risco-mesmo-aumentando-o-investimento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-dos-profissionais-acredita-que-existem-varias-areas-que-podem-ser-melhoradas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/empresas-apostam-na-inteligencia-artificial-mas-subestimam-riscos-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-dao-mais-prioridade-ao-ot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/estado-da-nacao-onde-esta-a-ciberseguranca-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/dois-tercos-das-instituicoes-da-ue-chumbam-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/mitre-lanca-framework-para-enfrentar-ameacas-contra-criptomoedas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/otimismo-empresarial-global-cai-para-o-nivel-mais-baixo-desde-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-ciso-nao-devem-estar-totalmente-tranquilos-ao-pensar-na-utilizacao-de-ia-em-ataques-apt</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/malware-aumenta-171-nos-primeiros-tres-meses-do-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/nao-conseguimos-sobreviver-do-ponto-de-vista-da-defesa-se-nao-partilharmos-o-que-observamos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-horizonte-digital-ia-quantum-e-o-futuro-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-seguranca-de-rede-e-geralmente-a-primeira-linha-de-defesa-porque-tem-a-capacidade-de-remover-muito-trafego-malicioso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-2025-uma-entidade-que-ja-faz-uma-gestao-madura-nao-tem-de-mudar-o-seu-modus-operandi-com-a-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-2025-o-que-queremos-proteger-nao-e-informacao-mas-sim-a-sociedade-o-regime-democratico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-maioria-dos-ciberincidentes-ocorre-nao-devido-a-ataques-sofisticados-mas-por-coisas-muito-basicas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/e-preciso-acertar-com-o-essencial-o-resto-e-a-proverbial-cereja-no-topo-do-bolo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/aws-a-medida-que-a-ia-generativa-e-embebida-na-organizacao-precisamos-de-controlos-de-seguranca-em-todo-o-stack-de-tecnologia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/aws-reinforce-2025-as-novas-fronteiras-da-protecao-da-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/zero-trust-pode-ajudar-a-reduzir-quase-um-terco-das-perdas-economicas-mundiais-com-ciberataques-revela-estudo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/external-attack-surface-management-de-opcao-estrategica-a-necessidade-operacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/como-as-organizacoes-se-tornaram-no-novo-campo-de-batalha-da-ciberguerra</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/79-dos-empresarios-de-pme-portuguesas-admitem-falhas-na-protecao-contra-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/setor-da-saude-em-alto-risco-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/lideres-de-it-em-portugal-defendem-que-praticas-de-seguranca-precisam-de-transformacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/todas-as-empresas-querem-adotar-ia-mas-nem-todas-estao-a-ver-o-risco-de-utilizacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-vao-utilizar-browsers-empresariais-seguros-para-melhorar-acesso-remoto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/relatorio-da-check-point-revela-aumento-historico-de-vitimas-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/fbi-cibercrime-provoca-perdas-de166-mil-milhoes-de-dolares-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ia-da-novo-impulso-ao-cibercrime-revela-relatorio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/microsoft-bloqueou-fraudes-no-valor-de-quatro-mil-milhoes-de-dolares-potenciadas-por-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/china-acusa-estados-unidos-de-lancar-ciberataques-avancados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/gastos-europeus-com-seguranca-deverao-aumentar-quase-12</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/seguranca-privacidade-e-cenario-complexo-da-ia-impulsionam-decisoes-sobre-localizacao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/analise-a-mais-de-cem-mil-ativos-digitais-revela-aumento-de-vulnerabilidades-impactantes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/exploracao-de-servicos-remotos-externos-lidera-acessos-iniciais-em-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-sensibilizacao-em-ciberseguranca-e-inutil-se-as-pessoas-tiverem-medo-de-assumir-o-que-fizeram</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-papel-essencial-da-gestao-de-identidades-e-acessos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/mais-de-32-mil-milhoes-de-credenciais-comprometidas-durante-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/exclusive-networks-em-tempos-de-confianca-zero-e-importante-acreditar-nas-tecnologias-que-temos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberseguranca-com-peso-significativo-nas-adjudicacoes-do-setor-publico-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ia-tatica-e-otimizacao-da-tecnologia-entre-as-tendencias-de-ciberseguranca-da-gartner</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/publicada-framework-de-seguranca-para-software-open-source</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberataques-coordenados-atingem-aliados-e-colocam-nato-na-linha-de-fogo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/tres-anos-de-guerra-na-ucrania-e-a-ameaca-silenciosa-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/pme-europeias-apresentam-controlos-de-ciberseguranca-15-abaixo-das-grandes-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ia-impulsiona-ciberguerra-e-redefine-seguranca-na-cloud-e-no-edge</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/e-muito-importante-que-as-estrategias-de-ciberseguranca-estejam-alinhadas-com-os-objetivos-do-negocio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ctem-a-nova-fronteira-na-gestao-continua-de-exposicao-a-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ransomware-e-cibercrime-como-um-servico-um-negocio-que-veio-para-ficar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciso-ganham-influencia-nos-conselhos-de-administracao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/89-dos-lideres-de-it-receia-que-falhas-nas-ferramentas-de-ia-generativa-coloquem-organizacoes-em-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/alerta-ou-oportunidade-deepseek-esta-a-desafiar-a-lideranca-dos-eua-no-campo-da-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/descoberta-nova-operacao-que-faz-parte-da-campanha-mirai</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-empresas-preferem-plataformas-unificadas-para-seguranca-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/consumo-energetico-e-desenvolvimento-de-software-o-impacto-da-ia-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-organizacoes-demora-mais-de-24-horas-a-corrigir-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberameacas-potenciadas-por-ia-leva-a-aumento-na-procura-por-especialistas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/estudo-revela-lacunas-de-seguranca-em-todas-as-fases-do-ciclo-de-vida-dos-dispositivos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/relatorio-aponta-aumento-de-ataques-a-carteiras-de-criptomoedas-e-novos-vetores-de-ataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/phishing-e-ransomware-lideram-ameacas-no-observatorio-de-ciberseguranca-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/comprometer-software-legitimo-para-ciberataques-sera-mais-recorrente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-temem-ciberataques-potenciados-por-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/estudo-revela-lacunas-na-ciberseguranca-das-empresas-europeias-em-relacao-a-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/fortinet-preve-aumento-de-ciberataques-mais-sofisticados-e-especializados-em-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ia-e-zero-trust-em-foco-como-tendencias-de-ciberseguranca-para-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciiwa-o-conhecimento-e-o-unico-recurso-sustentavel-mas-se-nao-for-partilhado-nao-tem-valor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/queremos-que-as-empresas-crescam-na-sua-maturidade-que-a-ciberseguranca-esteja-colocada-ao-nivel-da-decisao-de-topo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/gestao-de-acessos-a-chave-para-a-primeira-linha-de-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/vulnerabilidades-zero-day-no-firefox-e-no-windows-utilizadas-para-atacar-alvos-europeus</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciso-de-protetores-da-informacao-a-gestores-do-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/70-das-organizacoes-admitem-falta-de-conhecimentos-fundamentais-em-seguranca-entre-os-colaboradores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/microsoft-interrompe-servico-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/web-summit-2024-sempre-que-criamos-uma-nova-tecnologia-abrimos-uma-nova-ameaca-contra-nos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/operacao-da-sophos-descobre-vasto-ecossistema-de-adversarios-na-china</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/microsoft-alerta-para-ataques-de-spear-phishing-contra-mais-de-cem-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/detetado-aumento-de-atividade-focada-nas-eleicoes-presidenciais-norte-americanas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/investimento-em-ciberseguranca-em-portugal-devera-chegar-aos-250-milhoes-de-euros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/estudo-revela-desfasamento-entre-percecao-e-capacidade-de-resposta-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-sao-mais-rapidas-a-detetar-incidentes-em-tecnologias-operacionais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/fraudes-de-suporte-tecnico-disparam-desde-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/apenas-39-dos-executivos-sente-que-esta-preparado-para-gerir-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cibercriminosos-estao-a-ajudar-russia-e-china-a-atacar-estados-unidos-e-aliados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberatacantes-estao-a-utilizar-ia-para-gerar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/quase-metade-das-palavras-passe-no-sul-da-europa-sao-reutilizadas-noutros-servicos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/numero-de-ciberataques-devera-aumentar-39-no-segundo-semestre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/seguradoras-devem-parar-de-financiar-pagamentos-de-ransomware-alerta-casa-branca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-sofreram-impactos-financeiros-superiores-a-meio-milhao-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/agencias-governamentais-lancam-orientacoes-de-protecao-de-ambientes-ot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/e-preciso-garantir-que-ha-um-acompanhamento-por-parte-da-ciberseguranca-dos-processos-de-inovacao-desde-o-seu-ciclo-inicial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-de-ransomware-a-organizacoes-de-saude-atingem-novo-maximo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/supply-chain-alem-da-seguranca-interna-da-organizacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-consolidacao-da-seguranca-na-estrategia-da-organizacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/investigacao-olha-para-grupos-de-ciberespionagem-a-operar-na-ucrania</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/microsoft-anuncia-novo-conselho-de-governanca-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-organizacoes-de-educacao-pagou-mais-do-que-o-pedido-de-resgate-original</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ransomware-underground-e-uma-ameaca-emergente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/estudo-revela-que-organizacoes-atacadas-investem-mais-em-ciberresiliencia-e-recuperam-mais-rapido</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/seguradoras-pedem-acao-publico-privada-para-preencher-lacunas-de-protecao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/coreia-do-norte-esta-a-atacar-empresas-de-criptomoedas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/vulnerabilidades-crescem-43-e-eua-lideram-alvos-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-de-ransomware-a-organizacoes-governamentais-diminui-mas-custo-de-recuperacao-aumenta</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/19-das-empresas-foi-afetada-por-ciberataques-a-cadeias-de-fornecimento-de-hardware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/investigadores-descobrem-campanha-de-ciberespionagem-na-china</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cibergrupo-blackbyte-devera-ser-mais-ativo-do-que-site-sugere</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/exploracao-de-zero-day-no-chrome-atribuida-a-cibergrupo-norte-coreano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/investimentos-com-seguranca-de-informacao-devera-crescer-15</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-organizacoes-vao-priorizar-backup-de-aplicacoes-saas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/fusoes-e-aquisicoes-de-empresas-de-ciberseguranca-registam-numero-mais-baixo-desde-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/descoberto-maior-pagamento-de-ransomware-de-75-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/relatorio-destaca-importancia-de-ciberseguranca-e-ia-para-organizacoes-industriais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/custo-medio-de-violacoes-de-dados-sobe-para-cinco-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/aumentam-preocupacoes-com-ciberataques-potenciados-por-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/custo-medio-de-recuperacao-de-ransomware-quadruplicou-num-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/novo-relatorio-da-europol-alerta-para-panorama-cibercriminal-fragmentado-e-em-expansao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-estado-da-nacao-no-ano-mais-importante-para-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/falha-na-crowdstrike-impactou-85-milhoes-de-dispositivos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/segundo-trimestre-de-2024-registou-maior-aumento-de-ciberataques-nos-ultimos-dois-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/deepfakes-vao-criar-mais-de-cinco-mil-milhoes-de-dolares-ate-2030</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/mercado-de-tecnologia-ispm-dispara-para-331-mil-milhoes-de-euros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-empresas-nao-tem-fortes-protecoes-anti-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cncs-lanca-nova-edicao-do-relatorio-riscos-and-conflitos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/escassez-de-competencias-de-ciberseguranca-leva-a-falhas-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cibergrupos-chineses-exploraram-vulnerabilidades-em-aplicacoes-de-acesso-publico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/lideres-acreditam-que-ia-vai-superar-equipas-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-capacidades-que-ajudam-as-organizacoes-a-recuperar-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-empresas-melhorou-defesas-para-se-qualificar-para-ciberseguros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-dez-principais-tecnologias-emergentes-para-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/incidentes-na-cloud-aumentam-154</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/relatorio-aponta-que-setor-financeiro-tem-uma-menor-percentagem-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/sase-unificado-ajuda-a-acelerar-a-jornada-de-zero-trust</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/escassez-de-competencias-de-ciberseguranca-e-o-maior-risco-para-msp-e-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciso-devem-aumentar-abordagem-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/registado-aumento-de-ciberataques-a-cadeia-de-abastecimento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/preparar-os-profissionais-do-futuro-aprender-o-be-a-ba-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ibm-security-summit-2024-a-primeira-responsabilidade-de-um-ciso-e-garantir-que-existem-os-controlos-certos-para-que-exista-o-nivel-de-seguranca-adequado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberataques-potenciados-por-ia-sao-o-novo-risco-para-as-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/faturas-sao-arma-para-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/observado-aumentado-de-fraudes-com-recurso-a-cartoes-oferta</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cibercriminosos-exploram-novas-vulnerabilidades-mais-rapidamente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-organizacoes-atingidas-por-ransomware-pediram-ajuda-as-autoridades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/fakeupdates-foi-o-malware-mais-presente-durante-o-mes-de-abril</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/mercado-de-identity-threat-detection-and-response-atinge-356-mil-milhoes-de-dolares-ate-2029</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/utilizacao-de-ia-pelo-cibercrime-esta-a-crescer-mas-ainda-esta-atras-da-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/black-basta-responsavel-por-ciberataques-a-mais-de-500-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/dois-tercos-das-empresas-nao-conseguem-lidar-com-os-riscos-associados-a-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/pagamentos-de-ransomware-aumentaram-500-no-ultimo-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/incidentes-de-seguranca-na-cloud-aumentam-para-61-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/61-das-empresas-preveem-aumento-no-orcamento-de-seguranca-na-cloud-em-12-meses</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/verizon-exploracao-de-vulnerabilidades-para-acesso-inicial-quase-triplicou</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-de-malware-contra-a-industria-estao-a-ficar-mais-sofisticados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/setor-financeiro-assistiu-a-aumento-de-53-no-numero-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-profissoes-chave-para-proteger-as-organizacoes-contra-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-organizacoes-ja-implementou-estrategia-de-zero-trust</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberataques-a-nivel-mundial-aumentaram-28-no-primeiro-trimestre-de-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/divulgados-mais-de-54-mil-milhoes-de-cookies</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-legislacao-pode-sair-mas-se-a-gestao-de-topo-nao-entender-que-e-uma-necessidade-do-negocio-nunca-vai-funcionar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-analise-do-utilizador-para-proteger-a-organizacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/media-de-ataques-a-ot-diminui-no-segundo-semestre-de-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/engenharia-social-a-arte-de-enganar-para-atacar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/empresas-investem-mais-de-cem-mil-dolares-em-competencias-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/descoberta-nova-campanha-de-malware-contra-empresas-europeias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberameacas-aumentam-investimentos-em-ciberseguranca-das-empresas-europeias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/uma-em-cada-quatro-organizacoes-ja-encerrou-operacoes-de-ot-devido-a-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberataques-e-retencao-de-talento-sao-os-principais-riscos-para-empresas-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/trojan-horse-foi-a-principal-ameaca-em-portugal-nos-meses-de-janeiro-e-fevereiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/mas-praticas-e-vulnerabilidades-dominam-riscos-de-ativos-digitais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/empresas-precisam-de-mais-de-seis-meses-para-preencher-vagas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/2023-viu-crescimento-de-40-nos-ataques-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/detetado-novo-malware-de-roubo-de-carteiras-de-criptomoedas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/como-a-ia-generativa-vai-impactar-o-devsecops</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/perdas-com-cibercrimes-ultrapassaram-os-125-mil-milhoes-de-dolares-em-2023-diz-o-fbi</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/empresas-portuguesas-ja-utilizam-solucoes-de-ciberseguranca-com-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/mais-de-metade-das-organizacoes-utilizam-ia-e-iot-nos-seus-processos-empresariais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/automatizacao-de-ciberameacas-devera-marcar-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/agencias-de-seguranca-lancam-conselho-para-protecao-contra-botnet-russo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberataques-a-dispositivos-moveis-aumentaram-no-ultimo-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/identidade-digital-esta-a-ser-alvo-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/experiencia-do-utilizador-e-fundamental-na-implementacao-de-sase</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/i-encontro-da-cnpd-todos-os-dias-cada-ser-humano-esta-a-fazer-a-sua-gestao-de-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/building-the-future-pela-primeira-vez-conseguimos-balancear-a-assimetria-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/metade-dos-profissionais-de-ciberseguranca-admitem-erros-por-falta-de-conhecimentos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/saude-foi-o-setor-mais-afetado-por-ciberataques-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/relatorio-revela-aumento-de-40-no-numero-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/relatorio-destaca-crescimento-da-ia-generativa-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/numero-de-vitimas-de-ransomware-aumenta-perto-de-50-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/profissionais-referem-que-sistema-de-ensino-esta-desligado-das-realidades-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cibercriminosos-tiram-partido-de-modelo-as-a-service-para-expandir-fraudes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/89-dos-casos-de-ciberataque-a-dominios-pt-resultaram-de-tentativas-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/dominios-das-maiores-empresas-portuguesas-revelam-fragilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ia-generativa-e-o-novo-normal-dos-cibercriminosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/casb-assegurar-a-ligacao-entre-utilizadores-e-a-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-organizacoes-tem-de-analisar-o-seu-contexto-definir-a-sua-estrategia-tecnologica-e-de-seguranca-e-definir-o-seu-caminho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/procura-por-talento-em-ciberseguranca-vai-exceder-a-oferta</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/como-a-inteligencia-artificial-impacta-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/vulnerabilidades-sao-exploradas-em-media-em-44-dias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cibercriminosos-estao-a-encontrar-infiltrados-na-dark-net</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ameacas-associadas-a-implementacao-de-ia-serao-uma-tendencia-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/2023-foi-o-ano-dos-mega-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/registado-aumento-significativo-de-roubo-e-extorsao-em-mercado-da-dark-web</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/forum-economico-mundial-alerta-para-desigualdade-na-ciber-resiliencia-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/inteligencia-artificial-devera-ter-impacto-significativo-no-cibercrime-durante-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciber-inseguranca-e-uma-das-preocupacoes-dos-lideres-mundiais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/nist-publica-guia-para-ataques-de-adversarial-machine-learning</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/conselhos-de-administracao-vao-exigir-niveis-mais-elevados-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberseguranca-entre-as-previsoes-tecnologicas-para-2024-da-hpe-aruba-networking</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciso-sao-chave-para-alavancar-potencial-da-ia-generativa-nas-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/como-sera-o-papel-do-ciso-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/tecnicas-de-ataque-vao-se-basear-em-inteligencia-artificial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/quase-metade-das-organizacoes-sofreram-interrupcoes-de-negocios-por-causa-de-terceiros-nos-ultimos-dois-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/14-tendencias-de-ciberseguranca-para-2024-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-dos-ataques-a-organizacoes-de-saude-envolveu-encriptacao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/foram-implementados-mais-de-400-mil-ficheiros-maliciosos-por-dia-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/gerir-o-risco-que-esta-sempre-a-espreita</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/quando-as-ameacas-ja-estao-dentro-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-podem-fazer-tudo-corretamente-e-ainda-assim-ser-vitima-de-um-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-erros-mais-comuns-na-resiliencia-cibernetica-das-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cibercriminosos-eliminaram-logs-de-telemetria-na-maioria-dos-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-empresas-do-setor-energetico-considera-ciberseguranca-uma-prioridade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/90-dos-lideres-nacionais-consideram-que-as-suas-organizacoes-estao-preparadas-para-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/investigacao-explora-aumento-dos-ataques-de-ransomware-em-sistemas-linux</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-nove-principios-chave-que-contribuem-para-aumentar-a-resiliencia-ao-nivel-da-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-tendencias-de-ameacas-avancadas-para-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-adversarios-nao-sao-codigo-sao-humanos-a-tentarem-ser-mais-espertos-do-que-a-organizacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/fortinet-quando-olhamos-para-um-switch-olhamos-como-uma-extensao-de-portas-da-firewall</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/88-dos-portugueses-receiam-ser-vitimas-de-fraude-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/retalho-tem-cada-vez-menos-capacidade-para-travar-ciberataque-em-curso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/europa-e-das-regioes-com-pior-seguranca-de-passwords</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/grupos-apt-exploram-vulnerabilidades-de-entidades-governamentais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ceo-nao-tem-confianca-na-capacidade-das-organizacoes-se-protegerem-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberataques-afetaram-92-das-organizacoes-nos-ultimos-dois-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-precisam-de-mitigar-ciber-riscos-associados-a-fornecedores-externos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/agencias-norte-americanas-publicam-guia-para-reduzir-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/enfrentar-ciberameacas-e-um-desafio-para-as-pme-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/comunicacao-segura-em-dispositivos-remotos-e-uma-das-preocupacoes-principais-dos-profissionais-de-ti</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/atacar-antes-de-ser-atacado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-nova-face-do-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/atividades-de-ciberespionagem-crescem-a-nivel-mundial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/podemos-ter-a-melhor-tecnologia-mas-se-nao-tivermos-boas-equipas-nao-vao-valer-de-muito</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/gastos-de-seguranca-e-gestao-de-risco-devem-aumentar-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/como-as-organizacoes-se-devem-preparar-para-a-criptografia-pos-quantica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cybersecurity-as-a-tour-da-sophos-passou-por-lisboa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/34-das-organizacoes-ja-estao-a-utilizar-ou-a-implementar-ferramentas-de-seguranca-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/como-colmatar-a-falta-de-profissionais-de-ti-com-uma-solucao-sase</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/tempo-entre-inicio-e-detecao-de-um-ataque-diminui-para-oito-dias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-mais-recentes-tendencias-do-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/numero-de-organizacoes-capaz-de-detetar-ransomware-diminui</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/investigacao-revela-ativos-mais-atacados-e-vulneraveis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/setor-da-educacao-e-o-que-regista-taxa-mais-elevada-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ransomware-cresce-43-no-primeiro-semestre-de-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/como-equilibrar-os-riscos-e-beneficios-da-ia-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/fbi-desmantela-operacao-mundial-do-grupo-de-malware-qbot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-devem-estar-preparadas-para-novas-formas-de-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/relatorio-revela-aumento-de-8-de-ciberataques-a-nivel-mundial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/setor-de-ensino-e-investigacao-e-alvo-de-em-media-2256-ciberataques-por-semana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/grupos-de-ransomware-hive-royal-e-black-basta-poderao-estar-a-colaborar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cisa-diz-que-software-deve-ser-seguro-por-design-e-ia-nao-e-excecao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-organizacoes-esta-preocupada-com-configuracao-incorreta-da-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cisa-espera-que-regras-mostrem-escala-do-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacao-de-energia-dos-eua-e-alvo-de-ataque-de-phishing-com-codigo-qr</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-casos-de-uso-e-riscos-da-ia-generativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/dispositivos-iot-e-ot-tem-maior-percentagem-de-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/scams-e-fraudes-de-marcas-aumentam-135-no-medio-oriente-e-em-africa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/aumento-da-visibilidade-na-cloud-melhora-postura-de-seguranca-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-dos-ciberataques-visam-pme</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/seguranca-endpoint-das-empresas-deve-ser-reforcada-com-solucao-de-seguranca-web</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/mais-de-metade-das-organizacoes-atingidas-por-violacoes-de-seguranca-nao-estao-dispostas-a-aumentar-os-custos-de-prevencao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/estado-da-nacao-como-vai-a-ciberseguranca-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/politicas-de-transferencia-de-dados-refletem-lacuna-entre-paises-do-g20</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-enfrentam-desafios-na-integracao-de-zero-trust</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/qbot-ainda-e-ameaca-mais-prevalente-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/temos-de-competir-contra-a-escassez-de-talento-com-armas-desiguais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/sente-se-que-a-ciberseguranca-e-um-pilar-de-peso-nas-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-recomendacoes-para-as-empresas-se-protegerem-do-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-empresas-industriais-atingidas-por-ransomware-sofreram-encriptacao-dos-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/solucoes-de-protecao-de-dados-devem-ser-proativas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/sabotagem-e-espionagem-os-riscos-para-os-cabos-submarinos-num-mundo-cada-vez-mais-conectado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/conflitos-dentro-do-gpt-4-representam-desafios-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/web-e-a-vertente-com-mais-vulnerabilidades-registadas-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-empresas-devem-preparar-se-para-a-era-quantica-tambem-do-ponto-de-vista-da-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/preocupacao-com-protecao-da-cloud-aumenta-entre-cenario-de-ameacas-crescentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/podes-comprar-toda-a-tecnologia-do-mundo-que-se-nao-souberes-como-a-implementar-nao-vai-ajudar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/nsa-lanca-guia-para-mitigar-infecoes-do-blacklotus</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/arrow-organiza-security-summit-em-evora</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/profissionais-de-ciberseguranca-sao-principal-prioridade-de-contratacao-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/formacao-eficaz-dos-colaboradores-diminui-riscos-ciberneticos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/nova-abordagem-a-seguranca-na-cloud-essencial-no-atual-cenario-de-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/campanha-leva-utilizadores-de-sites-piratas-a-descarregar-malware-chromeloader</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-2023-a-anatomia-e-a-ciberseguranca-tem-coisas-parecidas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-2023-a-escala-e-a-dimensao-do-ataque-foram-de-tal-forma-inedita-que-creio-que-qualquer-empresa-teria-dificuldades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-2023-o-valor-da-confianca-e-algo-com-que-temos-de-estar-preocupados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-2023-queremos-desenhar-uma-visao-mais-clara-e-transparente-sobre-o-estado-da-ciberseguranca-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-2023-e-necessaria-mais-ciberseguranca-nas-pme-para-criar-relacoes-de-confianca-na-cadeia-de-fornecimento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/grande-parte-das-empresas-foram-vitimas-de-scams-no-linkedin-este-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cinco-taticas-para-melhorar-a-seguranca-da-informacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/gestao-de-postura-de-endpoint-ajuda-na-identificacao-de-vulnerabilidades-crescentes-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/relacao-entre-ciso-e-conselho-de-administracao-e-crucial-para-obter-melhores-resultados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-organizacoes-querem-que-seguranca-ot-seja-responsabilidade-dos-ciso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/hospital-internacional-dos-acores-investe-em-gestao-integrada-de-rede-e-seguranca-com-a-fortinet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/e-preciso-desmistificar-a-jornada-do-ot-para-desenvolver-capacidades-de-ciberseguranca-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/fortinet-a-ciberseguranca-nao-acaba-enquanto-tivermos-ameacas-e-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/hacktivismo-ligado-a-guerra-na-ucrania-tem-caracteristicas-distintas-do-tradicional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-ransomware-cada-vez-mais-direcionados-apesar-de-diminuicao-no-volume</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-objetivo-da-c-network-e-expandir-o-centro-nacional-de-ciberseguranca-para-o-pais-profundo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/protecao-de-credenciais-salvaguardar-a-chave-de-acesso-aos-sistemas-e-informacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/siem-ter-uma-visao-centralizada-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-apresentam-baixos-niveis-de-confianca-na-gestao-de-seguranca-e-privacidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/executivos-portugueses-nao-compreendem-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-organizacoes-considera-estar-muito-ou-extremamente-preparada-para-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-impacto-da-computacao-quantica-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/portugueses-reconhecem-perigos-online-mas-nao-tem-cuidado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cibercriminosos-baseados-na-china-focam-ataques-em-organizacoes-europeias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/totalstor-quer-contribuir-para-casamento-entre-ciberseguranca-e-protecao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/tornar-o-negocio-quantum-safe-e-uma-necessidade-do-presente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/numero-de-ciberincidentes-diarios-de-elevada-severidade-aumentou-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-quatro-pontos-essenciais-da-cisa-para-garantir-a-seguranca-das-infraestruturas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/encriptacao-de-dados-em-ataques-de-ransomware-atinge-recorde</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/grupos-apt-com-tecnicas-avancadas-no-primeiro-trimestre-de-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-principais-ameacas-de-malware-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cibergrupo-distribui-malware-em-ataque-a-china-continental</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-portuguesas-terao-registado-mais-de-mil-ataques-semanais-no-primeiro-trimestre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberatacantes-utilizaram-mais-de-500-ferramentas-e-taticas-diferentes-durante-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/check-point-revela-novas-tecnicas-utilizadas-por-grupo-apt-iraniano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/kaspersky-analisa-evolucao-de-grupo-associado-ao-lazarus</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/seis-principios-para-ajudar-os-lideres-a-construir-ciber-resiliencia-na-jornada-para-a-transicao-energetica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/descobertos-dados-sensiveis-em-routers-empresariais-descartados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/idc-security-roadshow-prioridades-estrategicas-mostram-a-maturidade-dos-ciso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/visionware-promove-conversas-seguras-sobre-a-atualidade-do-it-e-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-principais-riscos-de-ciberseguranca-que-o-chatgpt-pode-trazer-para-as-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/check-point-regista-aumento-acentuado-de-ciberataques-contra-dispositivos-iot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/gartner-define-as-tendencias-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/empresas-preveem-aumento-no-orcamento-de-seguranca-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/principios-do-zero-trust-suportam-desenvolvimento-de-cadeias-de-abastecimento-devops</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-tecnologia-e-os-procedimentos-tem-de-trabalhar-em-conjunto-so-a-tecnologia-nao-e-suficiente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/containers-e-kubernetes-eficiencia-e-agilidade-com-desafios-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/executar-operacoes-de-seguranca-essenciais-e-desafiante-para-a-maioria-das-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/aumentam-as-ciberameacas-no-setor-da-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-tecnologias-operacionais-e-os-desafios-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/qualys-deteta-23-mil-milhoes-de-vulnerabilidades-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/siresp-bootcamp-madeira-resiliencia-e-a-palavra-chave-para-desempenho-da-missao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-rede-siresp-e-como-um-ecossistema-vivo-vai-se-transformar-a-medida-das-necessidades-e-dos-requisitos-dos-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ransomware-em-endpoints-cresceu-627-no-fim-de-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-grande-desafio-da-rede-siresp-e-fazer-a-transicao-para-o-5g-ate-ao-final-desta-decada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/gastos-em-seguranca-na-europa-crescem-10-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cinco-profissoes-em-ciberseguranca-que-nasceram-nos-ultimos-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/escassez-de-talento-em-ciberseguranca-aumenta-ciber-riscos-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/scam-com-qr-codes-aumenta</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/operacoes-dos-cibercriminosos-adaptam-se-as-ciberdefesas-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-madeira-um-espaco-onde-a-liberdade-e-total-e-um-espaco-com-menos-liberdade-do-que-parece</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-madeira-ha-um-conhecimento-generalizado-mas-nao-ha-uma-consciencializacao-massiva-dos-riscos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-madeira-c-network-e-uma-componente-extremamente-importante-da-estrategia-de-criacao-de-competencias-na-sociedade