<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://cybersecurity-info.com/csi-ttm/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='2026年4月27日 8:32 PM' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://cybersecurity-info.com/news/increase-in-cyber-attacks-targeting-ai/</loc>
		<lastmod>2024-03-12T02:31:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/lost-usb-memory-niigata-prefectural-industrial-technology-research-institute/</loc>
		<lastmod>2024-03-12T02:34:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/15-year-old-boy-fraudulently-manipulates-academic-organizations-server/</loc>
		<lastmod>2024-03-13T01:26:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kagoshima-prefectural-police-information-leak/</loc>
		<lastmod>2024-03-13T01:28:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/fuefuki-city-chamber-of-commerce-and-industry-unauthorized-access/</loc>
		<lastmod>2024-03-14T01:07:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/uda-city-employee-illegally-logged-into-the-agency-system/</loc>
		<lastmod>2024-03-14T01:08:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kinki-nippon-railway-erroneous-email-sent/</loc>
		<lastmod>2024-03-15T00:31:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/personal-information-of-all-84-students-in-shinkansen-seat-pockets-lost/</loc>
		<lastmod>2024-03-15T00:33:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/8%e5%b9%b4%e3%81%b6%e3%82%8aowasp-mobile-top-10%e3%81%a8%e5%88%9d%e3%81%aeiot%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%83%86%e3%82%b9%e3%83%88%e3%82%ac%e3%82%a4%e3%83%89/</loc>
		<lastmod>2024-03-15T05:49:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e3%83%95%e3%82%a3%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0%e3%80%81%e4%b8%8d%e6%ad%a3%e9%80%81%e9%87%91%e3%80%81%e3%82%af%e3%83%ac%e3%82%ab%e4%b8%8d%e6%ad%a3%e5%88%a9%e7%94%a8%e3%81%8c%e9%81%8e%e5%8e%bb/</loc>
		<lastmod>2024-03-18T00:40:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/fujitsu-malware-infection/</loc>
		<lastmod>2024-03-18T01:05:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/aichi-rikuun-ransomware/</loc>
		<lastmod>2024-03-18T01:06:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-e-motorsports-organization-information-leak/</loc>
		<lastmod>2024-03-19T00:46:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shimoda-city-personal-information-use-election-activities/</loc>
		<lastmod>2024-03-19T00:48:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ridenow-unauthorized-access/</loc>
		<lastmod>2024-03-21T00:27:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tv-niigata-broadcasting-network-ransomware-damage/</loc>
		<lastmod>2024-03-21T00:28:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/number-of-job-openings-for-security-personnel-24-3-times/</loc>
		<lastmod>2024-03-22T00:17:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/survey-results-regarding-phishing-and-fraudulent-sites/</loc>
		<lastmod>2024-03-22T00:18:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/jra-unauthorized-access/</loc>
		<lastmod>2024-03-25T01:17:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/national-health-insurance-association-information-leak/</loc>
		<lastmod>2024-03-25T01:13:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e5%80%8b%e4%ba%ba%e6%83%85%e5%a0%b1%e4%bf%9d%e8%ad%b7%e5%a7%94%e5%93%a1%e4%bc%9a%e3%81%8c%e3%82%a8%e3%83%a0%e3%82%b1%e3%82%a4%e3%82%b7%e3%82%b9%e3%83%86%e3%83%a0%e3%82%92%e6%8c%87%e5%b0%8e%e3%80%81/</loc>
		<lastmod>2024-03-25T14:33:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/damages-amounted-to-40-19-billion-yen-and-5578-cases-of-fraudulent-remittances-occurred-both-record-highs/</loc>
		<lastmod>2024-03-26T01:03:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-chamber-of-commerce-and-industry-ransomware/</loc>
		<lastmod>2024-03-26T01:05:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/successful-hacking-takes-an-average-of-62-minutes-cyber-attacks-targeting-the-cloud-increase-by-110/</loc>
		<lastmod>2024-03-27T01:43:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nexco-usb-lost/</loc>
		<lastmod>2024-03-27T01:44:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%82%b3%e3%83%b3%e3%83%86%e3%82%b9%e3%83%88%e5%bf%9c%e5%8b%9f%e8%80%85%e3%81%ae%e3%83%87%e3%83%bc%e3%82%bf%e3%81%8c%e7%aa%83%e5%8f%96%e3%81%95%e3%82%8c%e5%80%8b%e4%ba%ba%e3%81%ab%e9%87%91%e9%8a%ad/</loc>
		<lastmod>2024-03-27T14:57:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/jvc-kenwood-unauthorized-access/</loc>
		<lastmod>2024-03-28T01:45:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sakuho-town-hall-usb-lost/</loc>
		<lastmod>2024-03-28T01:47:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/first-responders-immediate-response-measures-from-ransomware-attacks/</loc>
		<lastmod>2024-03-29T01:05:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kanto-regional-esd-activity-support-center-unauthorized-access/</loc>
		<lastmod>2024-03-29T01:06:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e3%83%9e%e3%82%a4%e3%83%8a%e3%83%b3%e3%83%90%e3%83%bc%e3%82%ab%e3%83%bc%e3%83%89%e3%82%84%e5%85%8d%e8%a8%b1%e8%a8%bc%e3%81%ae%e3%83%87%e3%83%bc%e3%82%bf%e3%81%aa%e3%81%a915%e4%b8%874650%e4%ba%ba/</loc>
		<lastmod>2024-03-30T02:17:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-growing-and-evolving-threat-of-web-application-attacks/</loc>
		<lastmod>2024-04-01T01:55:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/att-information-leak/</loc>
		<lastmod>2024-04-01T01:58:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/74-of-companies-do-not-investigate-data-leaks-even-after-receiving-ransomware/</loc>
		<lastmod>2024-04-02T01:42:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cress-tech-ransomware/</loc>
		<lastmod>2024-04-02T01:43:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kitakyushu-city-university-information-leak/</loc>
		<lastmod>2024-04-03T01:55:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/central-health-center-loses-baby-visit-records/</loc>
		<lastmod>2024-04-03T01:59:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/housing-performance-evaluation-center-unauthorized-access/</loc>
		<lastmod>2024-04-04T02:11:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hokkaido-shinkin-bank-employee-information-leak/</loc>
		<lastmod>2024-04-04T02:13:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/marukawa-miso-unauthorized-access/</loc>
		<lastmod>2024-04-05T02:16:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/waseda-sports-newspaper-association-virus-infection/</loc>
		<lastmod>2024-04-05T02:21:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hoya-unauthorized-access/</loc>
		<lastmod>2024-04-08T01:38:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/takatsuki-city-junior-high-school-lost-usb/</loc>
		<lastmod>2024-04-09T00:24:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nikkan-kogyo-shimbun-unauthorized-access/</loc>
		<lastmod>2024-04-09T00:23:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nissui-con-unauthorized-access/</loc>
		<lastmod>2024-04-09T00:25:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ochanomizu-university-unauthorized-access/</loc>
		<lastmod>2024-04-10T01:22:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/daito-bunka-university-unauthorized-access/</loc>
		<lastmod>2024-04-10T01:29:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/next-idol-grandprix-official-x-account-hijacking-damage/</loc>
		<lastmod>2024-04-11T01:47:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/civil-engineering-office-staff-theft-and-unauthorized-access-gifu-prefecture/</loc>
		<lastmod>2024-04-11T01:52:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/prudential-life-insurance-information-leak/</loc>
		<lastmod>2024-04-12T00:36:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/marine-net-cyber-attack/</loc>
		<lastmod>2024-04-12T00:32:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nippon-institute-of-technology-pc-lost/</loc>
		<lastmod>2024-04-15T02:21:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/osaka-prefectural-high-schools-personal-smartphone-lost/</loc>
		<lastmod>2024-04-15T02:29:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/number-of-reported-ransomware-attacks-on-japanese-corporations-is-the-highest-ever/</loc>
		<lastmod>2024-04-16T02:06:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ome-city-tokyo-erroneous-email-sent/</loc>
		<lastmod>2024-04-16T02:08:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-police-bureau-unified-counter-established/</loc>
		<lastmod>2024-04-17T00:46:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tondabayashi-hospital-suffers-from-support-fraud/</loc>
		<lastmod>2024-04-17T00:47:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/in-japan-malware-infections-are-on-the-rise-through-the-cloud/</loc>
		<lastmod>2024-04-18T01:20:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/my-job-card-information-leak/</loc>
		<lastmod>2024-04-18T01:20:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/expansion-of-threat-from-hacker-group-sandworm/</loc>
		<lastmod>2024-04-19T00:21:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kosaido-business-support-unauthorized-access/</loc>