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-madeira-tambem-somos-sistemas-de-informacao-e-temos-vulnerabilidades-facilmente-exploradas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-madeira-temos-de-continuar-a-estudar-os-dados-com-que-estamos-a-treinar-os-modelos-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-madeira-o-cibercrime-e-combatido-ensinando-as-pessoas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/fortinet-reforca-importancia-de-criacao-de-oportunidades-para-mulheres-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ha-cada-vez-mais-ciberataques-a-ambientes-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ransomware-mais-do-que-duplicou-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-dos-ciberataques-russos-nao-sao-conhecidos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ibm-coloca-portugal-entre-os-paises-europeus-mais-afetados-por-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-de-ransomware-contra-a-industria-duplicaram-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-tomam-decisoes-sem-total-visibilidade-das-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/utilities-foi-o-setor-mais-atacado-em-portugal-durante-janeiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/russia-tera-subestimado-ciber-resiliencia-da-ucrania</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/check-point-destaca-crescimento-de-ciberataques-e-malwares-disruptivos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/problemas-ninguem-pode-dizer-que-nao-os-tem-a-forma-como-os-encaramos-e-que-faz-toda-a-diferenca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/seguranca-na-cloud-a-estrategia-deve-sempre-comecar-por-uma-base-garantir-os-basicos-da-forma-certa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/detetar-e-responder-24-horas-por-dia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/atacar-e-defender-para-proteger</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/que-pontos-criticos-devem-os-lideres-de-seguranca-enderecar-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-tendencias-no-armazenamento-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/apenas-10-das-grandes-empresas-vao-ter-programas-de-zero-trust-ate-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/funcao-do-ciso-alterou-se-drasticamente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/saude-volta-a-ser-dos-setores-mais-atacados-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/guerra-economia-de-cibercrime-fraudes-e-ransomware-marcam-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/twitter-sem-evidencias-de-que-exfiltracao-de-dados-resultou-de-exploracao-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/zoom-lanca-patches-para-vulnerabilidades-de-alta-gravidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/vulnerabilidades-nos-produtos-microsoft-sao-das-que-mais-afetam-setor-financeiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-ciberseguranca-em-2023-em-11-tendencias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/descobertas-mais-de-uma-duzia-de-novas-familias-de-malware-no-macos-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/principal-ameaca-de-malware-no-terceiro-trimestre-de-2022-entregue-atraves-de-ligacoes-encriptadas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-tres-tendencias-de-seguranca-para-o-mercado-de-cloud-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/seis-previsoes-para-a-ciberseguranca-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/estudo-indica-que-controladores-industriais-de-infraestruturas-criticas-tem-vulnerabilidades-graves-nao-corrigidas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ainda-ha-uma-ausencia-de-criterios-de-seguranca-na-aquisicao-de-equipamentos-e-como-se-fosse-algo-a-acrescentar-mais-tarde</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/edr-detetar-e-responder-antes-que-seja-tarde</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/empresas-gastam-cerca-de-1197-dolares-anuais-por-colaborador-para-lidar-com-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/municipio-de-valongo-visionware-threat-intelligence-center-e-a-visao-no-horizonte-para-as-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/infraestruturas-criticas-o-backbone-da-economia-seguranca-e-saude-de-um-pais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/custos-de-um-ciberataque-bem-sucedido-sao-os-mais-altos-de-sempre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/it-security-e-sophos-analisam-o-estado-atual-da-ciberseguranca-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-cinco-tendencias-que-vao-marcar-os-ciberataques-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/it-security-conference-a-ciberseguranca-esta-a-ter-um-peso-como-nunca-teve-nos-planos-estrategicos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/it-security-conference-se-o-processo-de-transformacao-digital-nao-for-bem-gerido-pode-criar-riscos-muito-grandes-para-as-infraestruturas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/presidente-do-siresp-vamos-enfrentar-cada-vez-mais-riscos-de-natureza-transversal-e-hibridos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/muitas-vezes-nao-e-sobre-hackear-o-sistema-e-sobre-hackear-o-cerebro-das-pessoas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/it-security-conference-a-comunicacao-de-crises-ocorre-dois-tercos-antes-da-crise-acontecer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/it-security-conference-ha-uma-ilusao-de-seguranca-confiamos-demasiado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/nao-ha-tempos-de-guerra-ou-paz-no-ciberespaco-ha-sempre-algo-a-acontecer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/it-security-conference-e-importante-que-os-analistas-mantenham-uma-relacao-saudavel-com-os-expert-com-quem-trabalham</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/numero-de-ciberataques-aumenta-a-nivel-global-no-terceiro-trimestre-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberataques-de-estados-nacao-aumentaram-nivel-de-eficacia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/it-security-conference-os-servicos-essenciais-estao-cada-vez-mais-expostos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/it-security-conference-a-principal-ciberameaca-que-temos-de-lidar-e-o-nosso-comportamento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/it-security-conference-temos-que-ser-engenheiros-nas-nossas-organizacoes-principalmente-se-estamos-a-lidar-com-sistemas-criticos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/um-ciberespaco-aberto-e-seguro-ao-fundo-do-tunel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberataques-contra-infraestruturas-eletricas-registam-aumento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/it-security-conference-e-preciso-assegurar-os-dispositivos-e-os-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/e-fundamental-definir-uma-estrategia-sistematica-e-holistica-que-seja-reconhecida-a-todos-os-niveis-da-organizacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/it-security-conference-temos-de-ver-a-seguranca-na-cloud-de-um-ponto-de-vista-de-governance</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-protecao-no-hardware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/gartner-identifica-os-fatores-que-influenciam-o-crescimento-dos-gastos-em-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-ciso-nem-sempre-sao-a-forca-motriz-para-implementar-programas-de-ciberseguranca-tambem-vem-dos-ceo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/onde-para-o-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/setor-da-saude-e-o-mais-afetado-por-malware-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/volume-de-detecoes-de-malware-em-endpoints-diminui-20</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/mais-de-metade-das-instituicoes-de-ensino-sofreram-ataques-em-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/vulnerabilidade-dgs-nao-podemos-continuar-a-manter-estas-coisas-no-obscurantismo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/agencias-governamentais-da-america-latina-alvo-de-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-competencias-humanas-dos-profissionais-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cibercrime-evolui-com-crescimento-do-ransomware-as-a-service</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/grupos-de-ransomware-atacam-uma-mesma-rede-consecutivamente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-estado-da-nacao-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberseguranca-tornou-se-numa-das-grandes-preocupacoes-para-os-lideres-empresariais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ministerio-dos-negocios-estrangeiros-portugues-utilizado-para-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-ao-firmware-tornam-se-numa-ameaca-cada-vez-mais-presente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-foco-deve-ser-avaliar-a-situacao-e-os-riscos-e-a-capacidade-de-defender-responder-e-recuperar-a-organizacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-organizacoes-de-ot-sofreram-uma-intrusao-nos-ultimos-12-meses</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/disaster-recovery-as-a-service-quando-tudo-corre-mal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-fator-humano-na-defesa-e-ataque-a-organizacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-2022-nao-foi-so-agora-que-portugal-comecou-a-olhar-para-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-2022-boas-dinamicas-organizacionais-e-apostar-na-formacao-das-pessoas-resolve-muitos-problemas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-2022-temos-de-deixar-de-usar-o-argumento-dos-bons-e-dos-maus-usos-ja-sabemos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ransomware-e-falha-humana-entre-os-principais-riscos-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ha-muitas-empresas-que-ou-nao-tem-nocao-das-suas-capacidades-ou-se-superestimam</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberseguranca-entre-as-principais-preocupacoes-das-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-organizacoes-sofreram-ciberataques-bem-sucedidos-contra-caixa-de-email</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-protecao-dos-dispositivos-moveis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/idc-security-roadshow-2022-nenhuma-organizacao-tem-visibilidade-total-do-problema</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/comecar-a-proteger-desde-o-inicio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/entrevista-george-beebe-its05-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/eua-processam-hackers-russos-que-terao-estado-ligados-a-ciberataques-ao-setor-da-energia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-recursos-do-centro-nacional-de-ciberseguranca-para-apoiar-as-empresas-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ma-configuracao-e-a-principal-causa-de-incidentes-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/bola-de-cristal-a-ciberseguranca-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/exploracao-de-vulnerabilidades-de-software-sem-patch-de-seguranca-sao-cada-vez-maiores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/estudo-indica-que-organizacoes-nao-tem-defesa-efetiva-contra-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/byopc-proteger-o-computador-pessoal-do-colaborador</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/no-proprio-dia-do-ataque-virem-taxativamente-dizer-que-nao-houve-acesso-a-dados-pessoais-e-precipitado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-ciberseguranca-da-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-utilizador-e-o-elo-mais-fraco-porque-nao-o-robustecemos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-flagelo-do-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-empresas-nao-implementou-solucoes-de-seguranca-para-o-trabalho-remoto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/pirataria-continua-a-crescer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-sofreram-mais-50-de-ciberataques-durante-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-cinco-passos-para-melhorar-a-seguranca-na-colaboracao-remota</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/malware-para-endpoints-e-ransomware-ultrapassa-niveis-de-2020</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-batalha-perdida-contra-as-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-que-esperar-do-supply-chain-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/seguranca-de-dispositivos-de-trabalhadores-remotos-exige-nova-estrategia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-que-esperar-das-ameacas-persistentes-avancadas-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/estamos-a-evoluir-para-uma-economia-de-cibercrime-e-a-ameaca-e-crescente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-morte-anunciada-da-password</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/youve-got-mail-proteger-a-maior-caixa-de-entrada-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-organizacoes-olham-para-a-ciberseguranca-e-nao-percebem-que-pode-parar-o-negocio-como-um-todo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/sophos-preve-panorama-de-ciberameacas-para-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/um-em-cada-dez-incidentes-de-ciberseguranca-nas-organizacoes-sao-graves</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-oportunidades-do-cibercrime-para-o-proximo-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-tempestade-perfeita-da-ciberseguranca-no-trabalho-hibrido</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/microsoft-identifica-os-paises-mais-atacados-por-cibergrupos-com-apoios-de-estados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-portuguesas-sofrem-mais-de-800-ataques-por-semana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/manufatura-e-producao-menos-propensos-a-pagar-resgates-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/iso-27001-o-poder-da-informacao-assenta-na-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/sase-a-nova-protecao-da-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-alteracoes-nas-abordagens-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-ciberseguranca-existe-porque-existe-negocio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-nova-ameaca-do-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-boas-praticas-para-proteger-e-recuperar-informacoes-apos-um-ataque-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/iniciativas-de-automacao-sao-travadas-por-temas-de-seguranca-e-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/brecha-na-t-mobile-impacta-53-milhoes-de-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/falta-de-talento-especializado-poe-em-causa-seguranca-de-organizacoes-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/lacuna-de-competencias-digitais-inviabiliza-sustentabilidade-das-empresas-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/viagens-e-teletrabalho-desafiam-seguranca-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/apenas-metade-das-organizacoes-estao-preparadas-para-se-defender-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-papel-do-cyber-leader-na-criacao-de-um-ecossistema-seguro-e-resiliente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/multicloud-traz-novos-desafios-para-os-profissionais-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/um-quarto-dos-exploits-vendidos-tem-mais-de-tres-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/custos-de-violacao-de-dados-atingem-recordes-durante-a-pandemia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maior-produtora-de-petroleo-confirma-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/no-more-ransom-ja-impediu-que-quase-mil-milhoes-de-euros-fossem-pagos-a-hackers</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/microsoft-e-das-marcas-mais-utilizadas-para-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ambientes-iot-incitam-estrategias-avancadas-de-gestao-de-identidades-e-acessos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/solucoes-sase-e-cloud-sao-o-futuro-da-seguranca-do-trabalho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/windows-11-coloca-seguranca-no-topo-da-piramide</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-dos-portugueses-nunca-recebeu-formacao-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberseguranca-e-como-escovar-os-dentes-tres-vezes-ao-dia-e-preciso-fazer-o-basico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-2021-aprender-com-os-erros-do-passado-atraves-da-nova-estrategia-da-uniao-europeia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days-2021-uma-inteligencia-artificial-de-confianca-aliada-a-ciberseguranca-na-nova-era-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/desconfiar-para-proteger-as-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days2021-o-tempo-que-passa-entre-uma-vulnerabilidade-ser-descoberta-e-comecar-a-ser-explorada-e-muito-curto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/c-days2021-precisamos-de-alcancar-a-imunidade-de-grupo-e-tornar-naturais-os-comportamentos-e-atitudes-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/queremos-ate-2026-requalificar-cerca-de-dez-mil-especialistas-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/inteligencia-artificial-a-ciberseguranca-para-alem-dos-humanos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/numero-de-organizacoes-afetadas-por-ransomware-mais-do-que-duplicou</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/hackers-passam-mais-de-250-horas-nas-redes-das-vitimas-sem-serem-detetados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/sophos-garante-protecao-e-gestao-central-a-lexarte-advogados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/trickbot-foi-a-ameaca-que-mais-afetou-as-organizacoes-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/toshiba-sofre-ataque-dos-mesmos-responsaveis-do-colonial-pipeline</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/empresas-portuguesas-sofreram-41-ataques-de-malware-por-hora-em-abril</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-portuguesas-sao-atacadas-926-vezes-por-semana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/organizacoes-apostam-em-seguranca-integrada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-empresas-nacionais-nao-consegue-proteger-clientes-contra-fraudes-por-email</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/futuro-das-empresas-em-risco-por-falta-de-estrategia-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-pme-esperam-que-ciberataques-sejam-mais-frequentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/recuperar-de-ataques-de-ransomware-custa-mais-de-15-milhoes-de-euros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-organizacoes-planeia-aumentar-despesa-com-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/principais-fornecedores-de-cloud-vao-estar-entre-os-maiores-fornecedores-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/portugal-e-dos-paises-com-mais-vitimas-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberhigiene-a-base-da-saude-de-uma-organizacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ataques-ddos-continuam-a-diminuir</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/empresas-nao-confiam-nos-proprios-controlos-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ransomware-as-a-service-e-o-novo-grande-problema-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-ciberseguranca-das-organizacoes-e-mais-importante-do-que-nunca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/microsoft-acusa-hackers-chineses-de-explorar-falhas-em-software-de-email</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/duplicam-ataques-a-industrias-que-apoiam-esforcos-de-resposta-a-covid-19</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/relatorio-analisa-os-ultimos-20-anos-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/pfizer-tera-sido-atacada-por-hackers-norte-coreanos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-novas-tendencias-dos-cibercriminosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-novos-desafios-do-trabalho-remoto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/pagamentos-de-ransomware-estao-a-descer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/numero-de-ficheiros-maliciosos-detetados-diariamente-cresceu-52</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-espiao-que-veio-do-frio---o-maior-ataque-de-sempre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-empresas-tem-de-medir-o-que-importa-resultados-do-negocio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-cinco-tendencias-de-ciberseguranca-para-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-segredo-do-sucesso-do-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/sase-ou-servicos-de-acesso-seguro-ao-edge</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/trabalho-digital-impulsiona-a-transferencia-segura-de-documentos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberseguranca-previsoes-para-2021-nao-sao-as-melhores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-equipas-de-seguranca-devem-estar-em-alerta-24-horas-por-dia-sete-dias-por-semana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/variante-de-malware-de-roubo-de-informacao-entra-na-lista-das-principais-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-ciberataques-de-phishing-mais-tentadores-para-os-colaboradores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/devemos-ou-nao-automatizar-os-processos-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-ransomware-esta-a-evoluir-mas-a-chave-para-prevenir-ataques-continua-a-ser-a-mesma</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/como-travar-a-crise-do-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/nova-versao-de-trojan-qbot-atinge-lista-dos-principais-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/-bring-your-own-pc-uma-entrada-para-o-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/92-das-equipas-de-ciberseguranca-carecem-de-ferramentas-de-prevencao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/portugal-e-dos-paises-onde-os-utilizadores-sao-mais-atacados-por-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/portugal-e-um-dos-paises-afetados-por-novo-trojan-bancario</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/erro-humano-esta-ligado-a-60-das-falhas-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/empresas-que-gerem-ambientes-multicloud-sao-mais-propensas-a-sofrer-um-incidente-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ransomware-encriptacao-torna-se-cada-vez-mais-recorrente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/confianca-zero</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/mais-15-mil-milhoes-de-contas-a-venda-na-dark-web</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/como-voltar-a-tornar-o-trabalho-no-escritorio-seguro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ransomware-um-dos-grandes-problemas-da-seguranca-online</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-dos-ataques-de-phishing-estao-relacionados-com-criptomoedas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-que-as-empresas-precisam-de-saber-para-melhorar-a-seguranca-movel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/descoberta-campanha-de-spyware-atraves-do-google-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/maioria-das-pequenas-empresas-nao-informa-colaboradores-sobre-seguranca-dos-dispositivos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-vulnerabilidades-de-ciberseguranca-das-ultimas-tres-decadas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/uma-sociedade-cashless-ameacada-por-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-hackers-prestam-atencao-ao-rumo-dos-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/mais-de-metade-das-empresas-sofreram-um-ataque-de-ransomware-em-2019</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/melhorar-a-seguranca-atraves-de-autenticacao-multi-fator</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-lado-humano-das-violacoes-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/cibercrimes-em-portugal-podem-aumentar-300-em-abril</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-futuro-do-ciso-nas-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciso-um-cargo-do-it-ou-da-gestao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-que-acontece-com-o-fim-do-suporte-ao-windows-7</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/reutilizacao-de-passwords-uma-falha-na-seguranca-de-muitas-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/como-as-familias-de-ransomware-mais-frequentes-atacam</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/s21sec-realiza-evento-dedicado-a-gestao-estrategica-do-risco-cibernetico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/ciberseguranca-as-preocupacoes-incontornaveis-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/as-competencias-necessarias-para-a-ciberseguranca-das-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/banco-italiano-sofre-data-leak-envolvendo-tres-milhoes-de-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/2020--uma-ciberguerra-a-caminho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-que-e-e-como-evitar-o-password-spraying</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/guerra-tecnologica-sino-americana-continua-na-inteligencia-artificial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/eua-terao-feito-ciberataque-contra-o-irao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-riscos-de-seguranca-dos-escritorios-inteligentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/managed-services-atacados-por-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/a-guerra-fria-evoluiu-para-a-guerra-de-sombras</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/malware-as-a-service-um-negocio-chamado-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/quais-os-estilhacos-que-vao-voar-nesta-guerra-comercial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/consumidores-nao-utilizam-antivirus-em-smartphones-ou-tablets</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/o-estado-atual-da-ciberseguranca-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/seguranca-vs-privacidade-ate-que-ponto-pode-a-privacidade-ser-um-entrave-a-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/analysis/os-cinco-mandamentos-da-privacidade-e-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/eset-reforca-seguranca-cloud-e-integra-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/databricks-entra-no-mercado-de-ciberseguranca-com-lakewatch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/palo-alto-networks-lanca-browser-seguro-para-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sentinelone-e-cloudflare-reforcam-parceria</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-reforca-forticnapp-para-melhorar-gestao-de-risco-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/openai-lanca-ferramenta-de-ia-para-detetar-vulnerabilidades-em-software</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/claude-code-security-reforca-defesa-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-leva-ia-a-gestao-de-riscos-de-identidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-reforca-aposta-global-na-seguranca-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/zscaler-reforca-aposta-na-seguranca-da-ia-para-acelerar-adocao-empresarial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/palo-alto-networks-e-google-cloud-expandem-parceria-para-acelerar-iniciativas-de-cloud-e-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-integra-auto-scaling-na-oracle-cloud-infrastructure</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/commvault-lanca-solucao-de-ambiente-seguro-para-copias-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/chrome-tornara-https-obrigatorio-por-padrao-em-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sophos-lanca-solucao-para-proteger-contra-ataques-baseados-em-identidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-anuncia-novas-funcionalidades-na-plataforma-de-riscos-baseadas-em-ia-de-agentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sophos-lanca-servicos-de-consultoria-e-disponibiliza-resiliencia-proativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/watchguard-anuncia-sase-hibrido-adaptado-para-pme-e-grandes-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sophos-integra-endpoint-no-taegis-para-reforcar-protecao-e-reduzir-custos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/barracuda-reforca-managed-xdr-com-resposta-automatizada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/apple-lanca-iphone-17-e-iphone-air-com-protecao-avancada-contra-spyware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/palo-alto-networks-lanca-prisma-sase-40-com-protecao-avancada-no-browser</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-lanca-novas-capacidades-de-ia-para-gestao-de-riscos-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/rapid7-automatiza-correcoes-com-nova-solucao-integrada-no-exposure-command</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/netskope-disponibiliza-ferramenta-de-seguranca-de-dados-para-ia-no-aws-marketplace</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sophos-amplia-capacidades-do-sophos-managed-risk-para-detetar-vulnerabilidades-internas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-lanca-nova-suite-de-seguranca-e-anuncia-melhorias-no-portfolio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/watchguard-lanca-total-mdr-com-inteligencia-artificial-para-reforcar-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-lanca-nova-firewall-fortigate-700g-para-ambientes-hibridos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/hpe-anuncia-expansoes-para-ajudar-empresas-a-modernizar-conectividade-segura</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/commvault-e-deloitte-anunciam-alianca-estrategica-para-melhorar-ciberresiliencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/lenovo-introduz-oferta-de-seguranca-para-pme</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/google-integra-gemini-nano-no-chrome-para-bloquear-fraudes-de-suporte-tecnico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/firewall-da-check-point-obtem-certificacao-internacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/commvault-reforca-recuperacao-pos-ciberataque-com-nova-funcionalidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/cato-networks-lanca-controlos-de-seguranca-para-ia-generativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-reforca-security-copilot-com-novos-agentes-de-ia-para-resposta-a-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-lanca-atualizacoes-na-plataforma-de-seguranca-ot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/google-lanca-nova-versao-do-scanner-de-vulnerabilidades-open-source</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/nova-versao-da-cobalt-strike-reforca-capacidades-de-evasao-para-red-team</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-revoluciona-operacoes-de-seguranca-com-novos-avancos-no-fortianalyzer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/watchguard-lanca-nova-solucao-hibrida-de-sase</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/commvault-expande-solucao-de-ciber-resiliencia-para-organizacoes-de-saude</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/apple-retira-funcionalidade-de-encriptacao-end-to-end-no-reino-unido</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/google-cloud-adiciona-digital-signatures-para-a-era-quantica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-lanca-novos-firewalls-fortigate-g</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/cipher-atualiza-plataforma-xmdr-com-ia-e-big-data</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-reforca-seguranca-com-novas-capacidades-da-infinity-platform</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/google-lanca-biblioteca-de-open-source-para-analise-de-composicao-de-software</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/cipher-integra-plataforma-xmdr-no-azure-marketplace-para-reforcar-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-testa-recurso-recall-em-pc-copilot-com-chips-amd-e-intel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/aws-apresenta-nova-ferramenta-para-acelerar-resposta-a-incidentes-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-amplia-oferta-com-novas-solucoes-de-seguranca-baseadas-em-ia-generativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/dell-technologies-acelera-inovacao-com-ia-e-fortalece-seguranca-para-clientes-microsoft</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/thales-expande-oferta-de-seguranca-de-dados-na-plataforma-ciphertrust-as-a-service</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-lanca-solucao-de-prevencao-de-perda-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/lancada-solucao-de-assessment-comportamental-relacionada-com-ciberseguranca-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/netskope-amplia-funcionalidades-de-dspm</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sophos-lanca-nova-serie-de-firewalls</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/commvault-lanca-plataforma-de-ciber-resiliencia-para-clientes-da-aws</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/nova-solucao-da-commvault-simplifica-a-ciber-resiliencia-para-empresas-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/wtw-lanca-seguro-de-ciber-risco-para-pme</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-lanca-solucao-de-mitigacao-de-riscos-ciberneticos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-revela-melhorias-na-solucao-de-sase</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-vai-implementar-mfa-obrigatorio-no-azure</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/warpcom-e-fortinet-desenvolvem-nova-solucao-de-seguranca-quantica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-lanca-nova-tecnologia-de-prevencao-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-lanca-plataforma-de-seguranca-para-api</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-anuncia-plataforma-para-eliminar-riscos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/eset-lanca-nova-solucao-de-autenticacao-multifator</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-lanca-sistema-de-gestao-de-riscos-de-ciberseguranca-para-ativos-obsoletos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-anuncia-ferramentas-para-apoiar-estrategias-de-seguranca-zero-trust</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-lanca-programa-para-colmatar-falta-de-competencias-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/watchguard-aumenta-detecao-e-resposta-com-nova-solucao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-anuncia-assistente-de-seguranca-com-ia-generativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-apresenta-nova-serie-de-firewall-de-ultima-geracao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/kyndryl-e-vawlt-anunciam-parceria-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-assina-iniciativa-de-ciberseguranca-da-cisa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-vai-obrigar-a-utilizar-autenticacao-multifator</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/eset-anuncia-integracao-da-plataforma-eset-protect-com-a-elastic-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-apresenta-novo-servico-gratuito</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/commvault-lanca-solucao-para-ajudar-na-recuperacao-de-um-ataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/eset-lanca-nova-solucao-a-pensar-nas-pequenas-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-apresenta-atualizacao-no-sistema-operativo-de-seguranca-de-rede</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sophos-e-tenable-lancam-servico-de-gestao-de-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-anuncia-colaboracao-com-a-microsoft</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/airbus-desiste-de-compra-de-unidade-de-ciberseguranca-da-atos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/novos-processadores-da-intel-vao-contar-com-novidades-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-lanca-ferramenta-de-red-team-para-ia-generativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/apple-adiciona-encriptacao-post-quantum-ao-imessage</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-lanca-equipamento-com-5g-dual-modem-ai-powered-security-e-zero-trust</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-anuncia-solucao-de-rede-segura-com-integracao-wi-fi-7</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-lanca-nova-solucao-para-medir-e-mitigar-risco-em-saas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-lanca-novas-firewalls-a-pensar-nas-pme</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-converge-ia-e-cloud-no-infinity-ai-copilot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-anuncia-novos-servicos-de-seguranca-integrados-de-tecnologia-operacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/airbus-faz-oferta-para-adquirir-unidade-de-ciberseguranca-da-atos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/cisco-faz-aquisicao-para-melhorar-seguranca-da-multicloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-procura-reforcar-inovacao-continua-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/ibm-apresenta-novo-processador-quantico-e-alarga-roadmap</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-apresenta-nova-plataforma-para-reduzir-ciberrisco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/commvault-lanca-plataforma-para-ciber-resiliencia-das-empresas-hibridas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-anuncia-disponibilidade-de-pacotes-no-marketplace-da-aws</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-expande-oferta-de-sase</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-vai-implementar-politicas-de-mfa-para-aceder-a-portais-de-administracao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-lanca-quantum-sase-para-responder-as-necessidades-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-lanca-novos-switches-para-os-campus-modernos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sophos-anunciou-novos-pontos-de-acesso-wi-fi-6-geridos-remotamente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-expande-solucao-sase</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/cisa-lanca-estrutura-de-hbom-para-gestao-de-risco-da-cadeia-de-fornecimento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/schneider-electric-lanca-servicos-de-seguranca-geridos-para-ambientes-operacionais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-lanca-atualizacao-do-windows-11-para-corrigir-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-software-adquire-startup-de-seguranca-saas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-expande-portfolio-de-secure-networking-para-convergir-rede-e-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-anuncia-novos-servicos-sd-wan-para-simplificar-operacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-anuncia-solucao-para-gestao-de-risco-de-software-proprietario</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/solucoes-de-operacoes-da-fortinet-utilizam-ia-para-reduzir-tempo-de-detecao-e-resposta</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-adquire-empresa-de-sse-por-490-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-anuncia-tecnologia-zero-phishing-alimentada-por-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/kyndryl-e-veritas-apresentam-novas-solucoes-para-recuperacao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-reforca-aposta-no-licenciamento-flexivel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/proton-lanca-gestor-de-passwords-open-source</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/commvault-redefine-protecao-de-dados-com-novas-capacidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/colt-estabelece-parceria-com-venari-security-para-ajudar-a-proteger-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/ampliacao-da-cloud-firewall-da-check-point-ajuda-a-proteger-wan-virtual-do-microsoft-azure</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-regista-crescimento-positivo-no-primeiro-trimestre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-e-cowbell-otimizam-avaliacao-de-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/dashlane-apresenta-solucao-que-elimina-a-necessidade-de-password</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/ibm-acelera-detecao-e-resposta-a-ameacas-com-nova-suite-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-anuncia-nova-solucao-para-azure-gateway</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/dashlane-anuncia-integracao-com-aws-nitro-enclaves</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-lanca-ferramenta-de-ciberseguranca-que-integra-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-atualiza-fortisase</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/nova-solucao-de-seguranca-end-to-end-da-check-point-promove-ciber-resiliencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/avancos-de-solucao-da-sophos-melhoram-defesas-contra-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/dell-technologies-lanca-novos-servicos-e-solucoes-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-lanca-novas-solucoes-e-servicos-para-ambientes-de-ot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sophos-amplia-portfolio-de-firewalls</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/colt-reforca-portfolio-de-sase</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/ferramenta-permite-emular-ataques-em-sistemas-de-machine-learning</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/watchguard-anuncia-lancamento-de-solucao-de-xdr</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/commvault-aumenta-protecao-de-dados-com-nova-versao-da-sua-plataforma</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/novos-produtos-de-firewall-da-watchguard-trazem-melhor-desempenho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-procura-acelerar-convergencia-entre-redes-e-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-expande-plataforma-cloud-para-reduzir-riscos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-lanca-solucao-de-ciberseguranca-a-pensar-nas-pme</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/eurotux-lanca-solucao-de-disaster-recovery-as-a-service</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-estabelece-parceria-com-samsung-mobile-para-melhorar-seguranca-movel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-expande-servicos-e-formacao-para-apoiar-equipas-de-soc</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sophos-lanca-primeiro-mdr-que-integra-telemetria-agnostica-quanto-ao-fornecedor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/novo-servico-de-firewall-cloud-native-e-potenciado-por-inteligencia-artificial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/watchguard-apresenta-dispositivo-para-apoio-a-trabalhadores-remotos-e-ambientes-exteriores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/nova-serie-de-firewalls-reduz-consumo-de-energia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/visionware-lanca-threat-intelligence-center</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/palo-alto-networks-anuncia-inovacoes-para-enfrentar-ameacas-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/solucao-implementa-direitos-de-acesso-a-dados-sensiveis-para-proteger-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/plataforma-de-detecao-com-analise-nativa-na-cloud-opera-com-e-sem-agentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/nova-solucao-pretende-transformar-mundo-do-governance-risk-and-compliance</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/commvualt-automatiza-protecao-na-cloud-para-workloads-de-kubernetes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/palo-alto-networks-anuncia-disponibilidade-de-plataforma-autonoma-de-operacoes-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sophos-anuncia-compatibilidade-com-tecnologias-de-ciberseguranca-de-terceiros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/thales-completa-aquisicao-da-s21sec</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/commvault-anuncia-servico-de-cyber-decoy-para-detecao-precoce-de-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-lanca-solucoes-e-servico-de-operacoes-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/google-conclui-aquisicao-da-mandiant</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/relatorio-revela-que-65-das-empresas-nao-tem-confianca-nos-seus-backups</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/infinidat-apresenta-primeira-garantia-de-armazenamento-ciber-resiliente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/nec-e-fortinet-celebram-acordo-para-fornecer-seguranca-em-redes-5g</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/dashlane-revela-solucao-de-passkeys-para-browsers</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/nova-solucao-pretende-disponibilizar-visao-de-360-da-sap-cybersecurity</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qnap-anuncia-software-de-ciberseguranca-para-uso-sem-switches-qgd-poe</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/schneider-electric-e-claroty-procuram-reduzir-ciber-riscos-dos-edificios-inteligentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sophos-anuncia-unidade-para-ajudar-organizacoes-a-se-defenderem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-lanca-nova-oferta-de-protecao-contra-riscos-digitais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fortinet-anuncia-nova-oferta-de-detecao-e-resposta-de-rede</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-lanca-familia-de-produtos-para-a-seguranca-de-identidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-apresenta-nova-protecao-para-dispositivos-moveis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-disponibiliza-servico-para-apoiar-no-combate-ao-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sophos-reforca-solucao-com-funcionalidades-para-linux-e-seguranca-de-containers</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-disponibiliza-priorizacao-melhorada-para-detetar-incidentes-criticos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/webcheckpt-do-cncs-conta-com-novas-validacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/ibm-lanca-servico-para-gestao-e-mitigacao-de-risco-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/cloudflare-anuncia-novas-ferramentas-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/qualys-lanca-solucao-de-detecao-contextual-de-ameacas-da-industria</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-altera-predefinicoes-para-melhorar-seguranca-de-rede</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/check-point-apresenta-nova-versao-do-harmony-connect</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/sophos-amplia-ecossistema-de-ciberseguranca-com-zero-trust</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/lancada-nova-firewall-que-proporciona-seguranca-de-data-center-hiper-rapida</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/autenticacao-biometrica-aumenta-durante-a-pandemia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/o-malware-mais-temido-do-ultimo-mes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/o-cibercrime-esta-muito-relacionado-com-a-oportunidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/portugal-regista-aumento-de-ameacas-contra-sistemas-de-controlo-industrial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/governo-dos-eua-acusa-formalmente-a-russia-de-ataque-a-solarwinds</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/mais-de-500-milhoes-de-utilizadores-do-facebook-veem-as-suas-informacoes-divulgadas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/solarwinds-hackers-terao-acedido-a-emails-de-oficiais-norte-americanos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/empresas-tem-duvidas-sobre-se-colaboradores-conseguem-prevenir-e-detetar-um-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/95-das-empresas-sofreram-uma-interrupcao-nao-planeada-no-ultimo-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/pandemia-faz-aumentar-ataques-de-ransomware-contra-servicos-de-saude</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/engenharia-social-e-cada-vez-mais-utilizada-em-ataques-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/as-previsoes-de-privacidade-para-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/o-malware-mais-temido-de-novembro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/normas-de-ciberseguranca-nao-voltam-ao-estado-pre-pandemico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/mais-de-metade-das-empresas-considera-a-ciberseguranca-como-uma-prioridade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/55-das-empresas-vao-aumentar-os-seus-orcamentos-de-ciberseguranca-ate-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/organizacoes-devem-implementar-estrategia-de-seguranca-projetada-para-mobilidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/alemanha-fara-supervisao-mais-rigida-a-huawei</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/descobertos-url-a-venda-que-redirecionam-para-paginas-potencialmente-perigosas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/servicos-de-vpn-com-fuga-de-dados-de-mais-de-20-milhoes-de-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/garmin-confirma-que-foi-vitima-de-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/ibm-corrige-vulnerabilidade-em-check-gateway</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/eua-acusam-hackers-chineses-de-roubo-de-investigacoes-relacionadas-com-covid-19</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/cncs-regista-crescimento-de-124-em-numero-de-incidentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/registado-maior-ataque-ddos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/hacker-chegou-a-quase-cinco-mil-sites-oficiais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/o-aumento-dos-ataques-aos-servicos-online</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/aumento-de-ataques-ddos-no-primeiro-trimestre-de-2020</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/o-regresso-em-seguranca-ao-trabalho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/policia-judiciaria-realiza-buscas-a-suspeitos-de-ataque-a-altice</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/ransomware-os-desafios-para-garantir-a-continuidade-do-negocio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/altice-portugal-tera-sofrido-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/edp-ciberataque-abr20</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/marriott-international-volta-a-ser-vitima-de-fuga-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/maioria-das-empresas-portuguesas-nao-esta-preparada-para-trabalho-remoto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/s21sec-lanca-relatorio-das-ameacas-do-segundo-semestre-de-2019</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/dados-de-departamento-governo-dos-estados-unidos-expostos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/erro-de-software-expoe-numeros-de-identificacao-de-126-milhoes-de-dinamarqueses</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-confirma-data-breach-de-250-milhoes-de-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/reveladas-meio-milhao-de-passwords-de-servidores-routers-e-dispositivos-iot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/portugal-entre-os-paises-mais-afetados-por-campanha-de-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/dados-biometricos-um-paradoxo-da-era-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/ciberataques-quatro-dicas-para-se-proteger-nos-aeroportos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/empresas-de-seguranca-vao-ajudar-google-a-analisar-apps-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/emotet-volta-a-atacar-apos-tres-meses-de-silencio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/as-principais-insegurancas-no-futuro-da-robotica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/fator-humano-responsavel-por-52-das-quebras-de-ciberseguranca-na-industria</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/ataques-ddos-continuam-a-aumentar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/huawei-acusa-eua-de-ciberataques-e-intimidacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/eua-acusam-china-de-ciberataques-em-varias-frentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/estudo-revela-vulnerabilidades-de-seguranca-na-iot-medica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/itech/microsoft-lanca-solucao-para-proteger-agentes-politicos-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-em-plugin-wordpress-expoe-800-mil-sites</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-clickfix-visa-macs-com-paginas-falsas-da-cloudflare</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fraude-com-deepfakes-cresce-e-expoe-falhas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/citrix-corrige-falha-critica-no-netscaler</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-falhas-criticas-em-nova-atualizacao-do-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/tycoon-2fa-mantem-atividade-apos-operacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/oracle-corrige-falha-critica-no-identity-manager</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-alerta-para-falha-critica-no-sharepoint</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-russo-explora-falha-em-webmail-para-espionagem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-android-esconde-se-em-apps-de-streaming</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-kit-ios-permite-controlo-total-de-dispositivos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-ransomware-explora-vulnerabilidade-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/glassworm-ataca-centenas-de-projetos-open-source</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanhas-clickfix-visam-macos-com-infostealer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nove-falhas-criticas-no-apparmor-expoem-milhoes-de-sistemas-linux</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sites-falsos-de-vpn-roubam-credenciais-empresariais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-alerta-para-falha-critica-que-permite-execucao-remota</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-permite-reset-de-passwords</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/corrigidas-falhas-criticas-no-backup-server</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/adobe-corrige-80-vulnerabilidades-em-oito-produtos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/chrome-corrige-dois-zero-day-explorados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-criticas-no-ios-xr-permitem-execucao-de-comandos-e-controlo-de-dispositivos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sis-alerta-para-ataques-a-contas-whatsapp-e-signal-patrocinados-por-estado-estrangeiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sap-corrige-falhas-criticas-no-fs-quo-e-netweaver</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-79-vulnerabilidades-e-duas-falhas-zero-day-no-patch-tuesday-de-marco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-exploracao-ativa-de-falha-no-ivanti-endpoint-manager</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-phishing-no-microsoft-teams-instala-novo-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-variante-do-ataque-clickfix-usa-windows-terminal-para-contornar-mecanismos-de-detecao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-falhas-apple-exploradas-em-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-installfix-distribuem-malware-via-guias-cli</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-vulnerabilidades-criticas-no-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/patches-corrigem-falhas-criticas-em-appliances-de-rede</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-vulnerabilidade-critica-explorada-em-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-vulnerabilidade-zero-day-em-android-explorada-em-ataques-direcionados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-em-2026-exploram-confianca-em-vez-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-phishing-imita-zoom-teams-e-google-meet-para-controlo-remoto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-no-ms-agent-permite-execucao-remota-e-compromisso-do-sistema</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falso-site-de-seguranca-da-google-usa-app-para-roubar-credenciais-e-codigos-mfa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-no-chrome-expoe-camara-e-microfone-atraves-do-painel-gemini</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-alerta-para-falha-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-apt37-visa-sistemas-isolados-da-rede</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-corrige-zero-day-critico-explorado-ativamente-por-atacantes-sofisticados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-desmantela-campanha-global-que-visava-telecomunicacoes-e-governos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/identificado-ataque-que-explora-agentes-de-ia-autonomos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-no-roundcube-exploradas-ativamente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-alerta-para-falha-no-icewarp</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/promptspy-usa-gemini-para-persistir-em-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/poc-confirma-exploracao-ativa-de-zero-day-no-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/volume-de-novo-malware-dispara-1548-e-contorna-defesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-malware-infeta-milhares-de-dispositivos-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/plataformas-de-ia-utilizadas-para-ocultar-canais-de-comando-maliciosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-zero-day-afetam-plataformas-pdf</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-zero-day-em-plataforma-de-recuperacao-explorada-por-grupo-ligado-a-china</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-ciberseguranca-lanca-novo-alerta-de-falha-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/clickfix-utiliza-dns-para-entregar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-300-extensoes-chrome-expoem-dados-de-milhoes-de-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/botnet-sshstalker-infeta-sete-mil-sistemas-linux</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupos-patrocinados-por-estados-recorrem-ao-gemini-para-operacoes-de-ciberespionagem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-alerta-para-pressao-continua-de-ciberameacas-contra-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/chrome-145-corrige-falhas-criticas-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/plugin-wordpress-com-900-mil-sites-expoe-rce</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-corrige-vulnerabilidade-zero-day-explorada-em-ataques-altamente-direcionados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/duas-falhas-criticas-marcam-patch-day-da-sap</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/zerodayrat-expoe-android-e-ios-a-espionagem-movel-avancada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-seis-vulnerabilidades-zero-day-exploradas-ativamente-no-patch-tuesday</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-recentes-da-solarwinds-podem-ter-sido-exploradas-como-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-a-cadeia-de-fornecimento-visam-plataforma-open-source-de-agentes-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/comissao-europeia-investiga-ciberataque-a-sistemas-internos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-compromete-servidores-nginx-para-sequestrar-trafego-web-de-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-falhas-criticas-no-looker-com-risco-de-execucao-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanhas-de-infostealers-adaptam-se-ao-macos-e-exploram-o-fator-humano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/permissoes-excessivas-a-agentes-de-ia-criam-novas-vulnerabilidades-na-cadeia-de-software</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-spear-phishing-explora-screensavers-para-obter-acesso-remoto-a-sistemas-windows</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-exploracao-de-vulnerabilidade-critica-da-solarwinds</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-em-react-native-explorada-em-ataques-reais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-alerta-para-falhas-criticas-na-ivanti</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-russos-exploram-falha-recente-no-microsoft-office</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataque-de-phishing-com-pdf-rouba-credenciais-do-dropbox</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-falha-no-outlook</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ivanti-corrige-falhas-criticas-zero-day-no-epmm</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-alerta-para-vulnerabilidade-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-vulnerabilidades-linux-exploradas-ativamente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/openssl-corrige-vulnerabilidade-critica-que-permite-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/extensoes-para-chrome-e-edge-usadas-para-roubar-sessoes-do-chatgpt</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-de-seguranca-em-controlo-de-acessos-fisicos-expoem-grandes-organizacoes-europeias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-falha-critica-no-office-explorada-ativamente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-da-vmware-identificada-em-2024-explorada-ativamente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-contornam-autenticacao-em-sistemas-corrigidos-recentemente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/identificado-o-primeiro-malware-avancado-criado-com-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-grave-no-motor-v8-leva-google-a-atualizar-chrome-144</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-em-plugin-wordpress-expoe-milhares-de-sites</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-zero-day-na-cloudflare-permitiu-contornar-waf</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-em-camaras-permite-controlo-remoto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-alerta-para-falha-critica-que-permite-execucao-remota-de-comandos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataque-crashfix-explora-extensao-maliciosa-no-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-alerta-de-seguranca-que-sinalizava-componente-do-windows-como-vulneravel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-em-firewalls-permite-ataques-de-negacao-de-servico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-e-mozilla-corrigem-falhas-criticas-que-permitiam-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-criticas-que-levam-a-execucao-remota-de-codigo-corrigidas-em-produtos-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-phishing-explora-falsos-comentarios-oficiais-do-linkedin</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-malware-cloud-native-explora-linux-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataque-a-endesa-expoe-informacao-sensivel-mas-nao-afeta-clientes-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-de-gravidade-maxima-no-n8n-expoe-segredos-e-infraestruturas-de-ia-a-ataques-remotos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apt28-intensifica-phishing-contra-energia-e-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-alerta-para-falhas-de-elevada-criticidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-criticas-permitem-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-de-dns-provoca-reinicios-em-massa-de-switches-usados-por-pequenas-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-continuam-a-afetar-20-dos-sistemas-industriais-a-nivel-global</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-explorada-em-ataques-permite-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/milhares-de-utilizadores-afetados-por-extensoes-falsas-de-ia-no-google-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-clickfix-visa-setor-hoteleiro-na-europa-com-falsas-reservas-da-booking</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/phishing-esteve-na-origem-de-um-em-cada-quatro-ciberataques-em-portugal-em-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-no-chrome-webview-permite-contornar-restricoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-aumento-de-vulnerabilidades-exploradas-em-ambientes-reais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-phishing-visa-administradores-wordpress-com-falsas-renovacoes-de-dominio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/botnet-kimwolf-ja-infetou-mais-de-dois-milhoes-de-dispositivos-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/amazon-confirma-campanha-de-ciberataques-russos-contra-clientes-da-aws-em-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/investigacao-em-curso-apos-intrusao-em-servidores-externos-da-agencia-espacial-europeia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-dez-mil-firewalls-expostas-a-falha-2fa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-react2shell-usada-para-alargar-alcance-de-botnet-rondodox</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataque-a-supply-chain-do-emeditor-distribuiu-infostealer-a-partir-do-site-oficial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-variante-do-toneshell-recorre-a-rootkit-em-kernel-mode-para-ciberespionagem-estatal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ferramenta-open-source-explorada-como-trojan-de-acesso-remoto-em-ataques-furtivos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-mongodb-expoe-informacao-confidencial-de-mais-de-87-mil-servidores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-pro-russia-reivindica-ataque-a-la-poste-dias-antes-do-natal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/pacote-malicioso-npm-rouba-contas-e-mensagens-do-whatsapp-atraves-de-biblioteca-falsa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-em-motherboards-permite-ataques-previos-ao-arranque-do-sistema</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-zero-day-em-firewalls-explorada-em-ataques-reais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/botnet-compromete-mais-de-18-milhoes-de-dispositivos-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-continua-a-pressionar-o-setor-da-saude-apesar-de-melhorias-na-recuperacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidades-criticas-afetam-software-de-gestao-it-e-plataforma-telco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sonicwall-alerta-para-exploracao-ativa-de-falha-que-eleva-privilegios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-chines-explora-vulnerabilidade-zero-day-critica-em-equipamentos-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-permite-controlo-total-sem-autenticacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/amazon-revela-campanha-cibercriminosa-russa-contra-infraestrutura-critica-entre-2021-e-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/identificados-cinco-grupos-chineses-que-exploram-vulnerabilidade-react2shell-para-entregar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-lanca-atualizacoes-para-corrigir-vulnerabilidades-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-ciberseguranca-alerta-para-vulnerabilidade-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/processadores-intel-e-amd-afetados-por-vulnerabilidades-no-padrao-pcie-ide</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ciberespionagem-ligado-a-china-explora-vmware-e-azure-com-malware-brickstorm</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-lanca-atualizacao-de-emergencia-para-corrigir-oitavo-zero-day-do-chrome-em-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-campanha-global-usa-sites-gerados-por-ia-para-distribuir-syncro-manipulado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/patch-tuesday-de-dezembro-aborda-falha-zero-day-ativa-no-windows</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-react2shell-leva-a-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-ciberseguranca-lanca-mais-um-alerta-de-vulnerabilidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-atualizacao-do-chrome-mitiga-bugs-de-alta-gravidade-e-amplia-protecao-contra-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-deixa-milhares-de-sites-wordpress-expostos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/android-recebe-atualizacao-critica-apos-exploracao-ativa-de-duas-falhas-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-malware-compromete-extensoes-do-chrome-e-edge-durante-varios-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fortinet-deteta-novo-botnet-a-explorar-falhas-graves-em-dispositivos-iot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibergrupo-sequestra-atualizacoes-de-software-atraves-de-dispositivos-de-rede</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-akira-explora-falhas-em-vpn-sonicwall-herdadas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-expoe-campanhas-de-spyware-que-exploram-whatsapp-signal-e-falhas-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataque-massivo-ao-ecossistema-npm-e-github-expoe-segredos-e-falhas-na-supply-chain</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-no-oracle-identity-manager-entra-na-lista-de-vulnerabilidades-ativamente-exploradas-da-cisa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/oracle-corrige-falha-critica-apos-indicios-de-exploracao-antes-do-patch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ia-e-dominios-temporarios-elevam-risco-de-phishing-e-fraude-online</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-no-xwiki-e-explorada-ativamente-por-multiplos-atores-de-ameaca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fortiweb-sofre-segunda-exploracao-zero-day-em-menos-de-uma-semana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/chrome-corrige-setima-vulnerabilidade-zero-day-de-2025-em-atualizacao-de-emergencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-criticas-de-seguranca-detetadas-em-frameworks-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ciberespionagem-chines-recorre-a-ia-para-orquestrar-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-encerra-plataforma-de-phishing-usada-em-ataques-globais-de-smishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/investigadores-alertam-para-bug-critico-em-dispositivos-fortiweb</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/europol-desmantela-mais-de-mil-servidores-de-malware-na-terceira-fase-da-operacao-endgame</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-autorreplicante-inunda-npm-com-milhares-de-pacotes-maliciosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-exploraram-falhas-zero-day-em-infraestruturas-de-identidade-e-acesso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-falha-zero-day-explorada-no-windows-no-patch-tuesday</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberespionagem-atinge-novo-patamar-de-sofisticacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sap-lanca-novas-notas-de-seguranca-para-corrigir-falhas-criticas-em-multiplos-produtos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/segredos-expostos-no-github-atingem-empresas-de-ia-avaliadas-em-mais-de-400-mil-milhoes-de-euros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/tp-link-eua-avancam-com-proposta-para-banir-a-marca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-zero-day-em-dispositivos-explorada-para-distribuir-spyware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/plataformas-de-cloud-e-ia-sao-porta-de-entrada-para-ataques-no-setor-industrial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/perdas-financeiras-por-smishing-vao-diminuir-11-em-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidades-no-chatgpt-permitem-roubo-de-dados-e-manipulacao-de-memorias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/clickfix-evolui-e-reforca-tecnicas-de-engenharia-social-para-enganar-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-apoiado-por-estado-tera-furtado-configuracoes-de-firewall-guardadas-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-utiliza-ia-durante-execucao-para-sofrer-mutacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-em-pacote-npm-permite-execucao-arbitraria-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/plugin-post-smtp-deixa-centenas-de-milhares-de-sites-vulneraveis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-no-microsoft-teams-permitem-falsificar-identidades-e-manipular-mensagens</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/infostealers-responsaveis-por-mais-de-80-da-atividade-de-malware-alerta-cncs</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-vulnerabilidade-critica-no-android-que-ameaca-milhoes-de-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/empresas-europeias-sofrem-com-aumento-de-13-de-ataques-ransomware-no-ultimo-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falta-de-talento-em-ciberseguranca-custa-milhoes-as-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/botnets-intensificam-ataques-a-servidores-php-dispositivos-iot-e-infraestrutura-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/registados-mais-de-100-mil-downloads-de-pacotes-npm-infetados-com-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/resolucao-lenta-de-incidentes-de-email-aumenta-risco-de-ransomware-em-79</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-antigas-em-plugins-do-wordpress-continuam-a-ser-exploradas-em-larga-escala</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cyber-warfare-operations-a-resposta-adequada-as-ameacas-invisiveis-do-ciberespaco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-falha-critica-no-wsus-que-permite-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/oracle-lanca-374-correcoes-de-seguranca-na-atualizacao-critica-de-outubro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-alteram-malware-ja-descoberto-por-novas-ferramentas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-vulnerabilidades-exploradas-na-apple-e-microsoft</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-revoga-mais-200-certificados-para-interromper-campanha</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-foi-a-marca-mais-explorada-em-ataques-de-brand-phishing-no-terceiro-trimestre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dispositivos-antigos-comprometidos-por-rootkit-apos-falha-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/f5-lanca-patches-apos-violacao-associada-a-ataque-patrocinado-por-estado-nacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/harvard-e-primeira-vitima-confirmada-de-campanha-de-extorsao-a-clientes-da-oracle</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/escassez-de-talento-e-porta-aberta-para-aumento-de-violacoes-de-ciberseguranca-alerta-fortinet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-mais-de-170-vulnerabilidades-incluindo-cinco-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-cibercriminoso-expoe-milhoes-de-registos-roubados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/corrigidas-vulnerabilidades-criticas-no-junos-space</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-phishing-automatizada-explora-infraestrutura-legitima-do-npm</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/oracle-investiga-campanha-de-extorsao-dirigida-a-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/chrome-e-firefox-corrigem-vulnerabilidades-de-alta-severidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nist-publica-guia-para-reduzir-riscos-de-ciberseguranca-associados-a-dispositivos-usb</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/metade-dos-utilizadores-de-pc-em-portugal-ainda-utiliza-windows-10</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidades-criticas-afetam-openssl</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vmware-corrige-seis-vulnerabilidades-criticas-em-produtos-usados-globalmente-e-na-europa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-ransomware-akira-explora-falha-critica-em-vpn</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-em-camaras-esta-a-ser-explorada-por-cibercriminosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-corrige-vulnerabilidade-zero-day-explorada-em-routers-e-switches</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detido-no-reino-unido-suspeito-com-ligacoes-a-ciberataque-a-aeroportos-europeus</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/solarwinds-corrige-vulnerabilidade-critica-que-permitia-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/aplicacoes-falsas-e-trojans-bancarios-alimentam-aumento-de-ataques-em-android-no-primeiro-semestre-do-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cloudflare-trava-maior-ataque-ddos-alguma-vez-registado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataque-de-ransomware-a-aeroportos-europeus-explorou-vulnerabilidade-zero-day-no-citrix-adc</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-exploracao-ativa-de-vulnerabilidades-criticas-no-ivanti-epmm</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-botnet-utiliza-routers-e-falhas-de-dns-para-campanhas-globais-de-spam</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/aeroportos-europeus-vivem-dias-de-caos-apos-ciberataque-que-provocou-perturbacoes-significativas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fraudes-online-disfarcam-se-de-pre-encomendas-e-ofertas-falsas-do-novo-iphone</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-phishing-recorre-a-redireccionamentos-do-facebook-para-roubar-credenciais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-sexta-vulnerabilidade-zero-day-no-chrome-so-este-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-criticas-no-chaos-mesh-permitem-comprometer-kubernetes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataque-a-supply-chain-compromete-pacotes-npm-com-malware-persistente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ucrania-reivindica-ciberataques-durante-eleicoes-russas-com-interrupcoes-em-servicos-digitais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-em-dispositivos-android-explorada-em-ataques-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ransomware-akira-explora-falhas-em-firewalls</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminoso-ucraniano-associado-a-ataque-de-ransomware-entra-na-lista-dos-mais-procurados-da-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fornecedor-europeu-de-mitigacao-de-ddos-sofre-ataque-de-15-mil-milhoes-de-pacotes-por-segundo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/kit-de-phishing-salty2fa-contorna-mfa-e-desafia-defesas-tradicionais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-81-vulnerabilidades-incluindo-duas-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sap-corrige-vulnerabilidades-criticas-no-netweaver</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-mantem-se-como-principal-ameaca-digital-mas-phishing-ganha-forca-com-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataque-de-phishing-compromete-pacotes-npm-e-expoe-ecossistema-de-software-a-novos-riscos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-ghostaction-compromete-centenas-de-repositorios-no-github</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-lazarus-adota-tecnica-clickfix-para-reforcar-operacoes-de-ciberespionagem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/exploits-em-windows-e-linux-aumentam-no-primeiro-semestre-de-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-do-sap-s4hana-explorada-ativamente-em-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-apt-chinesa-explora-redes-empresariais-para-infiltracoes-prolongadas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/amazon-bloqueia-campanha-russa-que-visava-credenciais-de-utilizadores-da-microsoft</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cloudflare-confirma-violacao-de-dados-em-ataque-a-supply-chain-via-salesforce</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-patrocinados-por-estado-nacao-dominaram-exploracao-de-vulnerabilidades-no-primeiro-semestre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ransomware-garante-controlo-total-do-azure-em-ataques-corporativos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberto-primeiro-malware-que-recorre-a-ia-generativa-para-criar-ataques-em-tempo-real</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/whatsapp-corrige-falha-critica-explorada-em-ataques-sofisticados-com-spyware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/empresas-europeias-satisfeitas-com-threat-intelligence-apelam-a-maior-precisao-e-velocidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-vulnerabilidade-explorada-no-git</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/citrix-corrige-vulnerabilidade-critica-no-netscaler-explorada-em-ataques-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataque-expoe-dados-de-centenas-de-milhares-de-clientes-da-auchan</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/principais-gestores-de-passwords-vulneraveis-a-ataques-de-clickjacking-que-roubam-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-vulnerabilidade-zero-click-no-copilot-que-rouba-dados-de-forma-invisivel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-voltam-a-subir-em-julho-ransomware-cresce-28-a-nivel-mundial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/corrigidas-vulnerabilidades-criticas-no-chrome-e-firefox</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/volume-de-links-maliciosos-com-tecnica-clickfix-quase-quadruplicou-em-12-meses</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataque-a-allianz-life-compromete-dados-de-mais-de-um-milhao-de-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-alerta-para-vulnerabilidade-critica-em-plataforma-de-gestao-de-firewall</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-sarangtrap-utiliza-aplicacoes-falsas-de-encontros-para-roubar-dados-pessoais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/phishing-e-trojans-dominam-as-ameacas-digitais-em-portugal-no-primeiro-semestre-de-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-vulnerabilidade-critica-que-permite-roubo-silencioso-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-exploram-falha-critica-no-sap-netweaver-para-instalar-malware-furtivo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ciberespionagem-explora-falhas-da-vmware-para