		<lastmod>2024-04-19T00:22:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/log-files-sold-on-the-black-market-are-used-in-new-cyber-attacks/</loc>
		<lastmod>2024-04-21T23:38:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nippon-television-unauthorized-access-at-24-hour-charity-event/</loc>
		<lastmod>2024-04-21T23:41:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/takara-belmont-unauthorized-access/</loc>
		<lastmod>2024-04-23T01:09:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/otsuka-shokai-information-leak/</loc>
		<lastmod>2024-04-23T01:11:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ajiichi-haruka-nagomi-unauthorized-access/</loc>
		<lastmod>2024-04-24T01:04:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/yamaguchi-university-staff-student-information-leaked/</loc>
		<lastmod>2024-04-24T01:04:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-removal-of-confidential-information-is-more-than-double-that-of-the-previous-year-and-the-number-of-documents-lost-at-educational-institutions-is-increasing-year-by-year/</loc>
		<lastmod>2024-04-25T02:11:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/toei-uzumasa-eigamura-email-sent-incorrectly/</loc>
		<lastmod>2024-04-25T02:13:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/expedia-unauthorized-access/</loc>
		<lastmod>2024-04-26T01:42:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sega-group-unauthorized-access/</loc>
		<lastmod>2024-04-26T01:43:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/endless-ransomware-damage/</loc>
		<lastmod>2024-04-30T01:46:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kanagawa-prefecture-employee-illegal-gambling/</loc>
		<lastmod>2024-04-30T01:49:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/on-average-23-of-security-teams-are-women/</loc>
		<lastmod>2024-05-01T01:20:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/70-year-old-contractor-falls-victim-to-support-fraud-japan-agency-for-employment-support-for-elderly-disabled-and-job-seekers/</loc>
		<lastmod>2024-05-01T01:21:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/9-million-accesses-to-port-fraud-sites-annually/</loc>
		<lastmod>2024-05-02T02:17:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/new-japan-pro-wrestling-usb-memory-lost/</loc>
		<lastmod>2024-05-02T02:12:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/habataki-credit-union-information-leak/</loc>
		<lastmod>2024-05-06T19:48:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/trust-communications-support-scam/</loc>
		<lastmod>2024-05-06T19:49:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ff14-suffers-from-large-scale-ddos-attack/</loc>
		<lastmod>2024-05-08T01:46:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-attack-on-uk-ministry-of-defense-payroll-system/</loc>
		<lastmod>2024-05-08T01:47:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/miyazaki-electronics-ransomware/</loc>
		<lastmod>2024-05-09T01:58:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/toyoshima-co-ltd-ransomware/</loc>
		<lastmod>2024-05-09T01:58:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/psider-information-leak/</loc>
		<lastmod>2024-05-09T23:43:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/yao-city-funeral-hall-bribery/</loc>
		<lastmod>2024-05-09T23:47:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-and-extortion-increased-by-67/</loc>
		<lastmod>2024-05-13T02:18:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/supermarket-chain-izumi-suffers-from-ransomware/</loc>
		<lastmod>2024-05-13T02:20:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/korean-court-hacked-damage/</loc>
		<lastmod>2024-05-13T16:07:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/dell-victim-of-large-scale-cyber-attack/</loc>
		<lastmod>2024-05-13T16:07:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/matsui-sake-brewery-unauthorized-access/</loc>
		<lastmod>2024-05-15T01:10:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kindai-university-hospital-obstetrics-and-gynecology-double-information-leak/</loc>
		<lastmod>2024-05-15T01:11:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/25081/</loc>
		<lastmod>2025-12-09T03:52:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sega-group-unauthorized-access2/</loc>
		<lastmod>2024-05-16T01:15:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kishiwada-sports-unauthorized-access/</loc>
		<lastmod>2024-05-16T01:16:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/game-market-unauthorized-access/</loc>
		<lastmod>2024-05-16T23:55:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/biophilia-unauthorized-access/</loc>
		<lastmod>2024-05-16T23:55:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-globeold-friend-unauthorized-access/</loc>
		<lastmod>2024-05-20T00:56:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/saitama-prefecture-health-promotion-corporation-unauthorized-access/</loc>
		<lastmod>2024-05-20T00:57:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/fofo-unauthorized-access/</loc>
		<lastmod>2024-05-21T00:56:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hanshin-tigers-information-leak/</loc>
		<lastmod>2024-05-21T00:57:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/jf-zengyoren-victim-of-unauthorized-access/</loc>
		<lastmod>2024-05-22T01:29:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nisc-and-national-police-agency-jointly-sign-international-security-guidance/</loc>
		<lastmod>2024-05-22T01:30:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/gunma-university-hospital-personal-information-youtube/</loc>
		<lastmod>2024-05-23T00:39:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/baytle-unauthorized-access/</loc>
		<lastmod>2024-05-23T00:40:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nict-information-leak/</loc>
		<lastmod>2024-05-24T01:29:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/okayama-prefectural-psychiatric-medical-center-ransomware/</loc>
		<lastmod>2024-05-24T02:02:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/survey-on-email-security-efforts/</loc>
		<lastmod>2024-05-27T02:26:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sekisui-house-cyber-attack-damage/</loc>
		<lastmod>2024-05-27T02:27:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nagasaki-prefecture-products-promotion-association-unauthorized-access/</loc>
		<lastmod>2024-05-28T03:28:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hokushu-unauthorized-access/</loc>
		<lastmod>2024-05-28T03:29:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/alert-about-new-ransomware-shrinklocker/</loc>
		<lastmod>2024-05-28T16:15:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sendai-city-hospital-information-leak/</loc>
		<lastmod>2024-05-28T16:19:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ise-shoyu-honpo-unauthorized-access/</loc>
		<lastmod>2024-05-30T01:41:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shinzone-cloud-misconfiguration/</loc>
		<lastmod>2024-05-30T01:42:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/aioi-nissay-dowa-insurance-information-leak/</loc>
		<lastmod>2024-05-31T02:17:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/akita-prefectural-board-of-education-information-leak/</loc>
		<lastmod>2024-05-31T02:20:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-threat-trends-research-report/</loc>
		<lastmod>2024-06-03T01:44:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tullys-online-store-unauthorized-access/</loc>
		<lastmod>2024-06-03T01:49:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/university-of-tsukuba-email-address-mistyped/</loc>
		<lastmod>2024-06-04T01:55:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ageo-city-saitama-prefecture-administrative-system-tampering/</loc>
		<lastmod>2024-06-04T01:57:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kumatori-town-school-information-leak/</loc>
		<lastmod>2024-06-05T01:43:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sanin-godo-bank-infected-with-virus/</loc>
		<lastmod>2024-06-05T01:44:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/dmm-bitcoin-leak/</loc>
		<lastmod>2024-06-06T00:38:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/aizawa-asset-management-unauthorized-access/</loc>
		<lastmod>2024-06-06T00:39:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/25376/</loc>
		<lastmod>2025-01-28T08:28:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/25206/</loc>
		<lastmod>2026-01-15T05:39:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/iseto-ransomware/</loc>
		<lastmod>2024-06-07T00:23:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tresente-website-hijacked/</loc>
		<lastmod>2024-06-07T00:24:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kyuhen-ransomware-victim/</loc>
		<lastmod>2024-06-10T00:50:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/koganei-city-high-school-teams-setting-error/</loc>
		<lastmod>2024-06-10T00:51:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/midori-company-unauthorized-access/</loc>
		<lastmod>2024-06-11T00:48:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/yamaguchi-prefecture-credit-guarantee-association-unauthorized-access/</loc>
		<lastmod>2024-06-11T00:50:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/next-level-unauthorized-access/</loc>
		<lastmod>2024-06-12T00:50:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/osaka-city-health-bureau-information-leak/</loc>
		<lastmod>2024-06-12T00:52:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ciso-awareness-survey-report/</loc>
		<lastmod>2024-06-13T00:52:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/workport-unauthorized-access/</loc>
		<lastmod>2024-06-13T00:52:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nikkei-bp-unauthorized-access/</loc>
		<lastmod>2024-06-14T01:39:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/police-mutual-aid-association-employee-personal-information-trading/</loc>
		<lastmod>2024-06-14T01:39:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/bandai-spirits-information-leak/</loc>
		<lastmod>2024-06-17T00:22:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kyorin-university-unauthorized-access/</loc>
		<lastmod>2024-06-17T00:22:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-probability-of-falling-victim-to-a-phishing-scam-is-34-3-phishing-mock-test/</loc>
		<lastmod>2024-06-18T01:14:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/dwango-niconico-ransomware/</loc>
		<lastmod>2024-06-18T01:15:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nagoya-university-hospital-sns-information-leak/</loc>
		<lastmod>2024-06-19T01:00:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mie-prefectural-cultural-promotion-foundation-unauthorized-access/</loc>
		<lastmod>2024-06-19T01:02:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/osaka-shochikuza-information-leak/</loc>
		<lastmod>2024-06-20T00:50:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/alpha-uni-official-shop-unauthorized-access/</loc>
		<lastmod>2024-06-20T00:52:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/comprehensive-measures-to-protect-the-public-from-fraud-announced/</loc>
		<lastmod>2024-06-20T23:19:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/academia-music-unauthorized-access/</loc>
		<lastmod>2024-06-20T23:20:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/morinaga-co-unauthorized-access/</loc>
		<lastmod>2024-06-24T00:37:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shirasaki-corporation-ransomware/</loc>
		<lastmod>2024-06-24T00:38:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/gintoki-website-unauthorized-access/</loc>
		<lastmod>2024-06-25T00:53:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nikko-city-information-leak-due-to-email-erroneous-sending/</loc>
		<lastmod>2024-06-25T00:54:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/approximately-87-million-passwords-can-be-cracked-in-less-than-a-minute/</loc>
		<lastmod>2024-06-26T00:42:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nagano-prefecture-high-school-personal-information-leak/</loc>
		<lastmod>2024-06-26T00:44:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/25658/</loc>
		<lastmod>2025-10-09T01:07:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/student-information-lost-from-elementary-school-in-shinagawa-ward/</loc>
		<lastmod>2024-06-27T00:33:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mitsubishi-ufj-alternative-investments-spam-email-victim/</loc>
		<lastmod>2024-06-27T00:35:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/39-4-of-companies-outsource-the-handling-of-user-data/</loc>
		<lastmod>2024-06-28T01:03:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-hokkaido-direct-delivery-center/</loc>
		<lastmod>2024-06-28T01:03:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hiroshima-prefecture-sponsored-seminar-unauthorized-access/</loc>
		<lastmod>2024-07-01T01:10:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/gifu-pharmaceutical-university-information-leak/</loc>
		<lastmod>2024-07-01T01:11:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kubota-credit-ransomware/</loc>
		<lastmod>2024-07-02T02:09:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/takano-sogo-group-ransomware/</loc>
		<lastmod>2024-07-02T02:12:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/taiyo-kogyo-cyber-attack/</loc>
		<lastmod>2024-07-03T01:14:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/eto-hospital-website-tampering/</loc>
		<lastmod>2024-07-03T01:15:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sophia-university-email-sent-to-the-wrong-address/</loc>
		<lastmod>2024-07-04T02:12:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/beware-of-fake-national-police-agency-websites/</loc>
		<lastmod>2024-07-04T02:13:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/healthcare-organizations-experience-1613-cyberattacks-per-week/</loc>
		<lastmod>2024-07-05T01:56:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kokubu-shokai-unauthorized-access/</loc>
		<lastmod>2024-07-05T01:57:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hags-unauthorized-access/</loc>
		<lastmod>2024-07-08T01:17:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/brave-group-information-leak/</loc>
		<lastmod>2024-07-08T01:25:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kobe-central-post-office-lost/</loc>
		<lastmod>2024-07-09T02:04:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/j-max-unauthorized-access/</loc>
		<lastmod>2024-07-09T02:04:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unitech-foods-unauthorized-access/</loc>
		<lastmod>2024-07-10T01:29:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/information-leaked-about-autonomous-driving-ai-challenge-event/</loc>
		<lastmod>2024-07-10T01:30:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokio-marine-nichido-ransomware/</loc>
		<lastmod>2024-07-11T01:52:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/real-estate-exam-information-leak/</loc>
		<lastmod>2024-07-11T01:53:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sd-card-containing-personal-information-of-students-and-parents-lost-at-saitama-prefectural-school/</loc>
		<lastmod>2024-07-12T01:06:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokyo-work-foundation-email-sent-to-erroneous-address/</loc>
		<lastmod>2024-07-12T01:07:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mint-kobe-information-leak/</loc>
		<lastmod>2024-07-16T00:00:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/rasa-industries-information-leak/</loc>
		<lastmod>2024-07-16T00:01:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/origin-toshu-information-leak/</loc>
		<lastmod>2024-07-17T00:52:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shin-nippon-pharmaceutical-ransomware/</loc>
		<lastmod>2024-07-17T00:52:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokyo-gas-unauthorized-access/</loc>
		<lastmod>2024-07-18T01:05:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sophia-university-email-system-configuration-error/</loc>
		<lastmod>2024-07-18T01:06:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/olive-beef-higashihara-unauthorized-access/</loc>
		<lastmod>2024-07-19T01:08:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/alps-alpine-ransomware-infection/</loc>
		<lastmod>2024-07-19T01:09:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sumitomo-heavy-industries-unauthorized-access/</loc>
		<lastmod>2024-07-22T00:20:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/june-2024-number-of-phishing-reports/</loc>
		<lastmod>2024-07-22T00:25:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shueisha-information-leak/</loc>
		<lastmod>2024-07-23T00:36:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/suumo-unauthorized-access/</loc>
		<lastmod>2024-07-23T00:37:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kumamoto-city-waterworks-bureau-unauthorized-access/</loc>
		<lastmod>2024-07-24T01:06:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-attacks-in-the-education-and-research-sectors-increased-53-year-on-year/</loc>
		<lastmod>2024-07-24T01:08:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/officials-warn-of-fake-x-accounts-at-the-osaka-kansai-expo/</loc>
		<lastmod>2024-07-25T00:43:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cocoro-store-unauthorized-access/</loc>
		<lastmod>2024-07-25T00:44:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sanyo-shokai-unauthorized-access/</loc>
		<lastmod>2024-07-26T00:57:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/alexion-pharma-cyber-attack/</loc>
		<lastmod>2024-07-26T01:02:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/microsoft-is-by-far-the-most-used-for-phishing-at-57/</loc>
		<lastmod>2024-07-29T01:13:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/asahi-broadcasting-television-interviewed-the-company-and-past-manuscripts-and-other-materials-were-lost/</loc>
		<lastmod>2024-07-29T01:11:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/chiba-bank-dispatch-employee-information-leak/</loc>
		<lastmod>2024-07-30T02:20:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/seeks-ransomware-infection/</loc>
		<lastmod>2024-07-30T02:21:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-setouchi-onsen-tamanoyu/</loc>