-atacar-redes-isoladas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mitel-lanca-correcao-para-falha-critica-que-permite-tomar-controlo-de-sistemas-de-comunicacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-alerta-para-implementacao-de-ransomware-em-ataques-ao-sharepoint</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-ao-setor-do-retalho-ultrapassaram-os-800-casos-na-europa-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ameacas-que-imitam-o-chatgpt-aumentaram-115</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-ligado-ao-irao-usa-nova-versao-de-spyware-android-em-contexto-de-conflito-com-israel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-tecnica-de-ataque-usa-codigos-qr-para-contornar-chaves-de-seguranca-fido</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/toolshell-foi-explorado-em-ataques-semanas-antes-de-ser-corrigido</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/crushftp-alerta-para-vulnerabilidade-zero-day-explorada-por-cibercriminosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-processa-operadores-de-botnet-badbox-20</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-lanca-correcao-de-emergencia-para-vulnerabilidade-zero-day-explorada-no-sharepoint</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-quinta-vulnerabilidade-zero-day-do-chrome-em-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataque-a-cadeia-de-fornecimento-compromete-plugin-do-wordpress-e-coloca-sites-em-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/7-das-empresas-industriais-so-lidam-com-falhas-quando-necessario</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-ddos-bloqueados-em-2025-ja-ultrapassam-total-de-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-permite-exibir-mensagens-de-phishing-atraves-de-injecao-de-prompts--</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-ordena-correcao-de-risco-significativo-e-inaceitavel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descobertas-seis-vulnerabilidades-criticas-em-plataforma-de-monitorizacao-de-data-centers</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-no-bluetooth-permite-espiar-e-controlar-milhoes-de-carros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-exploram-recursos-cloud-abandonados-para-fraudes-digitais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-130-vulnerabilidades-na-patch-tuesday-de-julho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ivanti-lanca-atualizacoes-criticas-para-connect-secure-e-policy-secure</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/tycoon-2fa-aposta-em-dominios-espanhois-para-expandir-operacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-versao-de-infostealer-para-macos-adiciona-backdoor-para-ataques-persistentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-ciberseguranca-lanca-alertas-de-malware-e-de-vulnerabilidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-utilizam-falsas-atualizacoes-para-instalar-malware-em-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/spyware-para-android-leva-a-publicacao-de-62-mil-logins</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-em-plugin-para-wordpress-compromete-mais-de-400-mil-sites</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-seis-milhoes-de-clientes-afetados-em-ciberataque-a-companhia-aerea-qantas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/tribunal-penal-internacional-deteta-novo-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/eua-alertam-para-possiveis-ciberataques-iranianos-a-infraestruturas-criticas-com-ligacoes-a-israel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fbi-alerta-para-cibercriminosos-que-se-fazem-passar-por-investigadores-de-fraudes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidades-em-chipsets-bluetooth-expoem-risco-de-espionagem-atraves-de-dispositivos-de-audio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dados-de-quase-todos-os-cidadaos-paraguaios-expostos-apos-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/portugal-entre-os-paises-europeus-com-maior-percentagem-de-ataques-de-malware-em-pc</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/citrix-alerta-para-exploracao-de-dispositivos-netscaler</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-explora-sites-legitimos-para-promover-falsos-contactos-de-suporte-tecnico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/eua-alertam-para-aumento-do-risco-de-ciberataques-por-grupos-pro-iranianos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-vulnerabilidade-em-routers-descontinuados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/16-mil-milhoes-de-credenciais-login-expostas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-exploram-senhas-de-aplicacoes-google-para-contornar-autenticacao-multifator</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detetadas-vulnerabilidades-que-permitem-execucao-remota-de-codigo-em-servidores-de-backup</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/relatorio-alerta-para-aumento-de-600-nos-ciberataques-ao-setor-da-aviacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataque-compromete-contas-de-email-de-jornalistas-do-washington-post</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-vulnerabilidade-de-zero-click-no-ios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/safepay-lidera-ameacas-globais-de-ransomware-em-maio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-zero-click-pode-levar-a-exfiltracao-de-dados-de-servicos-de-ia-generativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-40-mil-camaras-de-seguranca-expostas-a-ciberataques-remotos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fabricantes-corrigem-vulnerabilidades-nos-seus-produtos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-vulnerabilidade-ja-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-lanca-patches-para-vulnerabilidade-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-mais-de-30-vulnerabilidades-no-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-custam-milhoes-de-dolares-as-empresas-industriais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/violacao-de-dados-da-cartier-expoe-informacoes-de-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-lanca-atualizacoes-para-vulnerabilidades-no-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/qualys-descobre-nova-campanha-de-ciberataques-com-trojan-remcos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/relatorio-alerta-para-aumento-de-ciberataques-automatizados-com-recurso-a-ia-e-novas-tecnicas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/operacao-internacional-desmantela-infraestrutura-de-ransomware-e-acusa-alegados-cibercriminosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-empresas-para-exploracao-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/educacao-em-portugal-ve-media-semanal-de-ciberataques-a-crescer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vmware-corrige-vulnerabilidade-que-expoe-utilizadores-a-fuga-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/violacao-de-dados-expoe-informacoes-de-requerentes-de-apoio-juridico-no-reino-unido</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/agenttesla-continua-a-ser-o-malware-mais-comum-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-whatsapp-alerta-para-riscos-em-aplicacoes-de-confianca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-corrige-falhas-de-seguranca-no-ios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fbi-alerta-para-nova-vaga-de-ataques-a-routers-antigos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/eua-desmantelam-servicos-de-proxy-ilegais-operados-por-botnet-global</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/exploracao-de-vulnerabilidade-critica-compromete-centenas-de-instancias-sap-netweaver</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/check-point-identifica-2025-como-o-ano-mais-perigoso-para-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dynamics-365-explorado-em-nova-campanha-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-ciberataques-a-sistemas-industriais-nos-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-lanca-correcoes-para-35-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-recorrem-a-curriculos-falsos-e-sites-de-ofertas-de-emprego-para-espalhar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-falha-grave-explorada-ativamente-em-atualizacoes-de-seguranca-para-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-identifica-vulnerabilidade-critica-explorada-ativamente-em-cenarios-reais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/check-point-alerta-para-uso-crescente-de-ia-por-parte-de-cibercriminosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descobertas-vulnerabilidades-no-ubuntu-para-contornar-restricoes-de-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sonicwall-alerta-para-exploracao-de-vulnerabilidades-ja-corrigidas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-detetou-75-vulnerabilidades-zero-day-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-envolvido-em-quase-metade-das-violacoes-de-dados-revela-verizon</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/milhares-de-aplicacoes-afetados-por-vulnerabilidade-critica-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidades-criticas-em-routers-expoem-utilizadores-a-ataques-remotos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-foi-o-principal-alvo-em-ataques-de-phishing-no-primeiro-trimestre-de-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dark-web-capitaliza-vulnerabilidades-do-deepseek-para-expor-dados-e-informacao-confidencial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-malware-utiliza-nfc-para-roubar-dados-de-cartoes-de-pagamento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-exploram-infraestrutura-da-google-em-ataque-de-phishing-sofisticado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/atlassian-e-cisco-corrigem-falhas-criticas-que-permitem-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/tecnica-de-clickfix-ganha-forca-entre-grupos-apt-estatais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/oracle-lanca-correcoes-para-180-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-alerta-para-abuso-do-nodejs-para-distribuir-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/firefox-e-chrome-corrigem-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detecao-de-trojans-bancarios-moveis-aumentam-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-apostam-em-ataques-mais-evasivos-e-mineracao-de-criptomoedas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/zoom-corrige-falhas-de-seguranca-que-afetam-multiplas-plataformas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vmware-corrige-47-vulnerabilidades-criticas-no-tanzu-greenplum</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/registados-mais-de-890-milhoes-de-esquemas-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-em-switches-permite-alteracao-remota-de-senhas-de-administrador</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-vulnerabilidade-critica-e-garante-novo-patch-para-windows-10</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-62-falhas-de-seguranca-no-android-incluindo-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-vulnerabilidade-critica-explorada-no-ivanti-connect-secure</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sidewinder-ataca-instalacoes-nucleares-no-sul-da-asia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/pdf-representam-22-dos-anexos-maliciosos-propagados-por-e-mail</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/aumento-de-scanning-que-envolve-milhares-de-ip-faz-soar-alertas-para-futuros-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-descobre-vulnerabilidades-criticas-no-bootloader-atraves-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-exploram-diretorio-oculto-do-wordpress-para-implementar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-exploram-popularidade-do-deepseek-ai-para-disseminar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidades-em-sistemas-de-energia-solar-podem-ameacar-redes-eletricas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/broadcom-lanca-alerta-e-correcao-para-vulnerabilidade-no-vmware-tools</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ferramenta-eleva-stuffing-de-credenciais-a-larga-escala</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/tres-em-cada-quatro-utilizadores-empresariais-partilham-dados-sensiveis-com-aplicacoes-de-ia-generativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-falha-critica-no-chrome-apos-campanha-de-ciberespionagem-contra-organizacoes-russas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidades-criticas-em-kubernetes-abrem-caminho-a-exposicao-de-clusters</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detetada-atividade-de-ciberespionagem-contra-entidade-europeia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-do-chrome-permite-execucao-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/lancadas-correcoes-para-vulnerabilidades-em-sistemas-de-backup-e-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-exploram-firebase-para-ataques-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-permite-atacantes-executarem-codigo-malicioso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/milhares-de-sites-wordpress-comprometidos-com-malware-dollyway</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupos-de-ciberespionagem-exploram-falha-nao-corrigida-no-windows-desde-2017</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-exploram-vulnerabilidade-no-chatgpt-para-atacar-organizacoes-financeiras-e-governamentais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/formbook-foi-o-malware-mais-utilizado-em-portugal-durante-mes-de-fevereiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/acao-conhecida-do-github-comprometida-em-ataque-a-cadeia-de-valor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-recorre-a-plataforma-booking-para-lancar-ataques-de-phishing-contra-setor-hoteleiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-exploram-falhas-de-seguranca-para-implementar-ransomware-superblack</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-usam-phishing-sofisticado-para-atacar-utilizadores-do-copilot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-lanca-atualizacao-urgente-para-corrigir-vulnerabilidade-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-explorada-por-cibercriminosos-em-routers-leva-a-atualizacao-de-emergencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-norte-coreano-distribui-spyware-para-android-via-google-play</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mozilla-reforca-urgencia-de-atualizacao-do-firefox-para-garantir-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/25-das-empresas-mundiais-afetadas-por-ameacas-persistentes-avancadas-em-2024-revela-relatorio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-mais-de-50-vulnerabilidades-e-seis-falhas-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-pro-palestina-na-origem-de-ciberataque-a-rede-social-x</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-vulnerabilidades-criticas-no-ivanti-epm</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/acao-coordenada-reduz-em-80-o-uso-ilegal-do-cobalt-strike</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/investigadores-alertam-para-ameaca-global-de-vulnerabilidade-em-scripts-php</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-infostealer-afeta-mais-de-um-milhao-de-dispositivos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/milhares-de-servidores-vmware-esxi-vulneraveis-a-falhas-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-badbox-infeta-meio-milhao-de-dispositivos-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-ao-setor-automovel-crescem-63-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-alerta-para-mudanca-de-taticas-do-grupo-silk-typhoon</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-lanca-atualizacao-para-corrigir-mais-de-40-vulnerabilidades-no-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-avisa-que-ha-novas-vulnerabilidades-a-serem-ativamente-exploradas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-expoes-nomes-de-cibercriminosos-envolvidos-em-abuso-de-ia-generativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/governo-industria-e-educacao-os-setores-mais-afetados-pelo-ransomware-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-recorrem-a-anuncios-fraudulentos-para-ataques-de-engenharia-social-no-paypal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/adocao-de-ia-generativa-da-deepseek-aumenta-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-extensoes-maliciosas-do-chrome-afeta-mais-de-32-milhoes-de-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-recorrem-a-truques-e-manipulacao-de-url-para-roubar-credenciais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-confirma-vulnerabilidade-critica-no-microsoft-partner-center</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-exploram-redes-em-menos-de-quatro-horas-e-meia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-para-android-foi-descarregado-mais-de-cem-mil-vezes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-chineses-exploraram-falhas-antigas-para-atacar-redes-de-telecomunicacoes-nos-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/spyware-pegasus-expande-alvo-para-executivos-do-setor-privado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/check-point-alerta-para-crescimento-exponencial-de-phishing-em-portugues-com-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-vulnerabilidade-critica-no-bing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detecao-de-malware-nos-endpoints-aumenta-300-no-terceiro-trimestre-de-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-russos-exploram-autenticacao-do-microsoft-365-para-comprometer-contas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerablidades-no-openssh-expoem-utilizadores-a-ataques-mitm-e-dos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-de-seguranca-criticas-levam-cisa-a-reforcar-alertas-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/remcos-foi-o-malware-mais-comum-em-portugal-no-primeiro-mes-do-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-no-chatgpt-operator-pode-expor-dados-pessoais-atraves-de-prompt-injection</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-de-seguranca-em-impressoras-expoem-credenciais-de-autenticacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-explora-diretorio-de-plugins-do-wordpress-para-comprometer-servidores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-40-das-violacoes-de-dados-terao-origem-no-uso-indevido-de-ia-generativa-ate-2027</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/lazarus-group-explora-engenharia-social-para-distribuir-malware-infostealer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-usam-sites-falsos-do-reddit-e-wetransfer-para-espalhar-lumma-stealer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ivanti-e-fortinet-corrigem-falhas-com-novas-atualizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/deepseek-levanta-preocupacoes-ao-falhar-testes-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/adobe-corrige-45-falhas-de-seguranca-em-software</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-lanca-correcoes-para-vulnerabilidades-zero-day-exploradas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/modo-restrito-usb-explorado-em-ciberataque-contra-dispositivos-apple</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-atingiu-recorde-em-2024-com-mais-de-cinco-mil-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-no-sharepoint-connector-da-microsoft-expos-credenciais-de-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-ataques-em-curso-a-falha-critica-no-microsoft-outlook</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-fatboypanel-compromete-50-mil-utilizadores-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dispositivos-de-rede-alvo-de-ataque-de-forca-bruta-com-28-milhoes-de-enderecos-de-ip</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/chaves-aspnet-expostas-utilizadas-para-implementar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-e-mozilla-corrigem-falhas-criticas-no-chrome-e-firefox</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-usam-convites-de-casamento-falsos-para-espalhar-malware-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/italia-bloqueia-acesso-ao-deepseek-apos-duvidas-sobre-privacidade-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vmware-alerta-para-vulnerabilidade-no-avi-load-balancer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-lanca-correcoes-para-vulnerabilidades-e-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-utilizam-ssh-tunneling-para-aceder-ao-vmware-esxi</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-levam-deepseek-a-limitar-novos-registos-na-plataforma</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-indica-que-vulnerabilidade-antiga-esta-a-ser-utilizada-por-cibergrupos-chineses</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/oracle-corrige-cerca-de-200-vulnerabilidades-em-janeiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ia-generativa-e-kits-de-malware-aumentam-eficiencia-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-teams-explorado-por-cibercriminosos-para-roubar-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/maioria-das-redes-empresariais-europeias-foi-atacada-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-na-api-chatgpt-abre-caminho-para-ataques-ddos-a-sites</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/phishing-e-a-principal-ameaca-a-seguranca-dos-smartphones</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-ddos-com-nova-botnet-ameacam-infraestruturas-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/star-blizzard-lanca-campanha-de-spear-phishing-para-comprometer-contas-do-whatsapp</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-exploram-contas-do-google-ads-para-disseminar-anuncios-maliciosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-recorrem-a-infostealers-ocultos-no-youtube-e-google-para-espalhar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-tres-falhas-de-seguranca-criticas-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/zoom-lanca-correcoes-para-varias-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-descobre-falha-no-macos-que-permite-instalacao-de-rootkits</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fortinet-corrige-falha-zero-day-explorada-em-ataques-reportados-no-final-de-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/juniper-networks-lanca-atualizacoes-para-corrigir-vulnerabilidades-criticas-no-junos-os</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-usam-falsas-entrevistas-de-emprego-para-distribuir-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/crescente-adulteracao-de-etiquetas-nfc-coloca-utilizadores-em-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-usam-phishing-via-imessage-para-contornar-protecao-de-links</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-esquema-de-phishing-tem-como-alvo-empresas-nas-redes-sociais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ivanti-alerta-para-vulnerabilidades-criticas-em-produtos-empresariais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-banshee-coloca-em-risco-utilizadores-de-macos-com-novas-tecnicas-de-evasao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/atacantes-ucranianos-reivindicam-ataque-a-operador-russo-nodex-e-causam-colapso-total</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-e-mozilla-lancam-atualizacoes-para-corrigir-falhas-de-alta-gravidade-nos-navegadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-vulnerabilidades-criticas-da-oracle-e-da-mitel-exploradas-em-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/plugin-do-wordpress-compromete-sites-legitimos-com-ataques-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/2024-regista-recorde-global-de-vulnerabilidades-divulgadas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-confirma-que-ataque-ao-departamento-do-tesouro-dos-eua-nao-atingiu-outras-agencias-federais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vitimas-perdem-500-milhoes-de-dolares-em-2024-em-ataques-a-carteiras-de-criptomoedas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/lancada-exploracao-de-poc-para-vulnerabilidade-de-execucao-de-codigo-arbitrario-em-servidores-openssh</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/lazarus-utiliza-novo-malware-cookieplus-para-atacar-organizacoes-nucleares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-ciberataques-compromete-29-extensoes-do-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-chineses-comprometem-departamento-do-tesouro-dos-eua-em-incidente-significativo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ia-deve-ser-protegida-de-ataques-de-prompts-diretos-e-indiretos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/botnets-exploram-routers-obsoletos-em-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apache-corrige-vulnerabilidade-critica-no-tomcat</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/botnet-baseado-em-mirai-explora-falha-em-dispostiivos-de-rede</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/routers-com-palavras-passe-predefinidas-estao-a-ser-infetados-com-mirai</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/adobe-corrige-vulnerabilidade-que-ja-tem-proof-of-concept</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/servicos-gratuitos-de-conversao-de-ficheiros-aumentam-riscos-dos-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ciberespionagem-bitter-lanca-nova-ameaca-com-miyarat</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/okta-alerta-clientes-para-aumento-de-phishing-a-imitar-equipa-de-suporte</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-emite-alerta-sobre-exploracao-de-vulnerabilidades-no-windows-e-coldfusion</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-spyware-para-android-ligado-a-vulnerabilidade-zero-day-em-processadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/citrix-lanca-alerta-de-ataques-de-password-spraying</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-exploracao-de-vulnerabilidades-recentemente-descobertas-para-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fortinet-partilha-informacoes-sobre-nova-variante-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/utilizacao-de-codigos-qr-fraudulentos-continua-a-crescer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-lanca-novas-correcoes-de-seguranca-para-ios-e-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/autoridades-desmantelam-27-plataformas-de-ataques-ddos-numa-operacao-global</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-androxgh0st-domina-em-novembro-e-ameaca-dispositivos-iot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/adobe-lanca-correcao-para-mais-de-160-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sap-corrige-vulnerabilidade-critica-no-netweaver</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-lanca-correcao-para-vulnerabilidade-no-windows-que-esta-a-ser-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-expoe-servidor-do-openwrt-a-imagens-de-firmware-maliciosas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-de-malware-e-ransomware-predominam-na-peninsula-iberica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sonicwall-lanca-correcoes-para-seis-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-chineses-comprometem-telecomunicacoes-dos-eua-e-dezenas-de-paises-diz-casa-branca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/relatorio-do-ncsc-adverte-que-reino-unido-esta-a-subestimar-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/operacao-europeia-derruba-servico-de-mensagens-encriptadas-utilizada-por-cibercriminosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-alerta-para-exploracao-de-vulnerabilidade-descoberta-ha-dez-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-lanca-iniciativa-de-resiliencia-para-fortalecer-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-phishing-recorre-a-documentos-corrompidos-para-contornar-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-servico-de-phishing-tem-contas-microsoft-365-como-alvo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-para-android-instalado-oito-milhoes-de-vezes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-informa-que-corrigiu-vulnerabilidade-que-esta-a-ser-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/funcionalidade-de-pesquisa-do-chatgpt-pode-expor-utilizadores-a-sites-maliciosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/reescrita-de-url-explorada-para-evadir-detecao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descobertas-vulnerabilidades-criticas-em-plug-in-utilizado-por-milhares-de-sites-wordpress</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-de-ransomware-aumentam-a-nivel-mundial-durante-mes-de-outubro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/patch-corrige-vulnerabilidades-no-qurouter</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-400-mil-sistemas-ainda-estarao-expostos-as-vulnerabilidades-mais-exploradas-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-adiciona-falhas-na-vmware-a-catalogo-de-exploracoes-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cipher-alerta-para-aumento-de-ataques-com-ia-entre-black-friday-e-o-natal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ransomware-akira-expoe-numero-recorde-de-dados-de-vitimas-num-unico-dia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-lanca-atualizacao-de-seguranca-para-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibergrupos-recorrem-a-pentesters-para-aperfeicoar-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-lanca-atualizacoes-criticas-para-ataques-zero-day-no-macos-e-ios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/milhares-de-dispositivos-iot-transformados-em-proxies-residenciais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/uso-de-anexos-svg-cresce-em-emails-de-phishing-para-evitar-a-detecao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/simuladores-de-movimento-do-rato-sao-possiveis-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-atacam-vitimas-na-europa-com-malware-strela-stealer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-confirma-exploracao-de-vulnerabilidade-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-em-plugin-do-wordpress-expos-mais-de-quatro-milhoes-de-sites</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-falhas-de-seguranca-criticas-em-rce-e-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/citrix-corrige-vulnerabilidades-criticas-no-session-recording-manager</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-nao-corrigida-em-nas-esta-a-ser-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-chineses-invadem-telecomunicacoes-dos-eua-para-espionar-altos-funcionarios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidades-de-alta-gravidade-corrigidas-no-zoom-e-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/phishing-as-a-service-cresce-como-ameaca-ao-setor-financeiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sap-resolve-vulnerabilidade-no-web-dispatcher-em-patch-de-novembro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/rede-tor-supera-ataque-de-falsificacao-de-ip-sem-afetar-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/outubro-marca-aumento-de-infostealers</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/veeam-lanca-correcao-para-falha-critica-no-backup-enterprise-manager</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fbi-alerta-para-falsos-pedidos-de-emergencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-da-coreia-do-norte-atacam-utilizadores-de-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/hpe-corrige-vulnerabilidades-criticas-em-access-points-aruba</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-cibercriminosos-chineses-ataca-organizacao-diplomatica-da-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-corrige-vulnerabilidade-critica-em-solucao-de-rede</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-confirma-ausencia-de-ameacas-crediveis-a-infraestrutura-de-votacao-nas-eleicoes-presidenciais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomhub-foi-responsavel-por-19-das-vitimas-de-ransomware-em-setembro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-lanca-correcoes-para-mais-de-40-vulnerabilidades-no-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-phishing-abusa-docusign-para-enviar-faturas-falsas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/emails-de-phishing-imitam-openai-para-roubar-credenciais-do-chatgpt</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/autoridade-britanica-recomenda-investimento-em-resiliencia-operacional-apos-incidente-da-crowdstrike</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-com-ia-sao-o-principal-risco-para-as-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/lastpass-alerta-para-apoios-aos-clientes-falsos-para-furtar-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/synology-corrige-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-descoberta-no-sharepoint-explorada-para-entrar-em-rede-corporativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-nova-vulnerabilidade-critica-no-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-fog-compromete-redes-empresariais-atraves-de-falha-em-vpn</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-cibercriminosos-russo-visa-ucrania-em-nova-campanha-de-ciberespionagem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ferramenta-permite-ultrapassar-novo-sistema-de-cookies-do-google-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ursula-von-der-leyen-denuncia-desinformacao-propagada-pela-russia-nos-balcas-ocidentais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/operacao-de-ransomware-faz-se-passar-por-suporte-de-it-no-microsoft-teams</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-alerta-para-exploracao-de-vulnerabilidade-zero-day-em-processadores-samsung</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-familia-de-ransomware-tem-dispositivos-macos-como-alvo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-que-falha-no-sharepoint-esta-a-ser-explorada-em-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-no-primeiro-semestre-de-2024-equivalem-a-70-de-todos-os-ataques-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-aumentam-75-no-terceiro-trimestre-de-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-no-roundcube-webmail-explorada-em-ataque-contra-entidade-governamental</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibergrupo-explora-vulnerabilidade-no-internet-explorer-em-ataque-a-cadeia-de-valor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-macos-estara-a-ser-explorada-em-ataques-de-adware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-usam-chatgpt-para-criar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-firefox-esta-a-ser-explorada-no-tor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/juniper-networks-lanca-correcoes-para-o-junos-os-e-junos-os-evolved</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-iraniano-explora-falha-no-windows-para-elevar-privilegios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-em-produto-veeam-explorada-em-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mozilla-corrige-vulnerabilidade-zero-day-que-esta-a-ser-explorada-no-firefox</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-mais-26-vulnerabilidades-no-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-de-phishing-com-recurso-a-ia-aumentam</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/identificados-mais-de-cinco-mil-emails-disfarcados-de-notificacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-na-zimbra-explorada-para-backdoors-em-servidores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-que-vulnerabilidades-antigas-estao-a-ser-exploradas-em-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-campanha-de-phishing-falsifica-macros-do-google-apps-script</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-cibercriminosos-iraniano-facilita-acesso-inicial-a-redes-no-medio-oriente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-versao-do-malware-octo-imita-nord-vpn-e-google-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-a-organizacoes-ucranianas-aumentaram-quase-20-no-primeiro-semestre-de-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/eset-corrige-vulnerabilidades-em-produtos-de-seguranca-para-windows-e-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ivanti-alerta-para-nova-vulnerabilidade-a-ser-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberatacantes-norte-coreanos-usam-recrutamento-falso-para-espalhar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vmware-corrige-vulnerabilidade-que-permite-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-diminuiu-no-primeiro-semestre-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-corrige-vulnerabilidades-de-seguranca-no-ios-18</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-exige-correcao-rapida-apos-ataques-com-malware-infostealer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-um-milhao-de-boxes-tv-android-infetados-com-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-malware-tem-como-alvo-servidores-weblogic</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ivanti-lanca-correcao-para-vulnerabilidade-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-quatro-vulnerabilidades-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/agent-tesla-foi-o-malware-mais-comum-durante-agosto-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberameacas-sao-cada-vez-mais-direcionadas-a-organizacoes-de-ot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ciberespionagem-chines-usa-novo-malware-para-furto-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/alemanha-acusa-grupo-russo-de-estar-por-detras-de-ciberataques-a-nato-e-a-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-recentemente-descoberta-em-firewall-estara-a-ser-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/veeam-corrige-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-lanca-correcao-para-remover-conta-de-backdoor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/d-link-alerta-para-vulnerabilidade-em-modelo-de-router-descontinuado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vmware-corrige-vulnerabilidade-de-execucao-de-codigo-no-fusion</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/atualizacao-do-chrome-corrige-vulnerabilidades-de-alta-severidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-zero-day-expoe-cctv-ao-mirai</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-operacao-de-raas-tem-vindo-a-crescer-nos-ultimos-meses</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sonicwall-corrige-vulnerabilidade-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-corrige-vulnerabilidades-no-nx-os</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-zero-day-no-wps-office-utilizado-para-ciberespionagem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-para-linux-evitou-detecao-durante-dois-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/eua-apontam-dedo-ao-irao-no-mais-recente-ciberataque-a-campanha-de-trump</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-tecnica-de-phishing-rouba-credenciais-bancarias-em-ios-e-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-corrige-vulnerabilidade-de-alta-severidade-reportada-pela-agencia-nacional-de-seguranca-dos-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/windows-corrige-vulnerabilidade-zero-day-explorada-pelo-grupo-lazarus</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dell-corrige-vulnerabilidade-no-dell-supportassist</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/portugal-regista-aumento-significativo-de-ransomware-no-primeiro-semestre-de-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataque-a-aws-atinge-230-milhoes-de-ambientes-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detetadas-vulnerabilidades-em-aplicacoes-microsoft-para-sistemas-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-utilizam-dados-roubados-para-pressionar-alvos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/solarwinds-corrige-vulnerabilidade-na-solucao-de-web-help-desk</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/agenttesla-foi-o-malware-predominante-em-portugal-durante-mes-de-julho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-e-a-marca-mais-imitada-em-ataques-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-vulnerabilidade-critica-no-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-35-mil-dominios-desvirtuados-para-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-sms-stealer-infeta-dispositivos-android-em-mais-de-cem-paises</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/spyware-para-android-escondido-em-apps-da-google-play-desde-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-alerta-para-exploracao-de-vulnerabilidade-corrigida-no-vmware-esxi</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sites-suscetiveis-a-ataques-xss-por-falha-na-implementacao-do-oauth</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/acronis-alerta-para-exploracao-em-falha-critica-no-cyber-infrastructure</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-exploram-vulnerabilidades-recentemente-descobertas-no-servicenow</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nvidia-corrige-vulnerabilidade-em-produtos-de-ia-e-rede</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dominios-fraudulentos-procuram-aproveitar-falha-da-crowdstrike</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-tatica-de-phishing-utiliza-protecoes-de-e-mail-para-mascarar-links</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-exploracao-de-falha-critica-no-geoserver-geotools</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/atandt-e-snowflake-pressionadas-por-senadores-norte-americanos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-usam-vulnerabilidade-de-zero-day-do-internet-explorer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/windows-nao-e-afetada-pela-vulnerabilidade-regresshion</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-usam-exploracoes-22-minutos-apos-lancamento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/violacao-de-dados-da-atandt-afeta-109-milhoes-de-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/infraestruturas-de-rede-de-desinformacao-russa-espalhada-pela-europa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/exercicio-red-team-da-cisa-deteta-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-permite-envio-de-ficheiros-maliciosos-para-as-caixas-de-email</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/organizacoes-japonesas-alvo-de-ataques-ligados-a-cibergrupo-norte-coreano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/citrix-corrige-vulnerabilidade-critica-no-netscaler</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vmware-corrige-vulnerabilidade-critica-no-aria-automation</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/plugin-utilizado-por-150-mil-sites-wordpress-alvo-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sap-corrige-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-alerta-para-exploracao-de-vulnerabilidade-no-hyper-v</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mandiant-realca-ciberameacas-russas-e-chinesas-a-nato</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-de-execucao-remota-de-codigo-no-ghostscript-esta-a-ser-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/o-panorama-de-ciberseguranca-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-grupo-de-ransomware-telefona-as-vitimas-para-pressiona-las</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/europol-apreende-servidores-colbalt-strike</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/splunk-corrige-vulnerabilidades-de-alta-severidade-em-produtos-empresariais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/registadas-tentativas-de-exploracao-do-regresshion</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-380-mil-hosts-ainda-referenciam-dominio-malicioso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-25-falhas-em-dispositivos-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ciberespionagem-chines-explora-falha-em-switches</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detetada-vulnerabilidade-critica-na-juniper-networks</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/servidores-openssh-potencialmente-vulneraveis-a-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-atacam-contas-de-clientes-da-hubspot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibergrupo-russo-devera-estar-por-tras-de-ataque-ao-teamviewer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-vulnerabilidade-do-moveit-transfer-atacada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-propaga-cargas-uteis-de-ransomware-e-cryptomining</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-confirma-acesso-de-cibercriminosos-a-informacao-de-instalacoes-quimicas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/varios-plugins-do-wordpress-comprometidos-apos-ataque-a-cadeia-de-valor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-russos-sancionados-pelo-conselho-europeu</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-securecore-uefi-pode-afetar-centenas-de-pc-e-servidores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-explora-dispositivos-android-para-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/atlassian-corrige-vulnerabilidades-de-alta-severidade-em-varios-produtos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/servico-de-phishing-onnx-visa-contas-do-microsoft-365-em-empresas-financeiras</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/corrigida-vulnerabilidade-critica-no-vmware-vcenter-server</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falsos-erros-levam-utilizadores-a-instalar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-vulnerabilidade-zero-click-no-outlook</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fakeupdates-continua-a-ser-a-principal-ameaca-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nvidia-corrige-vulnerabilidades-em-drivers-de-gpu</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/adobe-corrige-vulnerabilidades-que-permitem-execucao-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sap-corrige-vulnerabilidades-de-alta-severidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/php-corrige-vulnerabilidade-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/arm-alerta-para-exploracao-de-vulnerabilidade-no-kernel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detetado-malware-em-smart-tv-empresariais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fbi-alerta-para-falsos-trabalhos-remotos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-vulnerabilidades-no-sistema-operativo-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-exploracao-de-vulnerabilidade-no-linux</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-ciberseguranca-emite-novo-alerta-de-vulnerabilidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidades-em-tres-plugins-do-wordpress-permitem-a-injecao-de-scrips-maliciosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/lockbit-superado-pelo-play-como-grupo-lider-de-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vpn-estao-a-ser-atacadas-para-chegar-a-redes-empresariais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-mais-uma-vulnerabilidade-zero-day-no-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/veeam-corrige-falha-critica-no-backup-enterprise-manager</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/reino-unido-vai-propor-comunicacao-obrigatoria-de-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/qnap-lanca-correcao-para-dispositivos-nas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-adiciona-nova-falha-ao-catalogo-de-vulnerabilidades-exploradas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-utilizam-malvertising-para-atacar-admins-windows</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fluent-bit-afetada-por-falha-que-permite-recolha-de-informacao-sensivel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-no-ai-python-package-pode-levar-a-compromisso-do-sistema</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fortinet-destaca-os-ransomwares-mais-emergentes-no-ultimo-mes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/organizacoes-civis-cada-vez-mais-ameacadas-por-grupos-maliciosos-apoiados-por-governos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/perfil-do-github-usado-para-distribuir-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/400-mil-servidores-linux-afetados-pela-botnet-ebury-em-15-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-corrige-vulnerabilidade-zero-day-em-iphones-antigos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sap-lanca-correcoes-para-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-alerta-para-exploracao-de-vulnerabilidades-zero-day-e-lanca-correcoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dispositivos-iot-em-risco-por-causa-de-falhas-nos-modems-celulares-integrados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-vulnerabilidade-no-chrome-que-esta-a-ser-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/exploracao-de-vulnerabilidade-de-plugin-permite-criar-administradores-em-sites-wordpress</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-vulnerabilidade-critica-no-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-tecnica-permite-espiar-trafego-de-vpn</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-software-malicioso-ataca-utilizadores-de-macos-para-roubar-dados-sensiveis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/finlandia-alerta-para-ataques-de-malware-a-contas-de-banco-em-dispositivos-android-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/eua-alertam-que-coreia-do-norte-esta-a-explorar-definicoes-de-email-fracas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-mil-servidores-da-gitlab-afetados-por-vulnerabilidade-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ator-de-ameaca-chines-ligado-ao-gfw-investiga-resolvedores-dns-ha-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/violacao-de-dados-da-dropbox-afeta-as-informacoes-dos-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/trojan-para-android-permite-tomar-controlo-dos-dispositivos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/como-os-colaboradores-podem-detetar-um-deepfake</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/maioria-dos-ciberataques-ameacam-setor-da-saude</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-1400-servidores-crushftp-ainda-estao-vulneraveis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-alerta-de-vulnerabilidades-partilhado-pelo-cncs</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/maioria-dos-ciberataques-contra-empresas-comeca-com-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mitre-alvo-de-ataque-por-grupo-patrocinado-por-estado-nacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/tribunal-espanhol-reabre-investigacao-sobre-caso-de-spyware-pegasus-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ceo-da-unitedhealth-ouvido-no-congresso-dos-eua-apos-ataque-de-ransomware-a-subsidiaria-do-grupo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-descobre-ferramenta-de-malware-com-ligacoes-a-russia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/crushftp-lanca-correcao-para-vulnerabilidade-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-lanca-alerta-para-campanhas-de-ceo-fraud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-malware-soumnibot-explora-bugs-do-android-para-evitar-a-detecao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/chrome-e-firefox-lancam-patches-para-mais-de-35-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ivanti-lanca-patches-para-27-vulnerabilidades-nas-solucoes-avalanche-mdm</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/investigadores-interrompem-tentativa-de-aquisicao-credivel-em-projetos-de-software-open-source</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-patrocinados-pelo-estado-exploram-zero-day-em-firewalls</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ra-world-e-o-ataque-de-ransomware-mais-emergente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/juniper-networks-lanca-novas-correcoes-para-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/maioria-dos-dispositivos-infetados-com-malware-sao-empresariais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/furto-de-cookies-de-sessao-para-aplicacoes-saas-e-uma-ameaca-crescente-as-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/exploracao-das-vulnerabilidades-de-dispositivos-nas-da-d-link-continua-a-aumentar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falhas-de-execucao-de-codigo-em-produtos-adobe-leva-a-lancamento-de-atualizacoes-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-nova-variante-do-dinodasrat-para-linux-que-visa-organizacoes-mundiais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-critica-do-rust-permite-ataques-de-injecao-de-comando-no-windows</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-convincentes-e-dificeis-de-detetar-deepfakes-sao-uma-ameaca-crescente-a-seguranca-organizacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataque-leva-a-interrupcao-de-operacoes-comerciais-da-targus</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-lanca-avisos-para-mitigar-tecnicas-de-ataque-terrestre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/milhares-de-dispositivos-ivanti-vpn-afetados-por-vulnerabilidade-recente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/-71-dos-funcionarios-admitem-acoes-perigosas-que-colocam-em-risco-a-ciberseguranca-das-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dominio-pt-contabiliza-mais-de-um-milhao-de-contas-comprometidas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-alerta-sobre-vulnerabilidade-em-routers-descontinuados-para-pequenas-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-de-seguranca-no-plugin-wp-members-permite-injecao-de-script</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/quiosques-de-self-check-in-expunham-codigos-de-acesso-a-quartos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/aumentam-falhas-no-controlo-de-acesso-e-protecao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-lanca-alerta-de-codigo-malicioso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-em-comando-do-linux-leva-ao-roubo-de-senhas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-alerta-para-ataques-de-password-spraying-dirigidos-a-servicos-vpn</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/lancado-alerta-para-aumento-de-malware-evasivo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-kit-de-phishing-procura-ultrapassar-autenticacao-multifator</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/portugal-entre-os-dez-paises-europeus-mais-afetados-por-stalkerware-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-lanca-correcao-de-emergencia-para-o-windows-server</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detetadas-novas-ameacas-para-dispositivos-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-infostealer-azorult-lanca-falsos-google-docs-no-google-sites</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apt-ataca-dezenas-de-organizacoes-governamentais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/agencias-partilham-conselhos-para-proteger-sistemas-de-ataques-do-volt-typhoon</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ma-configuracao-do-firebase-leva-a-exfiltracao-de-mais-de-125-milhoes-de-registos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-corrige-vulnerabilidades-no-ios-rx</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/plugin-de-seguranca-descontinuado-expoe-sites-wordpress</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidades-em-plugins-do-chatgpt-podem-levar-a-exposicao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/adobe-corrige-vulnerabilidades-criticas-em-produtos-direcionados-para-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/50-do-malware-detetado-em-pme-e-utilizado-para-obter-dados-e-credenciais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/espionagem-chinesa-e-a-principal-preocupacao-com-veiculos-conectados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fakeupdates-e-o-malware-mais-comum-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/agencias-governamentais-francesas-alvo-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sap-corrige-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-permite-acesso-a-dispositivos-nas-da-qnap</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-corrige-vulnerabilidades-de-alta-severidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detetado-novo-trojan-bancario-no-brasil</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-malware-linux-visa-servidores-de-cloud-mal-configurados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/exploracao-de-vulnerabilidade-critica-comecou-assim-que-foi-revelada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sites-wordpress-invadidos-usam-navegadores-dos-utilizadores-para-atingir-outros-sites</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-corrige-vulnerabilidades-exploradas-com-atualizacao-do-ios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vmware-corrige-vulnerabilidades-criticas-em-varios-produtos-empresariais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-diz-que-utilizadores-de-ios-estao-em-risco-por-causa-de-regras-da-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/investigadores-descobrem-nova-infraestrutura-do-spyware-predator</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-exploracao-de-vulnerabilidade-no-microsoft-streaming-service</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/antigos-dominios-de-grandes-empresas-utilizados-para-enviar-emails-de-spam</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberespioes-focam-se-em-contas-adormecidas-para-atacar-infraestruturas-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-vulnerabilidade-em-plugin-popular-para-o-wordpress</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-apple-shortcuts-expoe-informacao-sensivel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/registado-aumento-de-detecoes-de-spyware-para-android-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/revelado-novo-trojan-bancario-com-taticas-avancadas-de-evasao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/aumento-do-ransomware-e-inovacoes-de-defesa-de-ia-relatorio-revela-ultimas-tendencias-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/explorada-falha-no-brick-builder-para-wordpress</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-para-android-foi-descarregado-150-mil-vezes-atraves-da-google-play</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-28-mil-servidores-exchange-vulneraveis-a-bug-ativamente-explorado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-confirma-exploracoes-do-windows-que-contornam-protecoes-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/adobe-alerta-para-falhas-criticas-em-software</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/observada-campanha-de-takeover-de-contas-de-azure-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/observada-exploracao-de-outra-vulnerabilidade-do-ivanti-vpn</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-exploracao-de-bug-do-roundcube-em-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-backdoor-para-macos-ligado-a-grupos-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-deepfake-de-face-swap-aumentaram-704-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/china-estara-a-pre-posicionar-se-para-lancar-ciberataques-contra-infraestruturas-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sistemas-linux-expostos-a-vulnerabilidade-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-atribui-mais-de-60-zero-day-a-fornecedores-comerciais-de-spyware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/roubados-dados-de-mais-de-dois-milhoes-de-pessoas-em-ataque-sql-injection</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/qnap-corrige-bugs-de-alta-gravidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-que-vulnerabilidade-em-varios-produtos-apple-esta-a-ser-explorada-em-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/45-mil-instancias-jenkins-expostas-estarao-afetadas-por-vulnerabilidade-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-ciberseguranca-lanca-novo-alerta-de-vulnerabilidade-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/revelado-novo-metodo-para-detecao-do-pegasus</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/aumentam-discussoes-sobre-utilizacao-de-chatgpt-no-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/splunk-enterprise-lanca-correcao-para-varias-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/reino-unido-alerta-para-aumento-do-impacto-do-ransomware-por-causa-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-lanca-diretiva-de-emergencia-para-mitigacao-de-vulnerabilidades-ativamente-exploradas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/banco-nacional-de-angola-alvo-de-ciberataque-na-primeira-semana-do-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-e-fbi-alerta-para-ataques-de-malware-androxgh0st</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-vulnerabilidade-em-funcionalidade-de-partilha-de-ficheiros-do-opera</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-alerta-sobre-exploracao-de-vulnerabilidade-zero-day-do-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-do-windows-smartscreen-explorada-para-entregar-o-malware-phemedrone</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-178-mil-firewalls-vulneraveis-a-dos-e-possiveis-ataques-rce</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/routers-em-fim-de-vida-sao-alvo-de-grupo-apoiado-pela-china</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-endereca-vulnerabilidade-que-afeta-magic-keyboard</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-lanca-alerta-para-duas-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-corrige-falha-de-seguranca-critica-do-unity-connection</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-vulnerabilidade-explorada-no-sharepoint-server</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-volta-a-ser-a-marca-mais-copiada-para-ataques-de-phishing-no-quarto-trimestre-de-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/20-dos-incidentes-ciberneticos-de-uma-empresa-sao-causados-por-colaboradores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupos-de-ransomware-ativam-encriptacao-remota-intencionalmente-nos-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nanocore-e-o-malware-mais-predominante-no-mes-de-dezembro-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/qnap-corrige-vulnerabilidades-de-alta-severidade-em-varios-produtos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-malware-para-macos-identificado-como-backdoor-norte-coreano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/surgiram-21-novas-familias-de-malware-para-macos-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/quase-11-milhoes-de-servidores-ssh-estao-vulneraveis-a-novos-ataques-terrapin</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-duas-vulnerabilidades-no-excel-e-no-google-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/conta-hackeada-leva-a-interrupcao-de-internet-na-orange-spain</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/subsidiaria-da-xerox-nos-eua-alvo-de-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-usa-endpoint-oauth-do-google-para-restaurar-cookies-de-autenticacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-vulnerabilidade-nos-iphones-associada-a-operacao-triangulacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/akira-knight-e-noescape-entre-os-principais-ataques-de-ransomware-emergentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fraudes-hibridas-deverao-aumentar-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-exploracao-de-novas-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/plataformas-de-e-commerce-utilizadas-em-ataques-de-skimming</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-para-android-consegue-ultrapassar-seguranca-biometrica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-nova-vulnerabilidade-zero-day-no-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/violacao-de-dados-em-empresa-de-telecomunicacoes-expoe-informacao-de-36-milhoes-de-pessoas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descobertas-novas-ameacas-multiplataforma</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/servico-de-hospedagem-do-wordpress-e-alvo-de-anuncios-de-phishing-do-google</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/governo-norte-americano-interrompe-operacao-do-grupo-blackcat</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/agencias-governamentais-lancam-alerta-sobre-tecnicas-de-grupo-de-ransomware-play</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/qbot-regressa-com-campanha-de-phishing-que-visa-a-industria-hoteleira</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/kraft-heinz-tera-sido-alvo-de-ataque-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/trojans-bancarios-e-ataques-a-pagamento-diretos-marcarao-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-cibergrupo-utiliza-sql-injection-para-roubar-dados-sensiveis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dell-urge-clientes-a-corrigirem-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apt-chinesa-volt-typhoon-associada-a-botnet-de-routers-antigos-para-transferir-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/setor-de-telecomunicacoes-e-a-industria-mais-atacada-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/o-panorama-da-ciberseguranca-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/setor-de-viagens-e-hotelaria-sofre-mil-ciberataques-por-semana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-nova-campanha-onde-ciberinteligencia-russa-ataca-entidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/wordpress-corrige-vulnerabilidade-que-permite-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/as-ciberameacas-que-as-organizacoes-vao-ter-de-enfrentar-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detetado-novo-ransomware-contra-dispositivos-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/previsoes-de-ciberseguranca-para-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-lanca-alerta-de-vulnerabilidade-que-pode-expor-informacao-sensivel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/investigadores-descobrem-exposicao-perigosa-de-dados-confidenciais-do-kubernetes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/developer-de-malware-diz-conseguir-restaurar-cookies-de-autenticacao-expiradas-do-google</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/citrix-alerta-para-exploracao-de-vulnerabilidade-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/projeto-tor-remove-relays-associados-a-esquemas-de-criptomoedas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-lanca-novas-orientacoes-de-ciberseguranca-para-organizacoes-de-saude-publica-e-saude-publica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-zimbra-explorada-para-corromper-emails-governamentais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/remcos-e-a-principal-ameaca-contra-organizacoes-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ator-de-ameacas-farnetwork-vinculado-a-cinco-grupos-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fbi-alerta-sobre-taticas-de-acesso-inicial-utilizadas-em-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberto-novo-malware-para-macos-atribuido-a-cibercriminosos-norte-coreanos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/botnet-mozi-desaparece-de-forma-repentina</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-norte-coreano-utiliza-malware-para-macos-em-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/negocio-de-distribuicao-da-boeing-e-alvo-de-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-corrige-vulnerabilidades-em-produtos-de-seguranca-de-rede</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-explora-software-legitimo-para-atacar-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/concentracao-na-cloud-e-um-risco-emergente-significativo-para-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/f5-alerta-para-vulnerabilidade-critica-de-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/firefox-e-chrome-corrigem-vulnerabilidades-de-alta-severidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-lanca-atualizacao-de-seguranca-para-macos-e-ios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/violacoes-de-dados-no-setor-da-saude-aumentam-mais-de-50</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-campanha-mundial-de-multi-malware-que-visa-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/clientes-em-148-paises-foram-afetados-por-violacao-de-dados-da-casio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-winrar-esta-a-ser-explorada-por-cibergrupos-apoiados-por-estados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/maioria-das-empresas-espera-um-ciberataque-iminente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanhas-de-malware-bancario-ganham-destaque-na-primeira-metade-do-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/investigadores-desenvolvem-sistema-de-detecao-de-ciberinvasoes-para-robos-militares-nao-tripulados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-e-fbi-urgem-atualizacao-imediata-do-atlassian-confluence-contra-vulnerabilidade-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/como-a-ia-e-utilizada-em-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-do-plugin-tagdiv-corrigida-foi-explorada-para-atacar-milhares-de-sites-wordpress</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-modificam-paginas-404-de-lojas-online-para-furto-de-cartoes-de-credito</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/formbook-torna-se-principal-malware-a-nivel-mundial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ransomware-rhysida-reivindica-ataques-a-governos-em-portugal-e-republica-dominicana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/phishing-e-das-principais-ameacas-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/as-principais-tendencias-dos-ataques-ddos-tsunami</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cerca-de-60-mil-e-mails-exfiltrados-em-alegada-operacao-cibercriminosa-chinesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/as-tendencias-das-ameacas-ao-iot-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/manuais-de-drone-utilizados-por-cibercriminosos-para-distribuir-malware-merlinagent</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-de-aplicacoes-da-web-e-api-contra-servicos-financeiros-aumentaram</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/59-dos-executivos-acreditam-que-a-ia-generativa-e-um-risco-de-seguranca-para-a-sua-organizacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/spyware-predator-distribuido-a-dispositivos-ios-e-android-atraves-de-vulnerabilidades-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/setor-industrial-regista-recorde-de-ataques-no-segundo-trimestre-de-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/parte-dos-ataques-de-bots-tem-origem-na-china-e-na-russia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibergrupo-utiliza-clones-da-aplicacao-do-youtube-para-afetar-dispositivos-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/metaverso-representa-riscos-de-privacidade-para-os-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/uso-indevido-de-credenciais-considerado-a-principal-causa-para-ataques-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberto-novo-ataque-de-ransomware-do-grupo-cuba</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-seguranca-alerta-para-vulnerabilidade-no-webp</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-ataques-que-utilizam-bugs-da-microsoft-e-da-adobe</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-alerta-para-campanha-de-phishing-que-usa-mensagens-do-teams</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mozilla-segue-apple-e-google-e-corrige-exploracao-de-zero-day-para-entrega-de-spyware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/qbot-e-novamente-lider-de-malware-no-mes-de-agosto-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-em-dispositivos-apple-pode-levar-a-infecao-por-spyware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberto-esquema-de-burlas-relacionado-com-lancamento-do-iphone-15</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/como-os-cibercriminosos-utilizam-codigos-qr-em-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-vulnerabilidade-critica-no-phpfusion-cms</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/extensoes-do-chrome-podem-roubar-palavras-passe-de-sites</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-lanca-novo-alerta-de-vulnerabilidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-modificam-malware-e-criam-multiplas-variantes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-em-plugin-de-migracao-do-wordpress-coloca-sites-em-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mozilla-e-google-lancam-atualizacoes-para-firefox-e-chrome-para-corrigir-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/agencia-de-ciberseguranca-do-reino-unido-alerta-sobre-potencial-falha-na-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/78-das-organizacoes-de-saude-alvo-de-ciberataques-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vmware-corrige-vulnerabilidade-em-produto-de-monitorizacao-de-rede</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberto-kit-malicioso-que-ajuda-cibercriminosos-com-menor-conhecimento-tecnico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-zero-day-no-winrar-explorada-desde-abril</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/milhares-de-servidores-openfire-com-vulnerabilidade-ativamente-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-phishing-compromete-contas-de-email-zimbra</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-winrar-permite-executar-programas-ao-abrir-arquivos-rar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberatacantes-utilizam-chats-com-ia-em-esquemas-de-criptomoedas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-ao-setor-industrial-visam-infraestruturas-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/qbot-continua-a-ser-a-principal-ameaca-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/as-ultimas-tendencias-das-ciberameacas-no-segundo-trimestre-de-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-olham-para-pme-como-oportunidade-lucrativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/canon-alerta-para-risco-de-comprometimento-via-wi-fi-para-impressoras-a-jato-de-tinta</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-da-acesso-quase-total-a-repositorios-de-codigo-google-artifact-registry</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ia-generativa-utilizada-para-fins-maliciosos-em-dispositivos-moveis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-lazarus-utiliza-servidores-microsoft-iis-para-espalhar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/maioria-dos-ciberataques-a-governos-e-infraestruturas-criticas-envolve-credenciais-validas-revela-cisa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-bug-que-impedia-gravacao-e-reproducao-de-videos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nato-investiga-alegado-roubo-de-dados-em-portal-de-cooperacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fraudgpt-e-a-nova-ferramenta-de-phishing-de-inteligencia-artificial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/black-basta-e-big-head-em-destaque-como-os-ataques-de-ransomware-mais-emergentes-em-junho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-foi-a-empresa-mais-utilizada-para-esquemas-de-phishing-no-segundo-trimestre-de-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sites-wordpress-atacados-atraves-de-plugin-woocommerce</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-20-vulnerabilidades-no-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/adobe-corrige-vulnerabilidades-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/plugin-presente-em-um-milhao-de-sites-wordpress-guardava-palavras-passe-em-texto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/relatorio-alerta-para-ataques-a-deputados-britanicos-com-origem-em-cibercriminosos-do-governo-chines-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/numero-de-ciberataques-semanais-aumenta-8-no-segundo-trimestre-de-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-faz-alteracoes-no-sistema-de-signing-key</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/zimbra-urge-correcao-manual-de-vulnerabilidade-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ciberespionagem-falsifica-dados-de-autenticacao-para-aceder-a-emails-governamentais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-alerta-para-vulneralidade-ativamente-explorada-no-windows-e-office</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-bard-e-mais-facilmente-utilizado-para-fins-maliciosos-do-que-chatgpt</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-lanca-atualizacao-urgente-para-sistemas-operativos-ios-e-ipados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-adiciona-falha-no-android-a-lista-de-vulnerabilidades-exploradas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibergrupo-ataca-think-tank-com-novo-malware-para-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mozilla-lanca-patches-para-vulnerabilidades-no-firefox</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/registados-novos-ataques-do-emotet-no-sul-da-europa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-vulnerabilidade-grave-em-dispositivos-cardiacos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-300-mil-ficheiros-sensiveis-de-criancas-publicados-online-em-ataque-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/maior-porto-japones-interrompe-operacoes-devido-a-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/investigacao-revela-operacao-apt-que-visa-entidades-governamentais-europeias</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dispositivos-moveis-sao-cada-vez-mais-os-alvos-preferidos-para-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibergrupo-pro-russia-usa-projeto-ddosia-contra-paises-ligados-a-guerra-da-ucrania</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-200-mil-sites-do-wordpress-expostos-por-falha-em-plugin</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/relatorio-revela-novas-tendencias-de-engenharia-social-baseada-em-browsers</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/maioria-dos-ataques-de-ransomware-dirigidos-as-pme</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-nova-familia-de-malware-utilizada-por-subgrupo-do-lazarus</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/siemens-energy-listada-entre-as-vitimas-do-ransomware-clop</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-novo-pacote-de-vulnerabilidades-exploradas-em-catalogo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/lockbit-incorpora-codigo-do-extinto-grupo-de-ransomware-conti</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/coreia-do-norte-utiliza-malware-com-recursos-de-escuta-de-microfones</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-nova-versao-de-spyware-que-rouba-backups-do-whatsapp</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/departamento-de-justica-dos-eua-cria-seccao-dedicada-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-campanha-apt-que-visa-ministerios-de-negocios-estrangeiros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-corrige-vulnerabilidades-de-zero-days-que-implantavam-spyware-em-iphones</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/esquemas-de-phishing-relacionados-com-ferias-crescem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-100-mil-contas-chatgpt-roubadas-a-venda-na-dark-web</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/asus-anuncia-atualizacoes-urgentes-para-vulnerabilidades-em-routers</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-backdoor-aumenta-ataques-de-ciberespionagem-no-norte-africano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/killnet-anuncia-alianca-de-cibercriminosos-para-atacar-sistema-financeiro-ocidental</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberatacantes-russos-usam-malware-espalhado-por-usb-para-atacar-ucrania</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/parceiros-internacionais-disponibilizam-conselhos-para-lidar-com-lockbit</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/uniza-kadavro-vector-e-maori-sao-os-mais-recentes-ataques-de-ransomware-destacados-pela-fortinet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/atualizacao-do-chrome-114-resolve-quatro-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/setor-das-comunicacoes-foi-o-mais-afetado-por-malware-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sharepoint-online-alvo-de-ataque-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cresce-onda-de-ataques-de-phishing-picture-in-picture</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-hacktivistas-que-atacou-microsoft-outlook-pode-ter-extraido-dados-de-30-milhoes-de-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-sao-uma-das-principais-ameacas-para-a-administracao-publica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-camufla-se-para-contornar-ciberdefesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/aplicacoes-espalharam-spyware-por-mais-de-400-milhoes-de-dispositivos-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataque-de-ransomware-a-seguradora-dentaria-expoe-dados-pessoais-de-9-milhoes-de-pessoas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/setor-da-saude-e-uma-das-areas-com-maior-numero-de-ciberataques-bem-sucedidos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/armazenamento-de-backup-e-o-alvo-em-mais-de-90-dos-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/organizacoes-alvo-de-operacao-de-ransomware-de-rapida-evolucao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/clientes-de-bancos-portugueses-na-mira-de-cibercriminosos-brasileiros-revela-relatorio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-distribuem-links-maliciosos-de-forma-oculta</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberameacas-entre-as-principais-preocupacoes-da-maioria-dos-gestores-portugueses</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-utilizam-squarespace-para-distribuir-conteudo-malicioso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/maioria-dos-antivirus-nao-conseguem-detetar-codigo