		<lastmod>2024-07-31T02:58:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shiga-labor-bureau-support-scam/</loc>
		<lastmod>2024-07-31T03:04:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/komai-haltec-unauthorized-access/</loc>
		<lastmod>2024-08-01T01:18:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hokuriku-bank-customer-information-lost/</loc>
		<lastmod>2024-08-01T01:19:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokyo-tamago-unauthorized-access/</loc>
		<lastmod>2024-08-01T23:29:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/taiyo-shoji-unauthorized-access/</loc>
		<lastmod>2024-08-01T23:30:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/aika-unauthorized-access/</loc>
		<lastmod>2024-08-05T01:45:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-threat-of-spyware-mandrake/</loc>
		<lastmod>2024-08-05T01:46:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/security-during-the-obon-holiday-period-2024/</loc>
		<lastmod>2024-08-06T01:36:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/natsume-office-ransomware/</loc>
		<lastmod>2024-08-06T01:38:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%80%90%e5%8e%b3%e9%81%b8%e3%80%91%e3%81%8a%e3%81%99%e3%81%99%e3%82%81%e3%83%87%e3%83%bc%e3%82%bf%e5%be%a9%e6%97%a7%e6%a5%ad%e8%80%85%ef%bd%9chdd%ef%bd%a5pc%ef%bd%a5ssd%ef%bd%a5sd%e3%82%ab%e3%83%bc/</loc>
		<lastmod>2024-08-06T01:42:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mitsubishi-electric-home-appliances-unauthorized-access/</loc>
		<lastmod>2024-08-07T01:13:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/iwate-bank-information-leak/</loc>
		<lastmod>2024-08-07T01:12:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/it-is-not-enough-but-we-have-not-been-able-to-take-any-measures-22-1-survey-on-corporate-security-status/</loc>
		<lastmod>2024-08-08T01:31:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hina-turn-miyazaki-is-a-victim-of-falsification/</loc>
		<lastmod>2024-08-08T01:33:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tomoe-shokai-unauthorized-access/</loc>
		<lastmod>2024-08-09T00:39:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/aged-yakiniku-ichiban-unauthorized-access/</loc>
		<lastmod>2024-08-09T00:42:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kesennuma-city-hospital-information-leak/</loc>
		<lastmod>2024-08-13T01:28:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/asahi-culture-center-information-leak/</loc>
		<lastmod>2024-08-13T01:29:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/small-and-medium-sized-businesses-are-the-most-likely-to-be-infected-with-malware-at-26-there-are-also-cases-where-the-damage-is-unaware/</loc>
		<lastmod>2024-08-14T02:32:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokyu-livable-former-employee-information-taken-out/</loc>
		<lastmod>2024-08-14T02:33:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/oiles-corporation-unauthorized-access/</loc>
		<lastmod>2024-08-15T02:29:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hanaya-yohei-unauthorized-access/</loc>
		<lastmod>2024-08-15T02:31:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokio-marine-nichido-fire-insurance-information-leak/</loc>
		<lastmod>2024-08-16T01:56:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/dai-ichi-life-insurance-information-leak/</loc>
		<lastmod>2024-08-16T01:56:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kakaopay-information-leak/</loc>
		<lastmod>2024-08-19T02:48:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/forest-resource-information-information-leak/</loc>
		<lastmod>2024-08-19T02:51:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/jf-all-japan-fisheries-association-information-leak/</loc>
		<lastmod>2024-08-20T01:54:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/approximately-68-businesses-fall-victim-to-ransomware-every-week/</loc>
		<lastmod>2024-08-20T01:56:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/e431-ransomware/</loc>
		<lastmod>2024-08-21T02:44:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/yamaguchi-prefecture-credit-guarantee-association-unauthorized-access-2/</loc>
		<lastmod>2024-08-21T02:54:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-number-of-phishing-reports-reached-a-record-high-of-177855/</loc>
		<lastmod>2024-08-22T00:44:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hyogo-college-of-medicine-information-leak/</loc>
		<lastmod>2024-08-22T00:45:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/plan-international-ransomware-victim/</loc>
		<lastmod>2024-08-23T03:39:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/former-elementary-school-teacher-in-urayasu-city-unauthorised-access/</loc>
		<lastmod>2024-08-23T03:40:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/new-ransomware-qilin/</loc>
		<lastmod>2024-08-26T02:07:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/all-sports-community-credit-card-fraud/</loc>
		<lastmod>2024-08-26T02:09:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/investment-services-unauthorized-access/</loc>
		<lastmod>2024-08-27T01:06:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kowa-manufacturing-ransomware/</loc>
		<lastmod>2024-08-27T01:08:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/himi-city-information-leak/</loc>
		<lastmod>2024-08-28T01:20:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/omiya-public-employment-security-office-information-leak/</loc>
		<lastmod>2024-08-28T01:20:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/wittamail-unauthorized-access/</loc>
		<lastmod>2024-08-29T00:39:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/visual-arts-center-unauthorized-access/</loc>
		<lastmod>2024-08-29T00:40:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/oita-university-library-server-tampering/</loc>
		<lastmod>2024-08-30T01:11:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/disability-rights-advocacy-center-information-leak/</loc>
		<lastmod>2024-08-30T01:13:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sanofi-unauthorized-access/</loc>
		<lastmod>2024-09-02T01:24:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/byovd-research-report/</loc>
		<lastmod>2024-09-02T01:24:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/toko-foods-unauthorized-access/</loc>
		<lastmod>2024-09-03T01:59:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/makuake-information-leak/</loc>
		<lastmod>2024-09-03T02:00:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nissan-e-sharemobi-information-leak/</loc>
		<lastmod>2024-09-04T00:43:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shizuoka-tokai-securities-co-ltd-information-leak/</loc>
		<lastmod>2024-09-04T00:44:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/pharma-foods-information-leak/</loc>
		<lastmod>2024-09-04T21:01:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hiroike-gakuen-ransomware/</loc>
		<lastmod>2024-09-04T21:02:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/golf-digest-unauthorized-login/</loc>
		<lastmod>2024-09-05T22:53:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nichii-group-ransomware/</loc>
		<lastmod>2024-09-05T22:59:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cost-of-data-breach-report/</loc>
		<lastmod>2024-09-09T00:46:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kubota-health-insurance-association-ransomware-victim/</loc>
		<lastmod>2024-09-09T00:47:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/beware-of-the-sudden-increase-in-ransomware-infections-via-vpns-and-remote-desktops/</loc>
		<lastmod>2024-09-10T01:12:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kitakyushu-city-information-leak-for-about-three-years/</loc>
		<lastmod>2024-09-10T01:13:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nippon-life-insurance-company-leaks-personal-information-of-over-100000-customers/</loc>
		<lastmod>2024-09-11T01:23:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/skiyaki-information-leak/</loc>
		<lastmod>2024-09-11T01:24:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tohoku-electric-power-group-employee-misuses-customer-information/</loc>
		<lastmod>2024-09-12T01:04:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/fukui-electric-ransomware-damage/</loc>
		<lastmod>2024-09-12T01:05:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/fukuoka-international-marathon-2024-information-leak/</loc>
		<lastmod>2024-09-13T00:44:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/system-square-victim-of-cyber-attack/</loc>
		<lastmod>2024-09-13T00:46:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/approximately-60-of-japanese-companies-have-experienced-security-incidents-more-than-10-times/</loc>
		<lastmod>2024-09-17T01:45:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/avenue-falls-victim-to-ransomware/</loc>
		<lastmod>2024-09-17T01:46:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ihi-transport-machinery-unauthorized-access/</loc>
		<lastmod>2024-09-18T00:32:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/toyota-home-customer-information-theft/</loc>
		<lastmod>2024-09-18T00:32:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hulu-list-based-attack-2/</loc>
		<lastmod>2024-09-18T23:23:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/doda-information-leak/</loc>
		<lastmod>2024-09-18T23:25:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/gamba-osaka-ransomware/</loc>
		<lastmod>2024-09-20T01:26:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shochiku-ransomware/</loc>
		<lastmod>2024-09-20T01:28:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/job/p00031793/</loc>
		<lastmod>2024-11-12T01:29:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/phishing-attacks-increased-by-100000-cases-compared-to-last-year-with-ransomware-targeting-vpn-devices-also-at-a-high-level/</loc>
		<lastmod>2024-09-24T00:11:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kenbiya-unauthorized-access/</loc>
		<lastmod>2024-09-24T00:12:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shibayama-consultant-group-ransomware/</loc>
		<lastmod>2024-09-24T23:33:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/aso-city-family-registry-information-illegally-obtained/</loc>
		<lastmod>2024-09-24T23:36:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/public-sector-cyber-attacks-average-1514-per-week/</loc>
		<lastmod>2024-09-26T00:44:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/taiki-life-insurance-company-cyber-attack/</loc>
		<lastmod>2024-09-26T00:45:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ricoh-ransomware/</loc>
		<lastmod>2024-09-27T02:01:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-door-of-the-hotel-where-the-guest-stayed-was-broken-and-information-was-leaked/</loc>
		<lastmod>2024-09-27T02:01:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/job/security-engineer-csirt/</loc>
		<lastmod>2024-11-12T01:29:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/total-number-of-security-incidents-was-551-website-tampering-and-unauthorized-access-to-shopping-sites-occurred-frequently/</loc>
		<lastmod>2024-09-30T01:58:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hanwa-ransomware/</loc>
		<lastmod>2024-09-30T01:59:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/muromachi-clinic-unauthorized-information-removal/</loc>
		<lastmod>2024-10-01T00:44:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/childcare-worker-returns-book-to-library-with-personal-information-inside-leaking-information/</loc>
		<lastmod>2024-10-01T00:45:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-at-shinshu-university/</loc>
		<lastmod>2024-10-02T01:16:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/choya-ransomware/</loc>
		<lastmod>2024-10-02T01:17:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/jtekt-ransomware/</loc>
		<lastmod>2024-10-03T01:40:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/national-institute-for-environmental-studies-ransomware/</loc>
		<lastmod>2024-10-03T01:41:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tullys-coffee-unauthorized-access/</loc>
		<lastmod>2024-10-03T23:31:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/magical-juke-box-unauthorized-access/</loc>
		<lastmod>2024-10-03T23:36:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/26962/</loc>
		<lastmod>2026-04-14T09:27:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/26975/</loc>
		<lastmod>2025-01-28T04:49:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/26985/</loc>
		<lastmod>2025-08-20T01:02:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/26994/</loc>
		<lastmod>2025-12-24T03:23:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tdk-unauthorized-data-theft/</loc>
		<lastmod>2024-10-07T01:11:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ikaruga-town-ransomware-damage/</loc>
		<lastmod>2024-10-07T01:12:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27018/</loc>
		<lastmod>2025-07-04T04:34:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27025/</loc>
		<lastmod>2025-12-18T07:30:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27032/</loc>
		<lastmod>2025-01-28T04:50:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27041/</loc>
		<lastmod>2025-07-11T06:32:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%83%95%e3%82%a3%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0%e3%83%a1%e3%83%bc%e3%83%ab%e3%81%ab%e3%81%a9%e3%81%86%e5%af%be%e5%87%a6%e3%81%99%e3%81%b9%e3%81%8d%e3%81%8b-%e3%83%a1%e3%83%bc%e3%83%ab%e3%83%9c/</loc>
		<lastmod>2024-10-07T15:14:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/bell-data-ransomware-victim/</loc>
		<lastmod>2024-10-07T23:41:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/like-kids-ransomware-victim/</loc>
		<lastmod>2024-10-07T23:41:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27046/</loc>
		<lastmod>2025-03-10T07:58:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/casio-unauthorized-access-2/</loc>
		<lastmod>2024-10-09T01:01:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/fuchu-town-hall-loss-of-personal-information/</loc>
		<lastmod>2024-10-09T01:03:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/aeon-card-apologizes-for-slow-response-phishing-fraud-victim-accounts-amounting-to-nearly-300000-yen/</loc>
		<lastmod>2024-10-09T23:51:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-radio-phishing-victim/</loc>
		<lastmod>2024-10-09T23:43:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/j-institute-unauthorized-access/</loc>
		<lastmod>2024-10-11T00:47:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/only-19-of-respondents-said-they-had-adequately-considered-security-measures/</loc>
		<lastmod>2024-10-11T00:48:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e6%97%a5%e6%9c%ac%e3%81%ae%e7%b5%84%e7%b9%94%e3%82%92%e7%8b%99%e3%81%a3%e3%81%9f%e3%82%ad%e3%83%a0%e3%82%b9%e3%82%ad%e3%83%bc%e3%81%ae%e6%94%bb%e6%92%83%e3%81%8c%e7%a2%ba%e8%aa%8d%e3%81%95%e3%82%8c/</loc>
		<lastmod>2024-10-13T05:52:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/development-data-for-unreleased-pokemon-next-generation-game-consoles-etc-hacked/</loc>
		<lastmod>2024-10-14T23:59:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-the-otsuka-toshimi-scholarship-foundation/</loc>
		<lastmod>2024-10-14T23:59:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/internet-archive-cyber-attack/</loc>
		<lastmod>2024-10-16T00:32:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kanagawa-prefecture-sewerage-public-corporation-black-suit-virus-infection/</loc>
		<lastmod>2024-10-16T00:34:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/saizeriya-cyber-attack/</loc>
		<lastmod>2024-10-16T23:19:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-ranked-3rd-in-ransomware-targeting-with-ransom-amount-reaching-a-record-high-of-11-25-billion-yen/</loc>
		<lastmod>2024-10-16T23:20:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/security-measures-ahead-of-windows-10s-end-of-life-in-2025-beware-of-ransomware-and-unknown-vulnerability-risks/</loc>
		<lastmod>2024-10-18T00:33:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nissin-pharma-credit-master-damage/</loc>
		<lastmod>2024-10-18T00:34:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/gatekeeper-training-course-application-screen-information-leaked-ebina-city/</loc>
		<lastmod>2024-10-21T00:35:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/information-leaked-at-okinawa-development-finance-corporation-seminar/</loc>
		<lastmod>2024-10-21T00:36:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/qr%e3%82%b3%e3%83%bc%e3%83%89%e3%81%a7%e5%81%bd%e8%a3%85%e3%82%b5%e3%82%a4%e3%83%88%e3%81%ab%e8%aa%98%e5%b0%8e%e3%80%81%e3%82%af%e3%82%a4%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0%e3%81%ae%e6%89%8b%e5%8f%a3/</loc>
		<lastmod>2024-10-21T04:51:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sending-acom-seconded-employee-and-bank-contract-information/</loc>
		<lastmod>2024-10-22T00:53:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nidek-precision-ransomware-victim/</loc>
		<lastmod>2024-10-22T00:54:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%83%95%e3%82%a3%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0%e3%83%a1%e3%83%bc%e3%83%ab%e3%81%ab%e3%81%a9%e3%81%86%e5%af%be%e5%87%a6%e3%81%99%e3%81%b9%e3%81%8d%e3%81%8b-%e4%b8%8d%e6%ad%a3%e3%82%a2%e3%82%af/</loc>
		<lastmod>2024-10-22T22:24:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-attacks-on-education-and-research-sectors-up-119-year-on-year-manufacturing-industry-a-prime-target-for-ransomware/</loc>
		<lastmod>2024-10-23T01:22:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nagasaki-cultural-broadcasting-information-leak/</loc>
		<lastmod>2024-10-23T01:20:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/burger-king-cyber-attack/</loc>
		<lastmod>2024-10-24T00:51:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/beware-of-fake-prime-ministers-office-website/</loc>
		<lastmod>2024-10-24T00:55:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e3%83%95%e3%82%a9%e3%83%bc%e3%83%86%e3%82%a3%e3%83%8d%e3%83%83%e3%83%88%e3%81%aefortimanager%e3%81%ab%e3%82%bc%e3%83%ad%e3%83%87%e3%82%a4%e8%84%86%e5%bc%b1%e6%80%a7%e3%80%80%e4%bb%8a%e5%b9%b46/</loc>
		<lastmod>2024-10-24T14:59:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kidzania-unauthorized-access/</loc>
		<lastmod>2024-10-25T01:54:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-sundai-tourism-foreign-language-business-college/</loc>