-malicioso-desenvolvido-por-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/aplicacoes-de-edicao-de-fotografia-utilizadas-para-roubar-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-destaca-aumento-de-ciberataques-a-emails-empresariais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/chatgpt-aplicacoes-falsas-burlam-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/agente-de-ameaca-ignora-metodos-de-defesa-e-detecao-usados-no-azure</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/organizacoes-de-infraestruturas-criticas-alertadas-para-ransomware-bianlian</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-bloqueia-17-milhoes-de-aplicacoes-antes-de-chegarem-a-app-store</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/acesso-a-sistemas-de-ot-do-setor-energetico-disponiveis-em-foruns-de-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-alerta-para-vulnerabilidades-criticas-de-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-nos-servidores-papercut-esta-a-ser-ativamente-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/roubados-dados-de-quase-seis-milhoes-de-pacientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-vulnerabilidade-explorada-em-plugin-do-wordpress</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/as-principais-ameacas-para-as-organizacoes-em-abril-de-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-vulnerabilidades-no-outlook</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-nova-ferramenta-de-phishing-as-a-service</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-ciberseguranca-lanca-alerta-para-vulnerabilidades-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/adobe-corrige-14-vulnerabilidades-no-substance-3d-painter</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/western-digital-confirma-roubo-de-dados-de-clientes-em-ataque-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/linktree-usado-para-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-pode-destabilizar-rede-de-energia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fortinet-corrige-vulnerabilidades-de-alta-severidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/aumentam-sites-maliciosos-que-se-fazem-passar-pelo-chatgpt</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-adiciona-tres-vulnerabilidades-ao-catalogo-de-falhas-ativamente-exploradas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/identificadas-mais-de-17-mil-vulnerabilidades-apos-teste-a-milhares-de-ativos-digitais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/as-marcas-mais-usadas-em-campanhas-de-phishing-no-primeiro-trimestre-de-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-riscos-de-equipamentos-de-comunicacao-nas-organizacoes-de-infraestruturas-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/rapperbot-visa-dispositivos-iot-com-forca-bruta-inteligente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-em-protocolo-de-internet-pode-amplificar-ataques-dos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/configuracao-predefinida-no-apache-superset-apresenta-riscos-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vmware-lanca-correcao-para-vulnerabilidade-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-aproveitam-vulnerabilidade-zero-day-no-microsoft-windows-em-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/plugin-para-wordpress-utilizado-para-implementar-backdoor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/as-tendencias-emergentes-no-mobile-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-vulnerabilidade-zero-day-no-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/lockbit-desenvolve-malware-para-encriptar-ficheiros-em-dispositivos-apple</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-bug-no-android-utilizado-para-espiar-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/notificacoes-do-sharepoint-estao-a-ser-utilizadas-para-lancar-ataques-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-114-vulnerabilidades-na-patch-tuesday</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-de-phishing-com-criptomoedas-crescem-40-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/autoridade-norte-americana-preocupada-com-rede-movel-utilizada-por-funcionarios-de-seguranca-publica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/qbot-foi-o-malware-mais-comum-em-marco-em-portugal-e-a-nivel-mundial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/qnap-corrige-vulnerabilidades-que-afetam-varios-sistemas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-lanca-correcao-de-emergencia-para-ios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/check-point-revela-o-ransomware-mais-rapido-de-sempre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/riscos-de-ciberseguranca-serao-fator-a-ter-em-conta-para-os-diretores-de-supply-chain</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/openai-revela-violacao-de-dados-de-utilizadores-do-chatgpt</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/setor-de-energia-nuclear-chines-vitima-de-campanha-de-ciberespionagem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-corrige-vulnerabilidade-explorada-em-modelos-antigos-do-iphone</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/autoridades-britanicas-criam-sites-falsos-de-ddos-for-hire-para-apanhar-cibercriminosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/camara-de-odemira-confirma-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descobertos-pacotes-maliciosos-no-repositorio-oficial-do-python</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-atualizacao-do-chrome-111-traz-patches-para-oito-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-volta-a-registar-envio-elevado-de-emails-com-emotet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-e-principal-ameaca-do-setor-dos-transportes-europeu</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ransomware-alega-publicacao-de-dados-de-companhia-de-logistica-maritima</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descobertos-pacotes-maliciosos-nuget-que-visam-developers-net</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/check-point-alerta-para-potenciais-cenarios-da-utilizacao-do-chatgpt-4-para-acelerar-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ciberespionagem-russo-visa-sistemas-de-troca-de-informacoes-entre-paises-da-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-malware-de-vishing-finge-ser-instituicao-financeira</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-utilizam-google-ads-para-distribuir-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-cibercriminoso-visa-investigadores-de-seguranca-com-falsas-propostas-de-emprego</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/lockbit-reivindica-roubo-de-dados-da-spacex-em-ataque-a-cadeia-de-valor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/lancada-prova-de-conceito-para-explorar-bug-no-microsoft-word</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/android-atualizacao-de-marco-corrige-mais-de-50-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/exfiltrados-dados-de-funcionarios-de-cidade-norte-americana-apos-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-no-tpm-20-permite-roubo-de-chaves-criptograficas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-adiciona-vulnerabilidade-de-alta-gravidade-ao-catalogo-de-known-exploited-vulnerabilities</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/propagacao-de-malware-wiper-aumentou-50-no-segundo-semestre-de-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detecao-de-ameacas-android-cresce-32-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/acesso-a-computador-pessoal-de-funcionario-na-origem-de-ciberataques-a-lastpass</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/os-pontos-criticos-e-recomendacoes-de-seguranca-de-iot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/numero-de-ataques-ddos-cresce-150-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-imitam-branding-do-chatgpt-para-distribuir-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-lanca-patches-para-vulnerabilidades-na-application-centric-infraestructure</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-lanca-alerta-para-duas-novas-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vmware-corrige-vulnerabilidade-critica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fortinet-corrige-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/solarwinds-vai-corrigir-vulnerabilidades-de-alto-impacto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-esxiargs-infeta-centenas-de-novos-alvos-na-europa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-lanca-alerta-de-vulnerabilidade-para-dispositivos-apple</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/citrix-corrige-vulnerabilidades-no-virtual-apps-and-desktops</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-recentemente-corrigida-estara-a-ser-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-cibercriminoso-da-coreia-do-norte-utiliza-malware-evasivo-para-roubar-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-tres-vulnerabilidades-zero-day-ativamente-exploradas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/america-do-norte-e-europa-sao-os-principais-alvos-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-onenote-utilizado-para-disseminar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-corrigida-despoleta-campanha-de-ransomware-que-afeta-servidores-vmware-esxi</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detetado-servico-que-inclui-varios-tipos-de-malware-a-funcionar-ha-seis-anos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/esquemas-cryptorom-recorrem-a-aplicacoes-falsas-na-app-store-da-apple-para-fraudes-com-criptmoedas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ferramentas-como-chatgpt-podem-provocar-aumento-da-automacao-das-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sites-de-aeroportos-alemaes-e-da-administracao-publica-alvos-de-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/utilizacao-maliciosa-do-chatgpt-alerta-para-prompt-engineering</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-manageengine-da-zoho-pode-resultar-em-ataques-spray-and-pray</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataque-afeta-35-mil-contas-de-utilizadores-do-paypal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/patch-tuesday-evidencia-quantidade-preocupante-e-invulgar-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-tentam-ultrapassar-restricoes-do-openai-para-utilizar-chatgpt-na-realizacao-de-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/um-milhao-de-contas-norton-lifelock-comprometidas-em-ataques-de-credential-stuffing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centenas-de-motherboards-msi-comprometidas-devido-a-reconfiguracao-do-secure-boot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-pro-russia-lancam-ataques-ddos-contra-ucrania-e-paises-da-nato</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-explora-control-web-panel-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-contornam-protecoes-atraves-de-vulnerabilidade-em-driver-do-windows</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataque-informatico-expoe-nomes-de-14-mil-trabalhadores-da-seguranca-social</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dados-roubados-da-volvo-cars-apos-alegado-ataque-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/jogos-streaming-e-plataformas-educacionais-vao-ser-fonte-de-receitas-para-cibercriminosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-200-organizacoes-publicas-dos-eua-alvo-de-ataques-de-ransomware-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-cibercriminoso-lanca-campanha-de-malware-contra-utilizadores-de-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/governo-frances-reforca-programas-de-ciberseguranca-junto-dos-hospitais-apos-serie-de-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/porto-de-lisboa-alvo-de-ataque-informatico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-vulnerabilidade-gatekeeper-bypass-no-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/custo-de-violacao-de-dados-devera-atingir-cinco-milhoes-de-dolares-em-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-tambem-se-enganam-uns-aos-outros-revela-investigacao-da-sophos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/formatos-de-arquivo-sao-agora-os-ficheiros-maliciosos-mais-comuns-revela-relatorio-da-hp</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/operacao-internacional-desmantela-50-servicos-populares-de-ddos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/educacao-foi-o-setor-mais-ameacado-em-portugal-em-novembro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-iranianos-distribuem-ferramenta-de-acesso-remoto-msp-atraves-de-contas-de-email</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberameacas-contra-macos-crescem-15-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-lanca-patch-para-vulnerabilidade-zero-day-severa-no-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detetado-malware-para-destruir-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/complexo-hospitalar-frances-obrigado-a-reorganizar-servicos-devido-a-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-alerta-para-ciberataques-russos-alem-ucrania-este-inverno</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/tiktok-levanta-duvidas-de-seguranca-junto-do-fbi</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-cuba-afeta-mais-de-uma-centena-de-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/funcionarios-publicos-albaneses-investigados-por-negligencia-em-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/publicados-dados-de-saude-de-australianos-na-sequencia-de-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/automatizacao-na-industria-automovel-abre-portas-a-cibercriminosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/possiveis-ciberataques-a-portos-maritimos-preocupam-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/34-grupos-de-cibercriminosos-russos-roubaram-mais-de-50-milhoes-de-palavras-passe-este-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidades-em-servidor-descontinuado-desde-2005-despoletam-ataques-a-servicos-criticos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-de-ransomware-analisados-pelo-gabinete-de-crise-do-reino-unido</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/estudo-da-sophos-revela-que-ransomware-continua-a-ser-uma-das-maiores-ameacas-as-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/agencias-dos-eua-alertam-para-ransomware-que-atingiu-mais-de-1300-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/seguranca-social-alvo-de-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-baseados-na-china-lancam-ataque-a-autoridade-de-certificacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/australia-quer-tornar-pagamentos-ilegais-em-caso-de-ataques-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/downloaders-maliciosos-com-elevada-incidencia-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataque-ransomware-a-conforama-visa-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-cibercriminosos-podera-ter-roubado-30-milhoes-de-dolares-de-bancos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-campanha-que-carrega-spyware-em-dispositivos-android-atraves-das-redes-sociais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataque-de-phishing-a-dropbox-da-acesso-a-dados-de-colaboradores-e-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/plataforma-utilizada-pelo-exercito-australiano-alvo-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-baseados-em-identidades-sao-cada-vez-mais-uma-realidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/profissionais-que-respondem-a-incidentes-de-seguranca-com-forte-sentido-de-dever-de-protecao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/it-security-conference-e-preciso-normalizar-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/os-riscos-de-seguranca-do-metaverso-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/emotet-esta-mais-sofisticado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/china-esta-a-recorrer-a-moedas-digitais-para-reforcar-influencia-mundial-alerta-reino-unido</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/numero-de-ciberataques-a-estabelecimentos-de-saude-batem-recordes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberto-novo-metodo-de-implementacao-de-backdoors-esxi-persistentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-aproveitam-morte-da-rainha-isabel-ii-para-roubar-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descobertas-duas-vulnerabilidades-de-remote-code-execution-no-whatsapp</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/forcas-armadas-alvo-de-novo-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-seo-poisoning-leva-colaboradores-a-descarregar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sistemas-de-controlo-industriais-na-mira-de-hacktivistas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ransomware-publica-dados-pessoais-de-115-mil-clientes-da-tap</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/wordpress-corrige-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-vendem-acesso-a-camaras-de-vigilancia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-ciberseguranca-lanca-novo-alerta-de-vulnerabilidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-em-aplicacoes-android-cresce-em-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-lanca-correcoes-para-ios-e-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/candidatos-a-vagas-em-it-sao-o-novo-alvo-de-cibergrupo-da-coreia-do-norte</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/setor-industrial-espera-aumento-de-ciberataques-a-fabricas-inteligentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/emotet-ja-impacta-quase-um-terco-das-organizacoes-nacionais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/encontrados-pacotes-de-info-stealing-em-repositorio-de-programacao-python</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberataques-a-dispositivos-moveis-continuam-a-aumentar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberto-malware-que-espia-e-rouba-utilizadores-de-mac</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-retira-aplicacoes-com-spyware-da-play-store</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-em-plugin-para-wordpress-cada-vez-mais-utilizado-para-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-emergente-ligado-a-coreia-do-norte</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/falha-log4j-considerada-problema-endemico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-phishing-ultrapassa-autenticacao-multifator</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-ciberseguranca-alerta-para-vulnerabilidade-no-openssl</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-corrige-84-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/quase-um-terco-das-empresas-portuguesas-foram-impactadas-pelo-emotet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-lanca-alerta-de-ameaca-por-causa-de-emotet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/lideres-do-fbi-e-do-mi5-emitem-alerta-sobre-espionagem-da-china</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/empresas-devem-tomar-medidas-mais-drasticas--para-remediar-falhas-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-faz-novos-alertas-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberameacas-atraves-de-email-crescem-37</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-10-das-empresas-portuguesas-foram-impactadas-pelo-emotet-em-maio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-ciberseguranca-lanca-novo-alerta-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-coloca-mais-de-10-dos-smartphones-em-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-podem-pre-sequestrar-contas-antes-de-serem-criadas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-380-mil-instancias-de-api-kubernetes-expostas-na-internet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/pacote-de-malware-as-a-service-difunde-se-no-telegram</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/iphones-podem-estar-vulneraveis-a-ataques-mesmo-desligados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-lanca-patches-para-vulnerabilidades-no-big-sur-e-catalina</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/emotet-impacta-9-das-empresas-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/qnap-corrige-vulnerabilidades-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberatacantes-utilizam-nova-tecnica-para-implementar-malware-fileless</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/bug-coloca-routers-e-dispositivos-iot-em-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/log4shell-milhares-de-aplicacoes-java-continuam-vulneraveis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vitimas-do-emotet-em-portugal-aumenta-155</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/agencias-internacionais-de-ciberseguranca-lancam-alerta-para-capacidades-de-grupos-russos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/as-marcas-mais-imitadas-em-ataques-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-bug-ativamente-explorado-no-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/trojan-bancario-propaga-se-atraves-de-aplicacoes-de-antivirus</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-ciberseguranca-lanca-tres-alertas-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-lanca-correcoes-para-vulnerabilidades-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-ataques-contra-ups-conectados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/conflito-russia-ucrania-leva-a-aumento-dos-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-alerta-para-vulnerabilidade-no-redis</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/reino-unido-segue-estados-unidos-e-lanca-alerta-para-ciberataques-russos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/agencias-norte-americanas-deixam-alerta-para-ciberataques-a-rede-de-satelites</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-e-fbi-alertam-para-ciberataques-russos-que-exploram-protocolos-mfa-e-printnightmare</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grande-parte-dos-nas-da-qnap-afetados-por-vulnerabilidade-de-aumento-de-privilegios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-deixa-alerta-de-ameaca-para-dispositivos-da-watchguard</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-alerta-para-vulnerabilidade-de-spoofing-no-defender-for-endpoint</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sap-corrige-falhas-criticas-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/quase-30-dos-bugs-criticos-de-plugins-para-wordpress-nao-sao-corrigidos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/emotet-foi-a-principal-ameaca-contra-as-organizacoes-portuguesas-em-fevereiro-de-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/bug-zero-day-no-firefox-permite-execucao-remota-de-codigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-phishing-tem-como-alvo-quem-ajuda-refugiados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-ciberseguranca-alerta-para-nova-vulnerabilidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/o-kremlin-soltou-os-wazawaka</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/trickbot-infetou-mais-de-140-mil-maquinas-desde-novembro-de-2020</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/continua-exploracao-do-log4shell</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cncs-alerta-para-vulnerabilidades-no-adobe-commerce-e-magento-open-source</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/eset-deteta-mais-de-cem-mil-ciberameacas-em-portugal-nos-ultimos-quatro-meses-de-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberameacas-contra-email-aumentam-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-vulnerabilidade-extremamente-grave-em-distribuicoes-linux</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/windows-update-utilizado-por-grupo-apt-para-espalhar-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ultrapassada-dupla-autenticacao-em-roubo-de-criptomoedas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dridex-qbot-e-agenttesla-foram-as-principais-ameacas-as-organizacoes-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-dois-tercos-dos-downloads-de-malware-provem-de-aplicacoes-na-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-macos-pode-levar-a-violacao-de-dados-dos-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-grupo-criminoso-fica-indetetavel-nos-sistemas-durante-meses</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/milhoes-de-routers-expostos-a-falha-rce</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-malware-recorre-a-verificacao-de-assinatura-digital-para-roubar-informacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-azure-pode-expor-palavras-passe-e-tokens-de-acesso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/plugin-no-wordpress-coloca-tres-milhoes-de-sites-em-alerta</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-variante-do-phorpiex-ja-roubou-meio-milhao-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-ddos-sao-cada-vez-mais-inteligentes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/log4j-novo-vetor-de-ataque-ameaca-local-hosts</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apache-log4j-ja-esta-a-fazer-vitimas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apache-log4j-perto-de-metade-das-redes-corporativas-em-portugal-sofreram-uma-tentativa-de-ataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-critica-no-apache-log4j-esta-a-ser-ativamente-explorada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-encerra-atividade-de-botnet-glupteba</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/quase-metade-dos-utilizadores-foram-atacados-por-malware-de-roubo-de-passwords</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ikea-vitima-de-ataque-de-phishing-de-email-em-cadeia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ausencia-de-detalhe-do-ataque-a-panasonic-levanta-duvidas-de-investigadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/atividade-de-novo-malware-linux-esconde-se-no-dia-31-de-fevereiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mas-configuracoes-na-cloud-exploradas-em-minutos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/agencias-norte-americanas-alertam-para-potenciais-ataques-a-infraestruturas-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-zero-day-no-windows-installer-esta-a-ser-ativamente-explorado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-em-chips-mediatek-permitiriam-escutas-a-smartphones</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberto-novo-ransomware-memento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/brecha-no-godaddy-coloca-em-risco-12-milhoes-de-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sites-maliciosos-aumentam-com-a-aproximacao-da-black-friday</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-exploracao-de-falhas-do-exchange-e-da-fortinet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/emotet-volta-ao-ativo-quase-um-ano-depois</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-esta-a-encriptar-dados-sem-pedir-resgate-ou-a-entregar-chaves-de-desencriptacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-absorve-outras-ciberameacas-para-criar-sistema-de-distribuicao-interconectado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/trickbot-afetou-9-das-organizacoes-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/trojan-bancario-detetado-em-mais-de-cem-ataques-a-peninsula-iberica-e-america-latina</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/serie-e-utilizada-como-isco-para-propagar-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/as-tecnicas-mais-utilizadas-para-pressionar-o-pagamento-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/anuncios-do-google-usados-para-roubar-criptomoedas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/franca-e-israel-discutem-ataques-do-spyware-pegasus</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/dados-de-cidadaos-argentinos-roubados-em-ataque-a-base-de-dados-governamental-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/twitter-suspende-contas-fruto-de-campanha-de-espionagem-norte-coreana-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/identificada-vulnerabilidade-critica-no-maior-marketplace-de-nft</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-azure-vitima-de-ataque-ddos-recorde-de-24-tbps</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/um-terco-dos-utilizadores-nao-se-preocupa-com-seguranca-dos-codigos-qr</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/larga-maioria-do-malware-disseminado-atraves-de-ligacoes-encriptadas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-distribuido-atraves-da-maior-plataforma-de-pagamentos-instantaneos-do-brasil</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/spyware-finfisher-incorpora-quatro-niveis-de-ofuscacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/atualizacao-corrige-vulnerabilidade-zero-day-ativamente-explorada-no-chrome</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/bug-revela-cem-mil-credenciais-de-acesso-do-microsoft-exchange-e-outlook</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/paises-de-lingua-portuguesa-e-espanhola-alvos-de-trojan-bancario-numando</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/sete-custos-de-ransomware-para-alem-do-resgate</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-descobre-nova-operacao-de-phishing-as-a-service</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-lanca-correcao-de-emergencia-para-falha-zero-day</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fortinet-confirma-publicacao-de-credenciais-de-acesso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-ddos-diminuem-no-segundo-trimestre-de-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-alerta-para-ataques-direcionados-que-exploram-vulnerabilidades-no-mshtml</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/bug-coloca-milhares-de-milhoes-de-dispositivos-que-dependem-de-bluetooth-em-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-whatsapp-pode-levar-ao-roubo-de-informacao-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-de-phishing-cresceram-70-na-pandemia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-cibercriminoso-ragnarok-publica-chave-para-desencriptar-ficheiros-das-vitimas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisco-lanca-correcoes-criticas-para-serie-9000</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-alerta-clientes-para-exposicao-das-suas-bases-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cisa-alerta-para-ataques-que-exploram-vulnerabilidades-proxyshell</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/a-principal-ameaca-para-computadores-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/maioria-dos-dispositivos-conectados-em-casa-tem-falhas-de-seguranca-muito-graves-ou-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ma-configuracao-expoe-informacoes-de-quase-40-milhoes-de-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/hackers-exploram-printnightmare-para-implementar-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/mais-de-tres-mil-organizacoes-de-educacao-em-portugal-sao-atacadas-todas-as-semanas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/rede-do-tesouro-nacional-do-brasil-alvo-de-ataque-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/documentos-office-continuam-a-representar-43-das-descargas-de-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/grupo-de-ransomware-extorque-organizacoes-sob-ameaca-de-expor-ilegalidades-dos-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/varias-vulnerabilidades-no-firmware-expoem-camaras-ip-a-ataques-remotos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/whatsapp-e-a-aplicacao-com-maior-numero-de-ataques-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/china-ataca-routers-domesticos-e-empresariais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/proliferacao-de-ataques-ransomware-e-a-principal-ameaca-as-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-cadeia-de-malware-que-afeta-principalmente-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/spyware-pegasus-telemoveis-de-jornalistas-e-ativistas-alvos-de-campanha-de-espionagem-em-massa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-joker-inunda-aplicacoes-para-dispositivos-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-resolve-116-bugs</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/as-principais-ciberameacas-de-junho</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-lanca-patch-de-emergencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/atacantes-da-kaseya-exigem-resgate-de-70-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/g7-classifica-ransomware-como-a-ameaca-mais-grave-em-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/maioria-das-ameacas-escapam-as-solucoes-tradicionais-de-antimalware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/hackers-acumulam-milhoes-com-versoes-falsas-de-videojogos-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/organizacoes-portuguesas-atacadas-mais-de-mil-vezes-por-semana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-descobre-novo-ataque-em-investigacao-a-hackers-da-solarwinds</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-leva-western-digital-a-aconselhar-desligar-dispositivos-da-internet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vmware-corrige-falha-critica-no-carbon-black</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ameacas-ransomware-aumentam-70-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-campanha-de-cibercrime-ameaca-ministerios-dos-negocios-estrangeiros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/trickbot-foi-a-principal-ameaca-as-organizacoes-portuguesas-em-maio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descobertas-quatro-vulnerabilidades-no-microsoft-office</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/estudo-reporta-aumento-de-abusos-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/identificada-nova-arma-de-ciberespionagem-utilizada-para-espiar-governos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-lanca-novas-atualizacoes-e-resolve-bug-zero-day-do-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/pandemia-aumentou-preocupacao-com-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/quase-tres-milhoes-de-ataques-ddos-no-primeiro-trimestre-de-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vmware-corrige-vulnerabilidade-critica-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/apple-preocupada-com-aumento-de-malware-em-mac</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/novo-malware-bancario-ja-afetou-sete-bancos-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/os-habitos-para-as-empresas-diminuirem-o-risco-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-de-ransomware-direcionados-aumentam-mais-de-700</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-nova-vulnerabilidade-em-chips-da-qualcomm-que-coloca-smartphones-em-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberameacas-financeiras-mudaram-em-2020</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/airdrop-da-apple-pode-revelar-numeros-de-telemovel-e-enderecos-de-email</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberto-exploit-zero-day-no-desktop-window-manager</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-e-a-marca-mais-imitada-para-ataques-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/trojan-bancario-icedid-afetou-6-das-empresas-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/maioria-das-empresas-mundiais-sofreu-um-ataque-de-malware-movel-em-2020</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-de-malware-fileless-aumentam-900</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/campanha-de-espionagem-cibernetica-procura-roubar-dados-secretos-5g</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nimzaloader-o-malware-escrito-numa-linguagem-de-programacao-incomum</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-torna-publicos-dados-empresariais-atraves-de-tecnica-de-dupla-extorsao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/qbot-entre-as-principais-ciberameacas-as-organizacoes-portuguesas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-dropbox-e-microsoft-sao-as-marcas-utilizadas-no-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/quase-metade-das-organizacoes-ja-teve-um-colaborador-a-descarregar-aplicacoes-maliciosas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-infeta-30-mil-macs</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-foca-se-nos-novos-processadores-da-apple</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/investigador-de-ciberseguranca-descobre-vulnerabilidade-que-permite-correr-codigo-indesejado-em-servidores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/solarwinds-resolve-tres-novas-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ameacas-internas-sao-maiores-do-que-ameacas-externas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/utilizadores-de-aplicacoes-financeiras-nao-sabe-se-os-seus-dados-sao-vendidos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-revela-fraqueza-escondida-nas-grandes-tecnologicas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/as-principais-ciberameacas-em-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/microsoft-encontra-software-malicioso-nos-seus-sistemas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/as-ameacas-financeiras-que-vao-impactar-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/relatorio-mostra-impacto-real-da-covid-19-nas-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/encriptacao-de-ponta-a-ponta-esta-a-ameacar-a-seguranca-das-criancas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/empresas-que-sofrem-um-ciberataque-tem-uma-grande-probabilidade-de-voltarem-a-ser-atacadas-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-nova-campanha-de-espionagem-cibernetica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-nunca-antes-visto-ameaca-utilizadores-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-variante-pode-ser-a-proxima-grande-ameaca-de-malware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-evoluiu-da-encriptacao-dos-dados-para-publicacao-de-informacao-confidencial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ciberguerra-e-uma-preocupacao-para-as-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-financeiro-para-android-disponivel-gratuitamente-em-foruns</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/exploit-do-windows-permite-tornar-se-administrador-instantaneamente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/hackers-continuam-a-espiar-pme</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/fbi-alerta-empresas-sobre-aumento-de-esquemas-de-phishing-por-chamadas-de-voz</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/perto-de-um-terco-dos-ataques-bem-sucedidos-usam-ferramentas-legitimas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-corrige-bug-de-seguranca-que-impactou-gmail-e-g-suite</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descobertas-vulnerabilidades-em-subdominios-alexa-da-amazon</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-vulnerabilidade-critica-em-ambientes-microsoft</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-lancam-campanhas-com-malware-em-documentos-que-simulam-cv</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-de-forca-bruta-aumentaram-nos-ultimos-tres-meses</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-ve-ressurgimento-de-hacking-e-phishing-apoiados-por-estados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberta-vulnerabilidade-em-api-oficial-da-microsoft</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/covid-19-hackers-utilizam-oms-e-onu-para-campanhas-de-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/vulnerabilidade-no-teams-possibilitava-roubo-de-contas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/google-bloqueia-milhoes-de-emails-de-scam-relacionado-com-covid-19</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/hackers-procuram-vpn-vulneraveis-para-lancar-ataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/covid-19-utilizado-como-chamariz-para-infetar-smartphones</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/aumento-das-compras-online-faz-crescer-armadilhas-de-hackers</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descobertas-aplicacoes-fleeceware-com-iphone-como-alvo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/cibercriminosos-focam-se-em-dominios-zoom</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/trojan-bancario-aproveita-covid-19-para-roubar-dinheiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-evasivo-com-forte-crescimento-nos-ultimos-tres-meses-de-2019</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/centro-nacional-de-ciberseguranca-alerta-para-campanhas-associadas-ao-covid-19-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/revelado-ataque-de-spam-a-proposito-do-coronavirus</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/trojan-utiliza-servico-vpn-para-roubar-dados-pessoais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/as-duas-ameacas-moveis-com-maior-crescimento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