		<lastmod>2024-10-25T01:55:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kyoto-university-festival-unauthorized-access/</loc>
		<lastmod>2024-10-28T02:13:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-at-gakushuin-womens-college/</loc>
		<lastmod>2024-10-28T02:14:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/line%e3%83%93%e3%82%b8%e3%83%8d%e3%82%b9id%e3%80%81156%e4%bb%b6%e3%81%8c%e3%83%91%e3%82%b9%e3%83%af%e3%83%bc%e3%83%89%e3%83%aa%e3%82%b9%e3%83%88%e6%94%bb%e6%92%83%e3%81%a7%e4%b9%97%e3%81%a3%e5%8f%96/</loc>
		<lastmod>2024-10-29T01:24:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/slow-village-online-shop-unauthorized-access/</loc>
		<lastmod>2024-10-29T01:54:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shinozaki-transportation-unauthorized-access/</loc>
		<lastmod>2024-10-29T01:54:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/betsudai-kosan-ransomware/</loc>
		<lastmod>2024-10-30T02:04:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/akita-university-information-leak/</loc>
		<lastmod>2024-10-30T02:05:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27400/</loc>
		<lastmod>2025-01-28T04:52:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27401/</loc>
		<lastmod>2026-01-15T05:17:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27402/</loc>
		<lastmod>2025-09-23T08:36:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27403/</loc>
		<lastmod>2026-01-15T07:01:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27404/</loc>
		<lastmod>2025-01-28T08:47:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27405/</loc>
		<lastmod>2025-01-28T04:51:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27406/</loc>
		<lastmod>2025-01-28T04:51:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27407/</loc>
		<lastmod>2025-03-10T07:02:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27408/</loc>
		<lastmod>2025-01-28T04:51:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27410/</loc>
		<lastmod>2025-09-22T08:22:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27411/</loc>
		<lastmod>2025-09-22T08:24:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27412/</loc>
		<lastmod>2025-09-22T05:34:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kadokawa-ransomware-victim/</loc>
		<lastmod>2024-10-31T01:05:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/demae-kan-infected-with-malware/</loc>
		<lastmod>2024-10-31T01:07:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/earthkasha%e3%81%ae%e6%97%a5%e6%9c%ac%e3%82%92%e7%8b%99%e3%81%a3%e3%81%9f%e3%82%b9%e3%83%94%e3%82%a2%e3%83%95%e3%82%a3%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0%e6%94%bb%e6%92%83%e3%81%abanel%e3%83%90/</loc>
		<lastmod>2024-10-31T01:11:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ntt-and-waseda-university-collaborate-on-injection-attack-countermeasures/</loc>
		<lastmod>2024-11-01T01:59:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/karel-capek-unauthorized-access/</loc>
		<lastmod>2024-11-01T02:00:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sharp-unauthorized-access/</loc>
		<lastmod>2024-11-05T02:05:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/yanmar-unauthorized-access/</loc>
		<lastmod>2024-11-05T02:06:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shimogamo-saryo-unauthorized-access/</loc>
		<lastmod>2024-11-06T01:17:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/bellsystem24-unauthorized-access/</loc>
		<lastmod>2024-11-06T01:19:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/new-methods-of-international-telephone-fraud-and-phishing-scams/</loc>
		<lastmod>2024-11-07T02:39:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/oshi-no-ko-official-x-account-hijacked/</loc>
		<lastmod>2024-11-07T02:40:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e6%97%a5%e6%9c%ac%e3%82%82%e7%8b%99%e3%81%86%e3%83%95%e3%82%a3%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0%e6%94%bb%e6%92%83%e3%81%a7%e4%bd%bf%e3%82%8f%e3%82%8c%e3%81%a6%e3%81%84%e3%82%8b%e3%82%ad%e3%83%83/</loc>
		<lastmod>2024-11-07T15:30:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nearly-one-third-of-businesses-lose-data-to-ransomware-data-recovery-rate-hits-lowest-on-record-at-66-3/</loc>
		<lastmod>2024-11-08T01:01:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/yama-to-keikokusha-information-leak/</loc>
		<lastmod>2024-11-08T01:03:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tozai-philosophy-school-unauthorized-access/</loc>
		<lastmod>2024-11-11T01:16:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tohoku-gakuin-university-unauthorized-access/</loc>
		<lastmod>2024-11-11T01:16:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/welcia-pharmacy-information-leak/</loc>
		<lastmod>2024-11-12T01:05:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/toyota-mobility-tokyo-lost-usb-memory/</loc>
		<lastmod>2024-11-12T01:06:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/job/security-engineer-csirt-security/</loc>
		<lastmod>2025-05-01T05:58:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/job/security-engineer-csirt-networkse/</loc>
		<lastmod>2024-11-21T08:29:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/job/security-engineer-csirt-serverse/</loc>
		<lastmod>2024-11-21T08:27:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/job/security-engineer-csirt-presales/</loc>
		<lastmod>2024-11-21T08:26:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/job/security-engineer-csirt-marketing/</loc>
		<lastmod>2025-05-01T05:56:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/job/security-engineer-csirt-productmarketing/</loc>
		<lastmod>2025-05-01T05:55:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/job/security-engineer-csirt-productmanager/</loc>
		<lastmod>2025-05-01T05:54:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/job/security-engineer-csirt-productmanager2/</loc>
		<lastmod>2025-05-01T05:54:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%83%95%e3%82%a3%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0%e3%83%a1%e3%83%bc%e3%83%ab%e3%81%ab%e3%81%a9%e3%81%86%e5%af%be%e5%87%a6%e3%81%99%e3%81%b9%e3%81%8d%e3%81%8b%e3%80%80-%e5%a0%b1%e5%91%8a%e3%81%99/</loc>
		<lastmod>2024-11-12T22:59:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/police-memo-containing-personal-information-spreads-on-social-media/</loc>
		<lastmod>2024-11-13T02:14:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/club-tourism-unauthorized-access/</loc>
		<lastmod>2024-11-13T02:18:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-b-suidobashi-unauthorized-access/</loc>
		<lastmod>2024-11-14T01:40:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/warning-of-the-increase-in-mobile-malware-including-security-evasion-using-obfuscation-techniques-and-forced-display-of-advertisements/</loc>
		<lastmod>2024-11-14T01:41:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mog-unauthorized-access/</loc>
		<lastmod>2024-11-14T23:35:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ja-nanohana-information-leak/</loc>
		<lastmod>2024-11-14T23:36:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/television-saitama-unauthorized-access/</loc>
		<lastmod>2024-11-18T01:34:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/fukuoka-prefecture-employee-takes-disciplinary-action-for-leaking-information/</loc>
		<lastmod>2024-11-18T01:38:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hoshi-ransomware/</loc>
		<lastmod>2024-11-19T01:13:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/beware-of-new-cyberattack-methods-targeting-telegram-app/</loc>
		<lastmod>2024-11-19T01:14:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28056/</loc>
		<lastmod>2025-09-22T05:37:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e6%83%85%e5%a0%b1%e7%aa%83%e5%8f%96%e5%9e%8b%e3%81%ae%e3%83%9e%e3%83%ab%e3%82%a6%e3%82%a7%e3%82%a2%e3%81%8c%e6%80%a5%e5%a2%97%e3%80%81%e5%81%bd%e3%81%aecaptcha%e3%83%9a%e3%83%bc%e3%82%b8%e3%81%ab/</loc>
		<lastmod>2024-11-19T14:51:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-damage-to-manufacturing-industry-reaches-160-million-yen-up-88-from-the-previous-year-infection-rate-of-information-stealing-malware-increases-266/</loc>
		<lastmod>2024-11-19T22:47:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tezukayama-academy-unauthorized-access/</loc>
		<lastmod>2024-11-19T22:48:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-shopping-channel/</loc>
		<lastmod>2024-11-21T00:17:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/axis-consulting-data-illegally-taken-by-former-employee/</loc>
		<lastmod>2024-11-21T00:18:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tottori-prefectural-police-headquarters-cyber-contest/</loc>
		<lastmod>2024-11-22T01:44:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/current-status-of-email-mis-sent-cases-survey-report-released/</loc>
		<lastmod>2024-11-22T01:44:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cloudflare%e3%81%ab%e3%82%88%e3%82%8b%e8%aa%8d%e8%a8%bc%e3%81%b8%e8%aa%98%e5%b0%8e%e3%81%95%e3%82%8c%e3%82%8b%e4%b8%89%e4%ba%95%e4%bd%8f%e5%8f%8b%e3%82%ab%e3%83%bc%e3%83%89%e3%82%92%e5%81%bd%e8%a3%85/</loc>