/nova-campanha-de-phishing-tem-250-apps-android-como-alvo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/emotet-hackeia-redes-wi-fi-para-infetar-dispositivos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/hackers-exploram-novo-esquema-de-fraude-para-enganar-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-conta-com-funcionalidade-de-roubo-de-passwords-de-email</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ataques-dirigidos-a-nacoes-e-aos-dispositivos-moveis-entre-as-principais-ameacas-de-2020</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberto-malware-para-mac-que-utiliza-tecnicas-fileless</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/oito-milhoes-afetados-por-campanha-de-adware-para-android</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberto-novo-trojan-bancario-para-roubar-criptomoedas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/crescem-ataques-de-phishing-a-utilizadores-de-macos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/echobot-lanca-ataque-disseminado-contra-dispositivos-iot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/ransomware-duplicou-durante-este-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/detetada-vulnerabilidade-no-sqlite</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/irao-pode-ter-atacado-utilizadores-do-linkedin</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/bluetooth-pode-deixar-a-descoberto-dados-de-utilizadores-ios-e-microsoft</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/descoberto-malware-em-aplicacoes-disponiveis-no-google-play</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/atacar-cloud-honeypots-pode-demorar-menos-de-um-minuto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/coinhive-continua-a-liderar-lista-de-malware-mais-utilizado-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-no-google-play-duplica-em-2018</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/check-point-lanca-enciclopedia-de-malware-para-mac</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/os-principais-malware-do-mes-de-fevereiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/threats/malware-clipper-encontrado-no-google-play</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/nis2-licenca-para-atuar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/aberta-consulta-publica-do-regulamento-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/autoridades-alertam-para-uso-indevido-de-ia-em-imagens</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/maioria-das-empresas-portuguesas-preve-cumprir-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/governo-regulamenta-direito-ao-esquecimento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/data-act-sob-pressao-operacional-num-contexto-regulatorio-em-mudanca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/novo-guia-estabelece-principios-para-uso-seguro-de-ia-em-sistemas-industriais-e-ot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/nis2-publicada-em-diario-da-republica-entra-em-vigor-no-segundo-trimestre-de-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/alemanha-endurece-controlo-sobre-tecnologia-it-chinesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/governo-autorizado-a-transpor-diretiva-europeia-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/transposicao-da-nis2-aprovada-na-assembleia-da-republica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/decreto-lei-de-entidades-criticas-da-obrigacao-legal-a-vantagem-competitiva</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/conselho-de-ministros-aprova-novo-regime-de-ciberseguranca-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/lideres-de-compliance-devem-ter-comunicacao-consistente-para-gerir-risco-de-terceiros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/entre-normas-e-exigencias-como-navegar-na-ciberseguranca-da-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/incerteza-politica-ameaca-transposicao-da-nis2-e-pode-expor-portugal-a-coimas-da-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/iso-27002-a-norma-que-sela-a-confianca-empresarial-na-era-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/conselho-de-ministros-aprova-proposta-de-lei-para-transpor-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/paypal-paga-dois-milhoes-de-dolares-apos-violacao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/apple-nega-ter-espiado-utilizadores-e-esclarece-politica-de-privacidade-da-siri</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/apple-resolve-processo-que-acusa-siri-de-espiar-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/onu-aprova-tratado-do-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/netflix-multada-em-475-milhoes-de-euros-por-falhas-na-politica-de-privacidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/cyber-solidarity-act-um-marco-na-estrategia-europeia-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/nis2-esta-em-consulta-publica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/cyber-resilience-act-publicado-no-jornal-oficial-da-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/diretora-da-cisa-deixa-cargo-em-janeiro-de-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/google-introduz-funcionalidade-para-combater-spam-e-proteger-privacidade-dos-utilizadores</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/funcoes-de-legal-risco-e-compliance-vao-duplicar-gastos-com-tecnologia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/apple-corrige-mais-de-70-vulnerabilidades-presente-nas-suas-plataformas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/linkedin-recebe-multa-por-violacao-de-privacidade-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/47-das-empresas-portuguesas-nao-tem-conhecimento-sobre-a-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/lideres-de-gestao-de-risco-enfrentam-desafios-com-falta-de-transparencia-de-ferramentas-grc</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/ciiwa-apresenta-formacao-para-decisores-e-lideres-em-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/meta-recebe-multa-devido-a-armazenamento-indevido-de-palavras-passe</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/apresentada-queixa-contra-a-mozilla-por-nova-funcionalidade-de-seguimento-de-anuncios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/multas-por-privacidade-de-dados-totalizam-66-mil-milhoes-de-euros-desde-2020</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/ciiwa-abre-inscricoes-para-curso-sobre-nis2-e-dora</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/uniao-europeia-investiga-modelo-de-ia-da-google-por-possiveis-violacoes-de-privacidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/microsoft-organiza-conferencia-com-empresas-de-seguranca-endpoint</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/estados-unidos-lancam-guia-de-boas-praticas-para-event-logging-e-threat-detection</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/commvault-integra-parceiros-no-seu-ecossistema-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/preparacao-dos-ciso-para-a-lei-de-resiliencia-operacional-digital-da-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/eua-alerta-sobre-ameaca-dos-direitos-humanos-no-tratado-do-cibercrime-da-onu</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/meta-paga-mais-de-mil-milhoes-de-dolares-para-resolver-processo-de-privacidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/parte-da-informacao-colocada-em-aplicacoes-de-ia-generativa-sao-dados-regulados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/proprietaria-da-google-em-negociacoes-para-comprar-startup-de-ciberseguranca-por-23-mil-milhoes-de-dolares</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/visionware-celebra-parceria-com-universidade-de-santiago-em-cabo-verde</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/lideres-de-compliance-querem-aumentar-impacto-na-estrategia-da-organizacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/regulador-brasileiro-bane-meta-de-utilizar-dados-para-treinar-modelos-de-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/nis2-representa-um-passo-significativo-para-a-melhoria-do-ecossistema-de-ciberseguranca-da-ue-diz-a-enisa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/regras-de-ciberseguranca-nos-servicos-cloud-da-ue-nao-devem-discriminar-grandes-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/na-mira-da-nis2-a-nova-era-da-ciberseguranca-europeia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/cfo-devem-abordar-a-ciberseguranca-como-uma-decisao-empresarial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/lei-do-cibercrime-no-compasso-das-ameacas-digitais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/google-prepara-se-para-destruir-milhoes-de-dados-recolhidos-em-navegacao-anonima</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/parlamento-europeu-aprova-lei-sobre-inteligencia-artificial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/google-paga-350-milhoes-apos-data-leak</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/cyber-resilience-act-da-cooperacao-europeia-ao-risco-de-exposicao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/industria-alerta-reino-unido-por-causa-de-lei-de-seguranca-controversa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/franca-multa-yahoo-em-10-milhoes-de-euros-por-abuso-de-cookies</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/empresas-tecnologicas-podem-fazer-muito-mais-para-proteger-utilizadores-contra-fraudes-online</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/microsoft-permite-armazenamento-de-dados-pessoais-na-uniao-europeia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/as-tendencias-de-gestao-de-dados-em-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/porsche-suspende-vendas-do-suv-macan-na-europa-devido-a-regulamentacoes-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/gastos-mundiais-com-soberania-da-cloud-deverao-ultrapassar-os-258-mil-milhoes-de-dolares-em-2027</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/adocao-rapida-da-genai-e-o-principal-problema-dos-lideres-juridicos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/uniao-europeia-chega-a-acordo-sobre-lei-da-inteligencia-artificial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/ai-act-alinhar-a-inovacao-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/s21sec-alerta-para-implicacoes-do-nis-2-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/web-summit-ma-regulacao-pode-provocar-danos-nas-fundacoes-da-internet</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/regulamentacao-mais-rigida-sobre-a-soberania-de-dados-e-desafio-para-lideres-portugueses</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/cibercrime-e-direitos-humanos-os-perigos-do-tratado-da-onu</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/investimento-do-departamento-juridico-e-compliance-em-ferramentas-grc-aumentara-50-ate-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/nis-2-sera-desafio-substancial-para-infraestruturas-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/30-das-multinacionais-serao-afetadas-pelo-risco-soberano-digital-nao-gerido-ate-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/multas-por-ma-gestao-de-dados-podem-ultrapassar-mil-milhoes-de-dolares-ate-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/setor-do-it-quer-mudancas-na-lei-de-resiliencia-cibernetica-da-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/legisladores-devem-enfrentar-aumento-de-vulnerabilidades-associado-a-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/ue-anuncia-novo-acordo-sobre-transferencias-de-dados-para-os-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/empresas-suecas-multadas-por-utilizacao-do-google-analytics</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/comissao-europeia-aumenta-pressao-para-retirar-huawei-e-zte-do-5g-europeu</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/data-act-amigo-ou-inimigo-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/seis-riscos-legais-e-de-compliance-a-enderecar-no-chatgpt</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/orientacao-cnpd-incompatibilidade-da-acumulacao-de-funcoes-epdrai</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/agencias-norte-americanas-publicam-principios-para-desenvolvimento-de-produtos-security-by-design-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/check-point-detalha-elementos-chave-que-fabricantes-de-iot-tem-de-implementar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/dora-ciber-resiliencia-e-a-palavra-de-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/sistemas-de-ia-tem-de-ser-seguros-e-proteger-a-privacidade-diz-biden</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/italia-proibe-chatgpt</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/parlamento-europeu-diz-que-espanha-precisa-de-mais-transparencia-sobre-o-spyware-pegasus</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/nsa-recomenda-adocao-de-principios-zero-trust-para-melhorar-gestao-de-identidades-credenciais-e-acesso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/maioria-das-apps-na-google-play-store-tem-discrepancias-de-privacidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/expiracao-de-programa-de-vigilancia-da-internet-preocupa-justica-norte-americana</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/nis-2-uma-evolucao-e-nao-uma-revolucao-da-seguranca-das-redes-e-sistemas-de-informacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/o-decreto-lei-652021-como-uma-ferramenta-de-reforco-a-resiliencia-das-pme</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/cnpd-aplica-coima-de-43-milhoes-de-euros-ao-ine</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/lancada-terceira-parte-de-guia-sobre-seguranca-da-cadeia-de-valor-de-software</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/it-security-conference-os-iso-sao-um-instrumento-muito-util-quer-na-protecao-quer-no-cumprimento-de-alguns-requisitos-legais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/cibercrime-na-mira-da-proposta-da-ue-para-legislar-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/autoridade-britanica-de-ciberseguranca-lanca-recomendacoes-para-a-cadeia-de-valor</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/iso-27701-um-selo-de-aprovacao-de-compliance-com-o-rgpd</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/decreto-lei-652021-um-pequeno-passo-para-o-homem-um-salto-gigante-para-as-organizacoes-nacionais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/o-risco-iminente-da-desigualdade-digital-e-das-falhas-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/estudo-diz-que-privacidade-e-agora-critica-para-as-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/o-outro-lado-da-bancada-de-um-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/web-summit-2021-toda-a-gente-adora-cookies-para-sobremesa-mas-em-algum-momento-da-nossa-vida-vamos-querer-algo-alem-de-cookies</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/bbva-multado-em-espanha-por-nao-garantir-seguranca-de-dados-pessoais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/tres-anos-depois-cumprimento-do-rgpd-reflete-maturidade-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/microsoft-anuncia-plano-de-limitacao-de-dados-no-espaco-europeu</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/censos-2021-cnpd-ordena-suspensao-de-contrato-com-a-cloudflare</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/reguladora-da-ue-diz-que-reconhecimento-facial-devia-ser-banido</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/a-polemica-politica-privacidade-do-whatsapp</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/o-papel-do-data-protection-officer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/digital-trust-59-dos-consumidores-mudariam-de-empresa-na-sequencia-de-um-ciberataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/tendencias-europeias-de-privacidade-de-dados-previstas-para-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/modelos-algoritmicos-ajudam-a-garantir-a-privacidade-dos-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/british-airways-recebe-multa-de-20-milhoes-de-libras-por-data-breach</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/privacidade-digital-nao-garante-protecao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/hospedes-processam-marriott-international-por-data-breach</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/ciberataque-a-easyjet-expoe-dados-de-nove-milhoes-de-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/rgpd-em-risco-de-falhar-por-falta-de-recursos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/cnpd-limita-atividade-de-videovigilancia-na-seguranca-publica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/5g-huawei-aprovada-com-limitacoes-pelo-governo-britanico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/protecao-de-dados-e-seguranca-da-informacao-marcam-estreia-de-tratado-de-direito-da-moda</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/huawei-recorre-de-mais-um-ban-dos-eua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/ue-nao-aceita-novas-criptomoedas-ate-mitigar-riscos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/eua-voltam-a-dar-90-dias-a-huawei</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/cncs-diz-que-portugal-esta-atento-aos-riscos-do-5g</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/furto-de-dados-biometricos-poe-regulamentacao-em-causa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/smartphones-android-vao-enviar-menos-dados-as-operadoras</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/eua-dao-mais-90-dias-a-huawei</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/google-e-apple-recuam-nas-politicas-de-gravacao-de-voz</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/data-protection-officers-o-que-fazem-e-quem-precisa-deles</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/eua-vendem-a-huawei-se-seguranca-nacional-for-protegida</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/trump-admite-que-eua-continuem-a-vender-a-huawei</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/compliance/google-processada-por-partilha-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/quando-a-ia-invade-a-ia-as-vitimas-continuam-a-ser-pessoas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/exposicao-digital-quando-os-dados-da-empresa-deixam-de-ser-secretos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/openclaw-a-seguranca-dos-agentes-numa-fronteira-com-poucas-regras</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-elo-que-nao-controlamos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/construir-a-confianca-digital-o-papel-da-nis2-e-do-dora-no-futuro-das-organizacoes-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-ascensao-do-chief-trust-officer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/preparacao-vs-resiliencia-porque-e-que-as-empresas-precisam-de-se-preparar-hoje-para-as-ameacas-de-amanha</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ia-dos-dados-envenenados-aos-modelos-comprometidos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/prontos-ou-nao-ai-vem-a-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-que-muda-realmente-com-a-nis2-para-as-equipas-de-ti</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-que-os-primeiros-ataques-a-agentes-de-ia-nos-dizem-sobre-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/do-risco-a-resiliencia-como-proteger-as-infraestruturas-energeticas-na-era-das-ameacas-hibridas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/para-la-da-checklist-porque-e-que-a-seguranca-ofensiva-continua-e-o-futuro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ciberseguranca-para-pme-rumo-a-uma-protecao-resiliente-com-solucoes-xdr</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-elo-fraco-da-ciber-resiliencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-novo-contrato-social-poder-e-risco-no-agentic-os-da-microsoft</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/recuperacao-de-dados-um-pilar-essencial-da-resiliencia-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-ciberseguranca-nao-se-decreta-por-lei</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-joia-que-ninguem-protegeu-a-ciberseguranca-no-assalto-ao-louvre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-camada-que-falta-na-ciberseguranca-contexto-empresarial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/portugal-ainda-confunde-seguranca-com-conformidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/shadow-ai-a-ameaca-invisivel-a-seguranca-da-sua-organizacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-lado-obscuro-dos-agentes-de-ia-poder-sem-controlo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/pagamento-de-resgates-do-ransomware-funciona-proibir</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/shai-hulud-um-worm-de-supply-chain-com-possivel-genese-em-ai</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/por-fim</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/contas-privilegiadas-um-pilar-essencial-da-seguranca-empresarial-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/soc-o-centro-nevralgico-da-resiliencia-cibernetica-nas-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-ciberseguranca-e-finalmente-uma-prioridade-nas-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/trabalhar-proximo-da-direcao-da-empresa-ajuda-a-provar-o-seu-valor-enquanto-ciso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/storytelling-and-tecnologias-emergentes-o-novo-paradigma-da-ciberguerra</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/soc-hibrido-garantir-a-conformidade-com-a-nis-2-e-o-crescimento-dos-msp</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/preparar-hoje-os-profissionais-de-ciberseguranca-do-amanha</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/da-crise-a-continuidade-vantagens-em-apostar-numa-estrategia-de-protecao-das-operacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-importancia-da-conformidade-em-ti-nis2-rgpd-e-outras-regulamentacoes-criticas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/nis2-one-size-fits-all</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/nis2-mais-do-que-uma-diretiva-um-catalisador-da-maturidade-organizacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-sentinela-proativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/fazer-o-basico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/resiliencia-digital-pos-apagao-o-papel-da-diretiva-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/portugal-e-a-nis2-um-novo-capitulo-para-a-ciberseguranca-nacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-revolucao-da-ciberseguranca-ja-comecou--e-o-setor-da-energia-lidera-a-mudanca-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/consolidar-para-detetar-e-reagir-mais-rapido-uma-mudanca-de-paradigma-nas-operacoes-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-visibilidade-dos-ativos-e-a-base-de-uma-estrategia-eficaz-de-ciberdefesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/dora-o-que-muda-na-ciberseguranca-financeira</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/genai-e-a-emergencia-de-uma-nova-arquitetura-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-primeiro-passo-de-uma-nova-jornada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ciberseguranca-na-era-digital--o-e-learning-ao-servico-das-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/dia-mundial-da-password-e-preciso-mudar-mentalidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/cloud-scanning-ferramenta-revolucionaria-de-verificacao-de-vulnerabilidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/continuidade-do-negocio-e-disaster-recovery-na-era-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/clickfix-o-golpe-silencioso-dos-tres-cliques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/um-novo-palco-para-a-ciberseguranca-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/dia-mundial-do-backup-como-garantir-a-continuidade-apos-um-ataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/porque-a-gestao-de-riscos-moderna-deve-combinar-uma-visao-a-curto-e-a-longo-prazo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/automatizacao-na-ciberseguranca-salvacao-para-as-empresas-ou-oportunidade-para-os-criminosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/operacao-cumberland-e-os-desafios-legais-na-era-da-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/novo-regime-juridico-de-ciberseguranca-mais-obrigacoes-mais-resiliencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/relembrar-para-nao-esquecer</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/deepseek-r1-ia-em-open-source-redefine-as-regras-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/dia-europeu-da-protecao-de-dados-como-esta-a-ia-a-impactar-a-area-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/quando-a-resiliencia-e-fundamental-para-a-continuidade-do-negocio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-papel-crucial-da-avaliacao-de-comprometimento-na-ciberdefesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/red-team-vs-pentest-uma-abordagem-proativa-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/centros-de-operacoes-de-risco-roc-os-proximos-sucessores-dos-soc</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/preparar-o-que-pode-estar-para-vir</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/microsoft-reforca-a-seguranca-na-cloud-com-novos-processadores-e-solucoes-hibridas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ciberseguranca-a-responsabilidade-que-a-gestao-de-topo-nao-pode-adiar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/cibercrime-na-era-da-ia-5-medidas-essenciais-para-todas-as-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-revolucao-silenciosa-ciberseguranca-como-um-escudo-invisivel-das-empresas-contra-as-ameacas-digitais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-ascensao-das-redes-sociais-de-crime-informatico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ate-dia-10</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/como-lidar-com-dispositivos-nao-geridos-nos-novos-ambientes-zero-trust</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/do-shadow-it-ao-shadow-ai-o-perigo-do-uso-nao-autorizado-de-ia-nas-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/regras-de-ouro-de-data-loss-prevention</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ja-esta-preparado-para-o-cyber-resilience-act-da-ue</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-importancia-de-saber-navegar-no-cenario-da-nis-2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/tic-tac-contagem-final-para-a-implementacao-do-regulamento-dora</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ataque-massivo-compromete-dados-de-milhoes-de-clientes-na-plataforma-snowflake-da-atandt</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-aumento-do-cibercrime</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ciberseguranca-alimentada-por-ia-generativa-escolha-ou-obrigacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/reforcar-a-ciberseguranca-com-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/gestao-robusta-de-patches-de-regresso-a-base</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/managed-services-maximizar-o-potencial-que-ha-na-sua-empresa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/nist-porque-e-que-a-recuperacao-nao-pode-funcionar-por-si-so</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/os-dos-e-os-donts-da-quantificacao-de-riscos-ciberneticos-para-os-ciso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/defendendo-a-identidade-digital-ameacas-e-protecoes-contra-sim-swap-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/reduzir-o-risco-do-negocio-como-evoluir-a-abordagem-de-seguranca-sergiopedroche</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/quando-a-ameaca-esta-no-primeiro-resultado-dos-motores-de-busca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/finlandes-condenado-por-ataque-informatico-a-clinica-de-psicoterapia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/reforcando-a-resiliencia-cibernetica-frameworks-de-seguranca-e-regulamentacoes-na-era-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/contagem-decrescente-para-o-digital-operational-resilience-act-dora-ja-esta-preparado-para-a-conformidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/reduzir-o-risco-do-negocio-como-evoluir-a-abordagem-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/como-prevenir-ou-corrigir-falhas-de-seguranca-em-aplicacoes-web</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/dora-e-nis2--o-mar-de-mudancas-regulatorias-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/gestao-centralizada-da-seguranca-e-o-rumo-a-seguir-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/porque-e-que-o-governo-frances-teve-de-por-a-mao-por-debaixo-da-atos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/bots-ia-deepfakes-e-desinformacao-no-maior-ano-eleitoral-da-historia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-nova-face-da-ciberseguranca-suportada-em-gpu</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/uma-nova-era</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-ano-de-todas-as-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-que-foi-e-o-que-vai-ser</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-proteccao-de-dados-factor-de-inovacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ciberseguranca-um-desafio-global</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/agi-e-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/desafios-e-imperativos-da-ciberseguranca-ot-na-era-da-convergencia-tecnologica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-todos-os-leitores-obrigado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/as-ameacas-de-dia-zero-e-os-pontos-cegos-na-gestao-de-riscos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-importancia-da-consciencializacao-para-a-ciberseguranca-na-era-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/monstros-da-ciberseguranca-que-dao-medo-muuuito-medo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/nunca-confiar-verificar-sempre</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/cybersecurity-as-a-service-equipas-especializadas-naquilo-que-as-empresas-realmente-necessitam</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/e-necessario-um-salto-tecnologico-no-armazenamento-de-dados-de-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/levar-a-ciberseguranca-a-todo-o-lado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/cinco-formas-de-utilizar-o-chatgpt-na-resposta-a-incidentes-pros-e-contras</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-poder-da-comunicacao-na-ciber-resiliencia-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ciso-no-limite-como-parcerias-estrategicas-podem-combater-os-ciberataques-nas-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/talento-e-regulamentacao-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/pensa-que-ja-sabe-tudo-sobre-seguranca-da-identidade-pense-de-novo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-papel-da-automatizacao-na-eficiencia-mitigacao-de-riscos-e-reducao-de-custos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-seguranca-das-plataformas-de-ia-e-um-desafio-crescente-para-as-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/clonagem-de-voz-a-proxima-e-perigosa-frente-de-ataque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/sensibilizar-sensibilizar-sensibilizar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-protecao-do-active-directory-deve-estar-no-centro-de-qualquer-estrategia-zero-trust</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/porque-e-que-as-ciberameacas-sofisticadas-exigem-uma-resposta-dinamica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/managed-services--sabe-escolher-o-prestador-de-servico-mais-indicado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/e-tempo-de-proteger-a-sua-organizacao-de-ameacas-internas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/desenvolvimento-sustentavel-na-era-da-digitalizacao--e-onde-fica-a-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/os-dois-lados-da-inteligencia-artificial-a-luz-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/5-dicas-para-escolher-o-melhor-managed-security-service-provider-mssp</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ciberseguranca-na-supply-chain-como-proteger-as-cadeias-de-abastecimento-dos-riscos-ciberneticos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ja-ouviu-falar-no-conceito-sbom-software-bill-of-materials-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-papel-do-red-teaming-no-aperfeicoamento-do-gpt-4-seguranca-e-etica-na-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ataques-informaticos-mais-vale-prevenir-do-que-nao-conseguir-remediar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/novo-espaco-com-o-mesmo-foco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-evolucao-do-ransomware---navegar-numa-nova-era-de-cibercriminalidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/aikido-wiper-tres-grandes-licoes-de-seguranca-a-reter</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ciberguerra-uma-batalha-silenciosa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/defesa-em-tempo-real-para-ambientes-multicloud-contra-ameacas-e-ataques-maliciosos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/conversando-sobre-chatgpt-e-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/quatro-tendencias-do-cibercrime-que-vao-marcar-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/dois-palcos-e-uns-trocos-para-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/monitorizacao-de-seguranca-o-novo-normal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/quando-se-trata-de-ransomware-mais-vale-enganar-do-que-curar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/modernize-a-sua-estrategia-de-recuperacao-cibernetica-em-cinco-etapas-simples</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/tendencias-tecnologicas-e-o-seu-impacto-no-panorama-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/sobre-os-custos-escondidos-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/as-5-principais-tendencias-em-seguranca-ot-e-ics-para-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-importancia-da-continuidade-do-negocio-para-a-ciber-resiliencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/5-estrategias-de-protecao-de-ransomware-para-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/queda-rapida-o-colapso-da-ftx-e-tambem-um-colapso-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/verificado-para-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/endpoint-devices-a-porta-de-entrada-dos-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/se-duvidas-houvesse</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/sem-sensibilizacao-nao-e-possivel-sermos-ciber-resilientes-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/seguro-de-raiz</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/as-preocupacoes-de-seguranca-com-o-trabalho-remoto-para-os-bancos-e-empresas-financeiras</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/tres-recursos-que-os-cio-podem-utilizar-para-ajudar-a-resiliencia-dos-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/mensagem-de-meio-de-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/um-telescopio-mas-apontado-a-todos-nos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/desafios-na-cloud-a-seguranca-da-informacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-desafio-de-proteger-e-governar-dados-criticos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/seguranca-nos-pagamentos-online-uma-licao-da-europa-para-o-mundo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/as-tres-principais-razoes-pelas-quais-os-ciso-e-os-cio-perdem-tempo-e-dinheiro-com-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/criptoquintas-nem-sequer-e-ainda-o-inicio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/um-ano-depois</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/proteja-os-seus-dados-com-uma-abordagem-multicamada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-inicio-do-fim</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-importancia-de-uma-visao-unificada-da-postura-de-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/protegendo-a-cloud-com-security-as-code</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/incidentes-de-ciberseguranca-e-privacidade-o-esquecido-impacto-na-reputacao-das-marcas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/engenharia-social-a-arte-de-manipular</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/de-quem-e-a-culpa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ciberameacas-durante-as-tensoes-entre-russia-e-ucrania-o-que-podemos-aprender-com-a-historia-para-estarmos-mais-preparados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-efeito-domino-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/um-novo-mundo-com-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-ciberseguranca-comeca-na-palma-da-mao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ransomware-a-visibilidade-e-a-melhor-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-revolucao-quantica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-privacidade-de-dados-e-um-assunto-de-hoje-mas-tambem-do-amanha</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/seguranca-em-2022-mais-gastos-mais-integracao-mais-problemas-com-a-ot</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/123456-qwerty-iloveyou</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/os-desafios-no-combate-ao-crime-cibernetico-na-administracao-publica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-importancia-da-standardizacao-na-seguranca-das-redes-de-comunicacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/consegue-recuperar-rapidamente-de-um-ataque-de-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-metaverse-e-a-privacidade-uma-historia-por-contar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/navegar-num-ambiente-de-trabalho-hibrido--como-podem-as-empresas-manter-se-seguras</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/engenharia-social--a-mente-humana-ao-servico-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-nova-pandemia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/escovar-os-dentes-e-higiene-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/soc-a-corrida-contra-o-tempo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/a-arma-certa-para-as-maos-erradas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/covid-19-novos-ciberataques-novos-desafios</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/as-letras-miudinhas-como-a-google-a-outros-nos-vigiam-atraves-das-apps</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/modern-workplace-security-depois-da-mobilidade-vem-a-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/quando-o-alvo-do-ciberataque-e-uma-infraestrutura-estrategica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/ataques-em-cadeia-o-que-sabemos-sobre-o-ataque-a-solarwinds-e-o-porque-da-sua-importancia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/pandemia-20---cyber-ataque-as-infraestruturas-criticas-da-saude</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/o-rgpd-e-os-desafios-da-transformacao-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/opinion/quao-segura-esta-a-nossa-informacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/it-security-summit-porto-fecha-programa-e-revela-agenda-completa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/it-security-summit-porto-2026-esgota-inscricoes-a-mais-de-um-mes-do-evento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/conheca-os-principais-keynotes-da-segunda-edicao-da-it-security-summit-porto</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/coordenador-do-cncs-abre-segunda-edicao-da-it-security-summit-porto-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/conheca-os-parceiros-da-segunda-edicao-da-it-security-summit-porto-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/it-security-summit-porto-2026-abre-inscricoes-para-a-sua-2a-edicao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/it-security-summit-porto-2026-duplica-capacidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/tentamos-fechar-a-porta-aos-atacantes-mas-ao-contratarmos-suppliers-vulneraveis-podemos-estar-a-abrir-uma-janela</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/devoteam-o-futuro-da-ciberseguranca-nao-e-maquina-contra-maquina-nem-homem-contra-maquina-vai-ser-homem-com-maquina-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/balwurk-como-e-que-nos-conseguimos-caracterizar-e-aferir-o-risco-de-adotarmos-estas-solucoes-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/artresilia-o-impacto-que-um-acesso-ilegitimo-a-informacao-pode-ter-e-muito-grande-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/agenda-2026-it-security-summit-porto-a-16-de-abril-e-it-security-conferencea8deoutubro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/varonis-os-dados-sao-dinamicos-e-as-medidas-de-seguranca-tem-de-acompanhar-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