		<lastmod>2024-11-24T03:40:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-most-secure-operating-system-on-the-planet-windows-11-delivers-next-generation-experience-with-new-security-announcements/</loc>
		<lastmod>2024-11-25T01:40:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokyo-metropolitan-police-department-to-hire-civilian-personnel-as-inspectors-for-the-first-time-to-combat-cybercrime/</loc>
		<lastmod>2024-11-25T01:41:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/yonex-wrist-attack/</loc>
		<lastmod>2024-11-26T02:01:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kodama-county-fire-department-unauthorized-login/</loc>
		<lastmod>2024-11-26T02:02:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/apt10%e3%81%a8%e3%81%ae%e9%96%a2%e4%bf%82%e3%81%8c%e6%8c%87%e6%91%98%e3%81%95%e3%82%8c%e3%82%8b2%e3%81%a4%e3%81%ae%e8%84%85%e5%a8%81%e3%82%b0%e3%83%ab%e3%83%bc%e3%83%97%e3%81%ae%e6%94%bb%e6%92%83/</loc>
		<lastmod>2024-11-26T02:41:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kumamoto-prefecture-anti-violence-movement-promotion-center-support-scam/</loc>
		<lastmod>2024-11-27T01:24:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/former-gifu-prefecture-employee-arrested-for-unauthorized-access-to-server-and-theft/</loc>
		<lastmod>2024-11-27T01:25:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-predicted-ai-vs-ai-security-war/</loc>
		<lastmod>2024-11-28T02:44:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-gintokis-official-online-store/</loc>
		<lastmod>2024-11-28T02:45:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/oisix-unauthorized-access/</loc>
		<lastmod>2024-11-29T01:36:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/minami-co-op-hospital-information-leak/</loc>
		<lastmod>2024-11-29T01:44:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e6%a4%9c%e6%8c%99%e3%81%95%e3%82%8c%e3%81%9f%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%83%bb%e3%83%95%e3%82%a9%e3%83%9c%e3%82%b9%e3%81%ae%e7%ae%a1%e7%90%86%e8%80%85%e3%80%80/</loc>
		<lastmod>2024-11-29T15:09:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/security-trends-in-2024-ransomware-generative-ai-and-other-unending-threats/</loc>
		<lastmod>2024-12-02T02:06:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/gaora-tampering-damage/</loc>
		<lastmod>2024-12-02T02:06:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kumamoto-green-agriculture-cyber-attack/</loc>
		<lastmod>2024-12-03T01:54:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/football-club-tokyo-information-leak/</loc>
		<lastmod>2024-12-03T01:55:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/like-kids-ransomware-victim-2/</loc>
		<lastmod>2024-12-04T02:35:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-6-most-troublesome-malware-of-2024/</loc>
		<lastmod>2024-12-04T02:32:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28448/</loc>
		<lastmod>2025-01-28T08:46:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28449/</loc>
		<lastmod>2025-01-28T08:35:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28450/</loc>
		<lastmod>2025-01-28T08:36:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28451/</loc>
		<lastmod>2025-01-28T08:30:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28453/</loc>
		<lastmod>2025-01-28T08:46:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28454/</loc>
		<lastmod>2025-09-23T08:20:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28455/</loc>
		<lastmod>2025-01-28T08:34:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28456/</loc>
		<lastmod>2025-01-28T08:36:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ntt-aos-data-and-ntt-at-launch-service-to-respond-to-cyber-attacks-and-internal-fraud/</loc>
		<lastmod>2024-12-05T02:00:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/request-a-ddos-attack-service-for-15000-yen/</loc>
		<lastmod>2024-12-05T02:05:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28445/</loc>
		<lastmod>2025-09-22T02:32:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/2023%e5%b9%b4%e3%81%ae%e8%84%86%e5%bc%b1%e6%80%a7%e3%80%80%e3%82%a8%e3%82%af%e3%82%b9%e3%83%97%e3%83%ad%e3%82%a4%e3%83%88%e3%81%be%e3%81%a7%e3%81%ae%e5%b9%b3%e5%9d%87%e6%99%82%e9%96%93tte%e3%81%8c5/</loc>
		<lastmod>2024-12-05T15:44:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mitsukoshi-isetan-list-based-attack/</loc>
		<lastmod>2024-12-06T01:48:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/zacros-ransomware/</loc>
		<lastmod>2024-12-06T01:49:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kanagawa-arts-and-culture-foundation-ransomware-victim/</loc>
		<lastmod>2024-12-09T01:34:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cerezo-osaka-information-leak/</loc>
		<lastmod>2024-12-09T01:32:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28651/</loc>
		<lastmod>2025-09-23T08:18:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28652/</loc>
		<lastmod>2025-09-23T08:15:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28653/</loc>
		<lastmod>2025-09-23T08:17:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/denis-japan-cyber-attack/</loc>
		<lastmod>2024-12-10T01:14:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/about-250-photos-of-kindergarten-children-missing-in-nagoya/</loc>
		<lastmod>2024-12-10T01:18:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28721/</loc>
		<lastmod>2024-12-10T03:56:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28723/</loc>
		<lastmod>2025-01-28T04:52:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28734/</loc>
		<lastmod>2025-01-28T08:47:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28741/</loc>
		<lastmod>2025-03-10T07:16:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28743/</loc>
		<lastmod>2025-09-23T08:08:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28749/</loc>
		<lastmod>2025-09-23T08:09:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28750/</loc>
		<lastmod>2025-09-23T08:10:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/saizeriya-ransomware-victim/</loc>
		<lastmod>2024-12-11T01:54:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-proportion-of-young-people-among-suspects-in-cases-of-violations-of-the-unauthorized-computer-access-prevention-act-is-increasing/</loc>
		<lastmod>2024-12-11T01:55:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-at-underwear-brand-sankei/</loc>
		<lastmod>2024-12-12T01:18:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kyoto-university-graduate-school-of-management-unauthorized-access/</loc>
		<lastmod>2024-12-12T01:19:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28719/</loc>
		<lastmod>2025-09-22T02:49:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e6%97%a5%e6%9c%ac%e6%94%bf%e5%ba%9c%e3%82%82%e8%b3%87%e9%87%91%e6%8f%90%e4%be%9b%e3%81%97%e3%81%a6%e3%81%84%e3%82%8b%e3%82%a4%e3%83%b3%e3%82%bf%e3%83%bc%e3%83%9d%e3%83%bc%e3%83%ab%e3%81%aethink-twice/</loc>
		<lastmod>2024-12-12T22:50:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/approximately-70-90-of-japanese-companies-have-experienced-cyber-attacks/</loc>
		<lastmod>2024-12-13T01:23:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/takatsuki-city-sends-list-of-personal-information-of-23-city-residents-to-outside-via-email/</loc>
		<lastmod>2024-12-13T01:23:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28908/</loc>
		<lastmod>2025-03-10T08:08:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/aizawa-asset-management-unauthorized-access-2/</loc>
		<lastmod>2024-12-16T02:01:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/keio-university-hospital-pc-theft/</loc>
		<lastmod>2024-12-16T01:58:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/14209/</loc>
		<lastmod>2025-04-30T05:59:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-leads-the-world-in-customer-support-fraud-victims-beware-of-increasingly-sophisticated-malware-scam-methods/</loc>
		<lastmod>2024-12-17T02:35:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/naniwa-pump-manufacturing-co-ltd-ransomware/</loc>
		<lastmod>2024-12-17T02:35:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28963/</loc>
		<lastmod>2025-09-22T05:29:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-at-itoen/</loc>
		<lastmod>2024-12-18T01:24:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/maruto-sangyo-ransomware/</loc>
		<lastmod>2024-12-18T01:25:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29053/</loc>
		<lastmod>2025-01-28T04:53:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29099/</loc>
		<lastmod>2025-01-28T08:43:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29116/</loc>
		<lastmod>2024-12-18T10:17:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/babuk%e3%81%ae%e5%a4%89%e7%a8%ae%e3%81%8b%e3%80%80%e6%96%b0%e3%81%9f%e3%81%aa%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0termite%e3%81%8c%e3%83%91%e3%82%bd%e3%83%8a%e5%ad%90%e4%bc%9a%e7%a4%beblue-yonder/</loc>
		<lastmod>2024-12-19T04:18:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/security-for-the-2024-holidays/</loc>
		<lastmod>2024-12-19T01:33:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/road-register-drawings-mistakenly-published-in-shizuoka-prefecture/</loc>