/securnet-ciberseguranca-nao-e-so-tecnologia-ha-compliance-ha-frameworks-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/tenable-a-ciberseguranca-nao-e-custo-e-um-investimento-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/rapid7-a-realidade-e-que-nao-conseguimos-proteger-o-que-nao-conseguimos-ver-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/scott-nichols-quem-controla-a-informacao-controla-o-mundo-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/manageengine-o-desafio-de-hoje-e-a-inovacao-de-amanha-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/contra-almirante-gameiro-marques-o-investimento-mais-valioso-apesar-da-evolucao-da-ia-e-sempre-nas-pessoas-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/logicalis-em-2025-ainda-existem-contas-que-nao-tem-mfa-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/nao-ha-recursos-especializados-em-ciberseguranca-suficientes-para-as-necessidades-existentes-ciber-resiliencia-preparar-testar-e-sobreviver-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/hp-e-essencial-proteger-os-dispositivos-e-aplicacoes-em-todos-os-espacos-de-trabalho-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/ninguem-define-boas-metricas-a-primeira--quanto-vale-a-seguranca-roi-metricas-e-o-racional-de-investimentos-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/fujifilm-para-recuperar-dados-de-ha-20-30-anos-o-backup-e-a-cloud-nao-sao-suficientes-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/podemos-deixar-de-ter-um-sentido-critico-daquilo-que-estamos-a-receber-ia-generativa-ameaca-ou-aliada-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/sophos-precisamos-de-pensar-no-aspeto-humano-da-defesa-das-nossas-redes-em-vez-de-estarmos-apenas-focados-na-tecnologia-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/cabe-as-empresas-escolherem-o-caminho-compliance-por-compliance-ou-uma-verdadeira-mudanca-de-postura-implementacao-da-nis2-e-dora-em-debate-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/pwc-se-quero-capitalizar-em-bug-bounty-nao-convem-que-a-minha-prova-de-conceito-esteja-publica-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/major-general-joao-vieira-borges-a-corrida-aos-recursos-de-ia-esta-a-determinar-o-equilibrio-de-poder-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/pwc-nao-podemos-confiar-cegamente-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/hpe-se-nao-tens-visibilidade-do-que-esta-a-acontecer-na-tua-rede-e-inutil-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/sergio-trindade-e-importante-saber-o-que-queremos-proteger-olhar-e-avaliar-o-nivel-de-protecao-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/david-marques-ha-coisas-que-estao-la-aos-milhares-e-ja-sabemos-que-nem-sequer-vamos-corrigir-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/fortinet-o-sase-ajuda-a-eliminar-a-complexidade-do-mundo-hibrido-que-vivemos-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/elred-nao-basta-ter-ferramentas-e-preciso-uma-estrategia-integrada-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/jorge-vicente-se-nao-estiverem-a-usar-os-vossos-dados-para-melhorar-a-vossa-defesa-os-atacantes-vao-usa-los-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/check-point-a-nossa-area-nao-esta-a-crescer-a-velocidade-que-o-negocio-cresce-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/dr-ron-ross-nao-existe-zero-confiabilidade--tudo-e-complexo-e-nada-e-perfeitamente-seguro-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/palo-alto-networks-a-plataformizacao-nao-e-um-hype-e-uma-trend-que-ira-ficar-no-mercado-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/cncs-vamos-separar-aquilo-que-e-o-trigo-do-joio-na-prestacao-de-servicos-de-ciberseguranca-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/as-imagens-que-contam-a-historia-da-edicao-de-2025-da-it-security-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/it-security-conference-certificacoes-de-servicos-de-ciberseguranca-sao-caminho-estrategico-para-fortalecer-a-confianca-nos-prestadores-de-servico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/inscricoes-oficialmente-esgotadas-para-a-it-security-conference-2025-junte-se-a-nos-gratuitamente-via-zoom</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/programa-da-it-security-conference-esta-oficialmente-fechado-conheca-a-agenda-completa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/do-compliance-aos-desafios-da-ia-generativa-o-que-esperar-das-mesas-redondas-da-it-security-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/contra-almirante-antonio-gameiro-marques-abre-palco-das-technical-tracks-na-it-security-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/dr-ron-ross-traz-visao-estrategica-a-it-security-conference-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/conheca-os-oradores-ja-confirmados-para-a-it-security-conference-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/major-general-joao-vieira-borges-encerra-a-it-security-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/dr-ron-ross-ex-fellow-do-nist-e-o-special-keynote-da-it-security-conference-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/9-de-outubro--garanta-o-seu-lugar-na-it-security-conference-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/para-uma-empresa-focada-naquilo-que-e-competitividade-e-eficiencia-operacional-ter-atencao-a-ciberseguranca-e-um-grande-desafio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/pwc-ha-casos-em-que-aceitar-o-risco-e-mais-racional-do-que-investir-milhoes-para-evitar-algo-com-probabilidade-minima</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/nao-e-facil-pegar-em-processos-as-vezes-tao-complexos-e-simplifica-los-mas-e-um-objetivo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/kaspersky-inteligencia-de-ameacas-e-saber-o-que-os-vossos-adversarios-fazem-e-usar-essa-informacao-para-tomar-decisoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/watchguard-a-visibilidade-total-e-o-primeiro-passo-para-a-verdadeira-ciberseguranca-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/logicalis-83-dos-cio-lidaram-com-fugas-de-informacao-mas-mais-de-metade-nao-esta-preparado-para-a-proxima-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/fujifilm-gravar-dados-todos-sabem-entender-como-e-que-sao-gravados-ja-e-outra-coisa-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/a-ciberseguranca-e-uma-responsabilidade-coletiva-especialistas-alertam-para-urgencia-na-aplicacao-da-nis2-em-portugal-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/cisco-a-ia-esta-a-mudar-a-forma-como-compramos-como-trabalhamos-como-socializamos-ate-como-votamos-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/continuamos-a-achar-que-a-ciberseguranca-e-responsabilidade-do-it-visao-holistica-em-debate-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/check-point-muitos-utilizadores-colocam-informacao-sensivel-em-motores-de-ia-generativa-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/o-impossivel-e-impossivel-ate-acontecer-pela-primeira-vez-preparar-as-empresas-para-o-imprevisivel-na-era-digital-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/zaltor-leva-nymiz-e-opentext-a-it-security-summit-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/resiliencia-ambicao-rigor-a-industria-debate-ciberseguranca-e-protecao-de-infraestruturas-criticas-na-it-security-summit-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/securnet-as-equipas-de-grc-devem-ser-o-radar-destas-praticas-e-antecipar-os-impactos-antes-que-eles-ocorram-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/nuno-medeiros-a-tecnologia-pode-estar-na-origem-dos-blackouts-do-futuro-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/layer8-o-foco-excessivo-continua-a-ser-a-tecnologia-como-se-fosse-um-escudo-infalivel-contra-os-ataques-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/joao-rosario-as-vulnerabilidades-sao-como-ervas-daninhas-tratamos-umas-nascem-outras-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/balwurk-errar-e-humano-mas-o-erro-nao-pode-ser-uma-surpresa-temos-de-saber-lidar-com-o-inevitavel-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/as-imagens-que-contam-a-historia-da-primeira-edicao-da-it-security-summit</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/centro-nacional-de-ciberseguranca-nao-falta-muito-tempo-para-termos-computadores-quanticos-capazes-de-quebrar-os-mecanismos-de-cifra-com-video-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/netskope-estamos-a-entrar-numa-nova-era-onde-os-robos-vao-controlar-outros-robos-sem-intervencao-humana-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/it-security-summit-a-criptografia-e-crucial-para-a-seguranca-da-informacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/em-contagem-decrescente-para-a-primeira-edicao-da-it-security-summit</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/it-security-summit-chega-esta-semana-ao-norte-do-pais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/visionware-a-ia-e-mais-uma-ferramenta-nao-e-uma-silver-bullet-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/trend-micro-nao-podemos-proteger-aquilo-que-nao-podemos-ver-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/sealpath-nao-ha-dados-e-falta-nos-o-chao-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/manageengine-muitos-ambientes-ainda-continuam-com-as-configuracoes-de-seguranca-padrao-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/logicalis-83-dos-cio-referiram-data-breach-graves-no-ultimo-ano-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/devoteam-cyber-trust-queremos-ter-algo-que-seja-360-graus-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/balwurk-e-fundamental-ter-uma-postura-de-testes-continuados-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/arcserve-ha-organizacoes-que-substituem-mais-facilmente-um-ceo-do-que-as-suas-credenciais-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/varonis-a-flexibilidade-que-e-tao-interessante-na-cloud-tambem-potencia-o-risco-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/ivo-rosa-a-inovacao-anda-a-uma-velocidade-que-nao-e-a-mesma-com-que-a-seguranca-anda-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/securnet-e-preciso-criar-confianca-na-inteligencia-artificial-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/jose-alegria-o-ciso-tem-a-responsabilidade-de-saber-ler-saber-cheirar-a-evolucao-dos-problemas-e-antecipar-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/s21sec-nao-ha-nada-infalivel-nem-nada-que-seja-100-certo-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/estar-preparado-para-a-nis2-tudo-comeca-na-nis2-que-e-a-pedra-basilar-para-o-assegurar-de-um-nivel-comum-e-homogeneo-de-ciberseguranca-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/redshift-as-decisoes-estrategicas-podem-ter-um-impacto-profundo-nos-niveis-de-risco-de-seguranca-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/a-evolucao-da-tecnologia-para-a-defesa-da-organizacao-temos-que-pensar-na-resiliencia-como-um-pilar-completamente-critico-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/rapid7-com-esta-visibilidade-ajudaremos-a-identificar-o-risco-real-risco-continuo-e-a-construir-um-plano-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/elemento-humano-temos-de-embeber-a-pessoa-na-estrategia-de-seguranca-que-definimos-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/ibm-o-objetivo-principal-dos-atacantes-tem-sido-o-roubo-de-dados-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/melhorar-a-protecao-com-a-inteligencia-artificial-a-ia-e-o-futuro-para-nos-ajudar-a-estar-cada-vez-mais-preparados-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/sophos-os-custos-de-recuperacao-de-um-ataque-de-ransomware-estao-a-aumentar-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/ofir-hason-a-ciberseguranca-exige-uma-mentalidade-de-agente-de-inteligencia-nao-de-cidadao-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/pwc-temos-de-estar-preparados-para-agir-quando-ocorrer-o-ataque-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/christopher-perry-a-ciberseguranca-tem-de-ser-um-enabler-de-negocios-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/netskope-a-contextualizacao-passou-a-ser-o-nosso-perimetro-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/joao-annes-o-mundo-do-ot-e-a-proxima-grande-fronteira-da-ciberseguranca-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/hpe-aruba-networking-a-seguranca-deve-ser-feita-em-todas-as-camadas-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/pedro-rodrigues-a-framework-tiber-e-um-guia-para-testes-de-seguranca-mais-completos-e-eficientes-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/fortinet-aquilo-que-vemos-e-uma-ia-vs-ia-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/palo-alto-networks-a-ciberseguranca-deve-ser-olhada-holisticamente-e-perceber-como-adotar-a-plataformizacao-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/it-security-conference-volta-em-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/centro-nacional-de-ciberseguranca-a-nis2-traz-mais-transparencia-e-clareza-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/it-security-conference-2024-nis2-vai-ser-muito-importante-para-a-ciberseguranca-nacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/em-contagem-decrescente-para-a-terceira-edicao-da-it-security-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/faltam-3-dias---acompanhe-a-it-security-conference-via-zoom</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/inscricoes-esgotadas-para-a-it-security-conference-2024-mas-pode-assistir-gratuitamente-via-zoom-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/lino-santos-responde-as-suas-perguntas-na-it-security-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/contagem-decrescente-para-a-it-security-conference-conheca-os-nomes-em-destaque</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/christopher-perry-confirmado-como-orador-na-it-security-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/jose-alegria-abre-palco-das-technical-tracks-na-it-security-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/conheca-os-parceiros-da-it-security-conference-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/it-security-conference-apresenta-novidades-da-edicao-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/marque-a-it-security-conference-na-sua-agenda</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/10-de-outubro-marca-o-regresso-da-it-security-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/a-capacidade-de-conter-a-ameaca-e-o-nosso-papel-enquanto-servico-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/o-panorama-mundial-de-ataques-ddos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/paulo-viegas-nunes-dar-poder-de-decisao-a-maquina-e-o-cabo-bojador-de-podermos-lidar-com-a-ia-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/varonis-com-uma-superficie-de-ataque-tao-grande-teremos-sempre-um-sistema-vulneravel-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/watchguard-as-solucoes-de-mfa-sao-mais-economicas-e-resolvem-grande-parte-dos-erros-humanos-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/servicos-criticos-e-operacoes-de-seguranca-a-ciberseguranca-nao-pode-ser-vista-como-o-bombeiro-da-empresa-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/sealpath-as-medidas-que-estao-aplicadas-sao-fundamentais-mas-se-calhar-nao-sao-suficientes-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/cristiane-dias-a-ciberseguranca-e-responsabilidade-de-toda-a-organizacao-e-nao-apenas-da-ti-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/cisco-solucoes-de-ciberseguranca-sao-pecas-de-puzzle-que-nao-encaixam-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/visionware-os-ataques-nao-sao-uma-questao-de-se-sao-uma-questao-de-quando-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/s21sec-a-transparencia-e-a-chave-da-purple-team-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/cato-networks-a-convergencia-entre-ciberseguranca-e-network-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/zero-trust-e-sase-a-era-de-nao-confiar-cegamente-no-utilizador-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/ibm-a-seguranca-esta-no-caminho-critico-do-negocio-digital-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/arcserve-como-conseguir-a-imutabilidade-de-dados-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/margarida-leitao-nogueira-tendencia-regulatoria-europeia-comporta-impacto-economico-e-operacional-para-entidades-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/redshift-ameacas-mais-profundas-as-organizacoes-vem-de-vulnerabilidades-conhecidas-ha-muito-tempo-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/logicalis-e-preciso-entender-a-diferenca-entre-ciberseguranca-e-ciber-resiliencia-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/ciberinteligencia-a-ferramenta-totalmente-diferenciadora-que-alia-a-analise-de-dados-e-a-seguranca-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/ciber-resiliencia-o-ciso-nao-pode-ser-o-pedro-e-o-lobo-tem-de-ser-paranoico-mas-contido-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/sophos-uma-das-grandes-lacunas-e-a-capacidade-de-responder-com-rapidez-suficiente-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/leitores-confirmam-sucesso-da-it-security-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/luis-morais-ao-trabalhar-com-projetos-de-inovacao-vao-trazer-risco-para-dentro-da-organizacao-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/hpe-aruba-networking-e-necessario-rever-a-forma-como-as-redes-sao-desenhadas-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/enisa-olhar-para-a-nis-2-como-uma-oportunidade-de-melhorarmos-a-ciberseguranca-nas-nossas-organizacoes-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/palo-alto-networks-em-termos-de-grande-crescimento-esta-a-ciberseguranca-e-a-ia-nos-proximos-anos-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/lino-santos-o-vilao-nao-e-o-numero-de-incidentes-e-o-impacto-decorrente-desses-incidentes-com-video</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/it-security-conference-2023-ha-pouca-atencao-das-organizacoes-para-as-competencias-basicas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/em-contagem-decrescente-para-a-segunda-edicao-da-it-security-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/anunciados-primeiros-oradores-da-it-security-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/conheca-os-parceiros-da-it-security-conference</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/it-security-conference-abre-inscricoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/its-conference/a-it-security-conference-2023-vai-realizar-se-dia-12-de-outubro-num-espaco-magnifico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/4-consideracoes-de-seguranca-a-medida-que-a-utilizacao-da-ia-se-expande-pelas-equipas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/plataformizacao-vs-best-of-breed-o-falso-dilema-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ferramentas-de-ciberseguranca-a-tecnologia-por-si-so-nao-garante-a-protecao-dos-ativos-digitais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/responsabilidade-pessoal-risco-empresarial-o-novo-paradigma-da-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/o-papel-dos-servicos-mdr-na-resposta-a-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/como-construir-um-modelo-zero-trust-num-mundo-de-llm</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/zero-trust-from-buzzword-to-real-implementation</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ciberseguranca-na-era-dos-deepfakes-proteger-a-confianca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/nis-2-da-conformidade-legal-a-resiliencia-estrategica---o-caminho-para-a-maturidade-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/a-identificacao-de-risco-como-base-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/automacao-scripts-soar-e-agentic-ai</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/soar-transformando-caos-em-automacao-na-ciberseguranca-moderna</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/soc-o-motor-de-ciberesiliencia-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/turning-data-into-defense-the-strategic-power-of-cti-and-threat-hunting-in-incident-response-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/da-sala-de-aula-para-a-sala-de-guerra-a-evolucao-do-awareness-training</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/resiliencia-na-ciberseguranca-como-proteger-o-futuro-digital-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/o-armazenamento-em-tape-fujifilm-lto-ultrium-10-reforca-a-resiliencia-e-a-protecao-contra-ciber-crimes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ciber-resiliencia-o-novo-imperativo-das-organizacoes-digitais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ciber-resiliencia-o-mito-da-detecao-e-resposta-como-primeira-linha-de-defesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/soberania-digitalpt</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/nis2-por-onde-comecar-e-o-que-nao-pode-falhar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/unified-sase-e-seguranca-integrada-marcam-os-desafios-reais-dos-ciso-portugueses</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/veridas-o-futuro-da-identidade-digital-e-o-presente</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/digital-forensics-and-incident-response-uma-jogada-que-nao-acaba-no-golo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/digital-forensic-and-incident-response-a-relevancia-na-seguranca-de-redes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ciberataques-and-ia-a-dupla-que-desafia-empresas-e-democracias-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ciberataques-com-ia-a-proxima-grande-ameaca-as-empresas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ia-o-aliado-e-o-inimigo-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/inteligencia-artificial-avancos-na-ciberseguranca-e-novos-riscos-digitais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ai-powered-cyberattacks-quando-a-nossa-melhor-defesa-e-tambem-a-arma-do-inimigo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/aferir-o-risco-na-adocao-da-ia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/lisboa-e-palco-de-debate-sobre-identidade-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/cookie-bite-quando-um-simples-cookie-abre-as-portas-a-ataques-avancados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/redbox-a-plataforma-que-torna-a-ciberseguranca-visivel</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/prologin-seguranca-digital-com-assinatura-portuguesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/automacao-na-resposta-a-incidentes-estrategias-para-equipas-modernas-de-ciberdefesa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/desinformacao-e-resiliencia-democratica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/always-smart</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ciberseguranca-em-portugal-entre-o-progresso-e-a-urgencia-de-mudanca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/mssp-zero-trust-e-microsegmentacao-o-novo-tripe-da-ciberseguranca-em-portugal</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/o-estado-da-nacao-2025-entre-a-ilusao-da-seguranca-e-a-realidade-da-ameaca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/estado-da-nacao---entre-o-alarme-e-a-acao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/soc-com-ia-o-proximo-passo-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ia-e-ciberseguranca-de-maos-dadas-no-evento-anual-da-divultec-para-fabricantes-e-clientes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ethiack-lanca-nova-versao-do-artiacker</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/cyberwarfare-uma-ameaca-ao-quotidiano-empresarial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/cyber-warfare-o-novo-campo-de-batalha-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ciberseguranca-obrigatoria-esta-a-sua-empresa-pronta-para-a-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/nis2-a-nova-diretiva-da-uniao-europeia-para-seguranca-cibernetica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/nis2-em-portugal-transposicao-desafios-e-oportunidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/activesys-promove-confianca-no-douro-os-negocios-sao-feitos-entre-pessoas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/o-papel-da-automacao-na-redefinicao-dos-soc</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/um-ciso-nao-deve-apenas-reagir-a-incidentes-tem-de-implementar-estrategias-que-antecipem-e-previnam-potenciais-ameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ibm-a-governanca-de-ia-e-o-enabler-da-inovacao-de-inteligencia-artificial-em-escala</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/gestao-de-identidades-e-contas-privilegiadas-um-pilar-fundamental-para-a-ciberseguranca-organizacional-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/o-papel-da-gestao-de-identidade-e-acesso-iam</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/habemus-lei-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/como-pode-a-varonis-ajuda-lo-a-implementar-a-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/winds-of-change</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/como-a-definicao-estrategica-ajuda-no-operacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/armazenamento-de-dados-digitais-as-principais-diretivas-europeias-a-conhecer-face-ao-aumento-dos-ciberataques</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ia-compliance-e-ciberseguranca-voce-confia-seus-dados-a-algoritmos-sem-regulamentacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/divultec-reune-fabricantes-e-clientes-para-debater-evolucao-da-ia-e-da-ciberseguranca-no-negocio</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/dora-e-nis2-a-chave-para-construir-resiliencia-e-inovacao-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/de-conformidade-reativa-para-conformidade-proativa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/travar-a-onda-de-ciberincidentes-nos-cuidados-de-saude</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ransomware-e-cibercrime-as-a-service-porque-e-que-a-ciberseguranca-precisa-de-ser-on-demand-flexivel-e-continua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/escondido-a-vista-de-todos-o-abuso-de-aplicacoes-de-confianca-aumentou-51-no-relatorio-sophos-active-adversary</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/2025-traz-mais-ameacas-novos-desafios-e-maior-investimento-para-a-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/o-novo-assistente-de-cibercrime-ransomware-as-a-service</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/tudo-sobre-o-relatorio-active-adversary-da-sophos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/cybercrime-as-a-service-e-ransomware-uma-nova-realidade-no-contexto-de-continuous-threat-exposure-management-ctem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/luta-contra-o-cybercrime-as-a-service-um-desafio-das-organizacoes-um-desafio-de-todos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ransomware-a-ameaca-que-esta-a-um-clique-de-distancia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/mastercard-aposta-na-inteligencia-artificial-para-reforcar-a-ciberseguranca-e-prevenir-fraudes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/os-primeiros-90-dias-de-um-ciso-o-plano-de-acao-e-conselhos-definitivos-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/a-transformacao-do-ciso-de-guardiao-tecnico-a-arquiteto-estrategico-na-era-da-ia-machine-learning-computacao-quantica-e-conformidade-com-o-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/a-evolucao-do-cargo-de-ciso-de-especialista-tecnico-a-lider-estrategico</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ciso-40-liderar-a-seguranca-na-inovacao-com-inteligencia-artificial</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/sophos-nomeada-lider-no-magic-quadrant-da-gartner-para-plataformas-de-protecao-de-endpoints</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/a-antecipacao-das-ameacas-ao-dns</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/consolidacao-da-ciberseguranca-de-maos-dadas-com-o-xmdr</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ciso-o-pivot-da-ciberseguranca-nas-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ciberseguranca-na-cadeia-de-valor-investimento-estrategico-no-processo-de-transformacao-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ciberseguranca-na-cadeia-de-abastecimento-um-desafio-urgente-para-empresas-e-governos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/seguranca-da-cadeia-de-abastecimento-supply-chain-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/consolidacao-da-seguranca-na-vanguarda-da-inovacao-ou-na-vanguarda-da-prevencao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/a-cloud-privada-topo-de-gama-da-fujifilm-um-elemento-chave-de-uma-arquitetura-de-seguranca-consolidada-no-caso-de-um-ataque-confirmado</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/sophos-tudo-o-que-precisa-de-saber-sobre-a-diretiva-nis-2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/os-desafios-do-regulamento-dora-e-a-diretiva-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/gerir-o-ciclo-de-vida-da-identidade-nas-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/a-importancia-de-proteger-o-dns-das-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/a-evolucao-da-ciberseguranca-em-portugal-uma-visao-integrada</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/a-urgencia-de-proteger-a-administracao-publica</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/o-abc-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/sophos-alerta-pagamentos-de-ransomware-aumentaram-500-no-ultimo-ano</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/sabe-como-lidar-com-um-incidente-grave-de-seguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/o-estado-da-ciber-nacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/educacao-tecnologica-dos-cidadaos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/fortalecer-a-muralha-digital-a-ascensao-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/inteligencia-artificial-um-caminho-sem-retorno-focado-na-antecipacao-e-adaptacao</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/prepare-a-sua-estrategia-de-ia-para-o-futuro-com-a-resiliencia-dos-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/a-evolucao-da-seguranca-de-dados-conheca-o-dspm</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/tudo-se-resume-a-relacao-e-confianca-activesys-leva-parceiros-e-clientes-em-passeio-pelas-paisagens-idilicas-do-douro-vinhateiro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/formacao-de-executivos-da-catolica-lisbon</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/mais-burocracia-ou-uma-europa-mais-segura</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/nis2-o-impacto-na-industria-nos-servicos-essenciais-e-na-cadeia-de-abastecimento</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/montar-o-puzzle-regulamentar-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/novos-desafios-da-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/vantagens-de-seguranca-do-armazenamento-em-tape-lto-ultrium-da-fujifilm-para-conformidade-com-a-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/visibilidade-completa-dos-ativos-de-it-ot-e-iot-para-assegurar-a-conformidade-com-a-nis2</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/nis-2-na-vanguarda-da-ciberseguranca---mais-do-que-uma-obrigacao-uma-oportunidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/nis-2-e-a-materializacao-da-ciberseguranca-resiliencia-e-conformidade-dos-operadores-de-servicos-essenciais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/diretiva-nis-2-estara-a-sua-organizacao-preparada-para-os-novos-desafios-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/o-dora-e-a-nis2-as-novas-regras-do-jogo-para-a-europa</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ia-e-o-novo-horizonte-de-ciberameacas</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/redefinicao-de-seguranca-de-perimetro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/activesys-leva-clientes-e-parceiros-em-passeio-tecnologico-pelo-douro</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/solucoes-de-seguranca-impulsionadas-por-ia-em-equipas-soc-</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/obtenha-acesso-seguro-e-unificado-a-dados-e-aplicacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/human-hacking-a-ameaca-muito-alem-da-tecnologia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/detetar-explicar-formar-e-treinar</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/inteligencia-artificial-e-ataques-de-engenharia-social-um-casamento-quase-perfeito</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/regulamentacoes-de-seguranca-dos-desafios-as-oportunidades</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/para-alem-da-caixa-de-entrada-a-evolucao-da-engenharia-social</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/os-cibercriminosos-vao-utilizar-o-caminho-de-menor-resistencia</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ciberseguranca-um-processo-de-melhoria-continua</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/o-potencial-impacto-da-inteligencia-artificial-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/inteligencia-artificial-na-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/o-ransomware-ataca-quando-nos-desconectamos---como-dete-lo</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/sase-unificado-conectividade-e-seguranca-modernas-para-a-empresa-digital</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/gerir-as-identidades-e-os-acessos-para-proteger-as-organizacoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/2023-odisseia-no-ciberespaco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/gestao-integrada-de-risco</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/desbloquear-sinergias-atraves-de-uma-gestao-integrada-de-riscos</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/a-gestao-de-risco-no-contexto-da-seguranca-aplicacional</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/os-seus-dados-estao-a-prova-de-insiders-cinco-passos-para-manter-os-seus-segredos-seguros</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/ameacas-internas-a-face-oculta-das-ameacas-empresariais</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/os-ataques-de-ransomware-estao-a-crescer-em-custo-e-frequencia-cinco-medidas-que-as-organizacoes-devem-tomar-para-se-protegerem</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/slabs/estrategias-de-gestao-de-riscos-de-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/comunicacao-de-crise-em-destaque-no-mais-recente-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/eleicoes-e-nis2-o-impasse-na-transposicao-da-diretiva-em-destaque-no-mais-recente-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/os-desafios-da-ciberseguranca-nas-cadeias-de-valor-no-mais-recente-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/a-evolucao-da-regulamentacao-de-ciberseguranca-no-mais-recente-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/a-gestao-de-vulnerabilidades-no-ultimo-episodio-do-ano-da-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/a-evolucao-das-ciberameacas-no-mais-recente-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/educacao-e-cultura-em-seguranca-digital-em-destaque-no-mais-recente-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/pentest-and-devsecops-e-o-enquadramento-com-a-dora-nis2-e-ia-generativa-em-destaque-no-mais-recente-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/ciberseguranca-no-ensino-superior-em-destaque-no-mais-recente-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/a-defesa-das-infraestruturas-criticas-em-destaque-no-mais-recente-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/ciberseguranca-no-setor-da-saude-em-destaque-no-mais-recente-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/regulamentacoes-de-ciberseguranca-em-destaque-no-mais-recente-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/software-composition-analysis-e-software-build-of-materials-no-terceiro-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/a-inteligencia-artificial-e-a-ciberseguranca-em-destaque-no-segundo-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/podcast/esta-no-ar-o-primeiro-episodio-do-it-security-watch</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/ultimo-episodio-do-flash-security-fala-da-abordagem-conjunta-de-ciberseguranca-e-privacidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/flash-security-da-destaque-as-avaliacoes-de-conformidade</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/multi-factor-authentication-em-destaque-no-flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/identity-governance-and-administration-em-destaque-neste-episodio-do-flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/mais-recente-episodio-do-flash-security-e-dedicado-ao-pam</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/eficacia-de-programas-de-consciencializacao-em-destaque-no-flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/a-melhor-forma-de-testar-a-prontidao-de-uma-organizacao-em-destaque-no-mais-recente-episodio-do-flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/a-protecao-do-active-directory-em-destaque-no-flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/como-o-ndr-se-diferencia-da-normal-monitorizacao-de-redes-em-destaque-no-mais-recente-episodio-do-flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/como-prevenir-uma-exfiltracao-de-dados-em-destaque-no-flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/como-funciona-o-mdr-e-o-tema-do-13-episodio-do-flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/a-gestao-do-risco-em-destaque-no-flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/automacao-de-seguranca-e-o-tema-do-episodio-11-do-flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/o-cti-e-a-consolidacao-da-ciber-resiliencia-em-destaque-no-flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/que-cuidados-se-devem-ter-ao-movimentar-workloads-para-ambientes-cloud</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/ztna-nac-ou-vpn-qual-a-melhor-opcao-para-criar-uma-estrutura-solida-de-acesso</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/em-que-difere-o-xdr-do-siem-em-destaque-no-setimo-episodio-do-flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/flash-security-o-que-muda-com-a-dora</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/flash-security-como-criar-organizacoes-mais-resilientes-ao-phishing</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/quarto-episodio-do-flash-security-foca-se-no-ransomware</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/protecao-de-endpoints-em-destaque-no-terceiro-episodio-do-flash-security</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/segundo-episodio-do-flash-security-aborda-a-protecao-de-dados</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/news/flash-security/it-security-tem-novo-podcast-durante-o-mes-europeu-da-ciberseguranca</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n29-abril-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n28-fevereiro-2026</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n27-dezembro-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n26-outubro-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n25-agosto-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n24-junho-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n23-abril-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n22-fevereiro-2025</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n21-dezembro-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n20-outubro-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n19-agosto-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n18-junho-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n17-abril-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n16-fevereiro-2024</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n15-dezembro-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n14-outubro-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n13-agosto-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n12-junho-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n11-abril-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n10-fevereiro-2023</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n9-dezembro-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n8-outubro-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n7-agosto-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n6-junho-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n5-abril-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n4-fevereiro-2022</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n3-dezembro-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n2-setembro-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
	<url>
		<loc>https://www.itsecurity.pt/edicoes/it-security-n1-junho-2021</loc>
		<changefreq>weekly</changefreq>
		<priority>0.8</priority>
	</url>
</urlset>