		<lastmod>2024-12-19T01:33:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japanese-executives-are-just-paying-lip-service-to-security-three-quarters-of-respondents-are-not-confident-in-their-security-measures/</loc>
		<lastmod>2024-12-20T02:03:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/onomichi-city-university-unauthorized-access/</loc>
		<lastmod>2024-12-20T02:05:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28768/</loc>
		<lastmod>2025-09-22T05:25:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28952/</loc>
		<lastmod>2025-09-22T05:28:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28896/</loc>
		<lastmod>2025-09-22T05:26:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-toa-university/</loc>
		<lastmod>2024-12-23T02:23:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/out-of-kidzania-in-koriyama-ransomware/</loc>
		<lastmod>2024-12-23T02:26:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/anycolor-beware-of-spoofing/</loc>
		<lastmod>2024-12-23T23:54:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/beer-engawa-unauthorized-access/</loc>
		<lastmod>2024-12-23T23:57:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29337/</loc>
		<lastmod>2026-01-09T03:02:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29347/</loc>
		<lastmod>2025-09-23T06:38:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mie-prefectural-school-groupware-configuration-error-information-leaked/</loc>
		<lastmod>2024-12-25T01:07:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/personal-information-of-1998-participants-in-tochigi-prefectures-marathon-was-leaked/</loc>
		<lastmod>2024-12-25T01:09:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29376/</loc>
		<lastmod>2025-09-23T06:37:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29379/</loc>
		<lastmod>2025-01-28T04:53:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29397/</loc>
		<lastmod>2026-01-15T07:41:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29404/</loc>
		<lastmod>2025-09-22T02:40:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29106/</loc>
		<lastmod>2025-09-22T05:23:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/28977/</loc>
		<lastmod>2025-10-08T06:47:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29421/</loc>
		<lastmod>2025-09-22T02:35:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29224/</loc>
		<lastmod>2025-09-22T04:10:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29014/</loc>
		<lastmod>2025-09-22T05:24:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29079/</loc>
		<lastmod>2025-09-22T04:14:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/dmm-bitcoin-business-goes-out-of-business-due-to-cyberattack-causing-fatal-damage-of-48-2-billion-yen/</loc>
		<lastmod>2024-12-26T00:59:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nisshinbo-suffers-from-unauthorized-access-due-to-stolen-authentication-information/</loc>
		<lastmod>2024-12-26T00:57:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29456/</loc>
		<lastmod>2025-09-22T02:31:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29469/</loc>
		<lastmod>2025-01-28T04:53:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29477/</loc>
		<lastmod>2025-01-28T04:53:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29491/</loc>
		<lastmod>2025-03-10T07:25:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29502/</loc>
		<lastmod>2025-09-08T06:36:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/jal-delayed-by-up-to-four-hours-due-to-cyber-attack-counters-also-crowded/</loc>
		<lastmod>2024-12-26T17:15:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mitsubishi-ufj-suffers-system-failure-due-to-cyber-attack/</loc>
		<lastmod>2024-12-26T17:17:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29548/</loc>
		<lastmod>2025-01-28T04:54:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29558/</loc>
		<lastmod>2025-01-28T08:40:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29566/</loc>
		<lastmod>2025-01-28T08:41:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29569/</loc>
		<lastmod>2024-12-27T06:38:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29572/</loc>
		<lastmod>2024-12-27T06:35:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29581/</loc>
		<lastmod>2025-01-28T08:44:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29587/</loc>
		<lastmod>2025-01-28T04:54:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29204/</loc>
		<lastmod>2025-09-22T04:00:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/dmm%e3%83%93%e3%83%83%e3%83%88%e3%82%b3%e3%82%a4%e3%83%b3%e3%81%8b%e3%82%89482%e5%84%84%e5%86%86%e7%9b%b8%e5%bd%93%e3%82%92%e5%a5%aa%e3%81%a3%e3%81%9f%e5%8c%97%e6%9c%9d%e9%ae%ae%e3%83%a9%e3%82%b6/</loc>
		<lastmod>2024-12-29T01:01:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29637/</loc>
		<lastmod>2025-09-24T01:22:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e5%9b%bd%e9%80%a3%e3%81%8c%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e7%8a%af%e7%bd%aa%e6%9d%a1%e7%b4%84%e3%82%92%e7%84%a1%e6%8a%95%e7%a5%a8%e3%81%a7%e6%8e%a1%e6%8a%9e%e3%80%802025%e5%b9%b4%e3%81%ab/</loc>
		<lastmod>2024-12-30T12:12:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e9%81%8e%e9%85%b7%e3%81%95%e5%a2%97%e3%81%99%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e7%92%b0%e5%a2%83%e3%80%802024%e5%b9%b4%e3%82%92%e6%8c%af%e3%82%8a%e8%bf%94%e3%82%8a2025%e5%b9%b4%e3%82%92%e5%b1%95/</loc>
		<lastmod>2024-12-31T08:45:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29420/</loc>
		<lastmod>2025-09-22T02:53:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ntt-docomo-cyber-attack/</loc>
		<lastmod>2025-01-06T03:27:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mizuho-bank-cyber-attack/</loc>
		<lastmod>2025-01-06T03:27:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29457/</loc>
		<lastmod>2025-09-23T08:23:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/techful-unauthorized-access/</loc>
		<lastmod>2025-01-07T02:25:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hiroshima-for-global-peace-unauthorized-access/</loc>
		<lastmod>2025-01-07T02:35:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-attack-in-ako-city-hyogo-prefecture/</loc>
		<lastmod>2025-01-08T00:26:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kyoei-foods-ransomware-attack/</loc>
		<lastmod>2025-01-08T00:29:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29846/</loc>
		<lastmod>2025-09-24T06:51:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29898/</loc>
		<lastmod>2025-09-24T06:53:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/29899/</loc>
		<lastmod>2025-09-18T05:07:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/casio-ransomware/</loc>
		<lastmod>2025-01-09T02:21:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/wise-wise-cyber-attack/</loc>
		<lastmod>2025-01-09T02:22:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/beware-of-chinese-hacker-group-mirrorface/</loc>
		<lastmod>2025-01-10T02:54:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nishitokyo-bus-email-sent-to-the-wrong-address/</loc>
		<lastmod>2025-01-10T02:55:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30106/</loc>
		<lastmod>2025-01-28T04:45:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30109/</loc>
		<lastmod>2025-01-28T04:46:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30117/</loc>
		<lastmod>2025-01-28T04:46:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30122/</loc>
		<lastmod>2025-01-28T08:45:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30125/</loc>
		<lastmod>2025-01-28T04:46:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30132/</loc>
		<lastmod>2025-01-28T08:44:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30136/</loc>
		<lastmod>2025-01-28T04:47:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30142/</loc>
		<lastmod>2025-01-28T04:46:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30147/</loc>
		<lastmod>2025-01-28T04:54:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30150/</loc>
		<lastmod>2025-01-28T04:54:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e3%83%90%e3%82%a4%e3%82%aa%e3%83%86%e3%82%af%e3%83%8e%e3%83%ad%e3%82%b8%e3%83%bc%e4%bc%81%e6%a5%ad%e3%81%ae%e3%83%a2%e3%83%80%e3%83%aa%e3%82%b9%e5%ad%90%e4%bc%9a%e7%a4%be%e3%81%8c%e3%83%93%e3%82%b8/</loc>
		<lastmod>2025-01-12T06:18:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/differences-in-security-awareness-between-management-and-it-staff/</loc>
		<lastmod>2025-01-14T00:44:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cookpad-instagram-takeover/</loc>
		<lastmod>2025-01-14T00:45:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/inuyama-city-elementary-schools-website-illegally-accessed/</loc>
		<lastmod>2025-01-14T23:23:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/asahi-tanker-ransomware-victim/</loc>
		<lastmod>2025-01-14T23:27:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30243/</loc>
		<lastmod>2025-09-23T08:33:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30218/</loc>
		<lastmod>2025-09-23T08:35:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/zippo-cyber-attack/</loc>
		<lastmod>2025-01-15T23:33:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/jgc-universal-cyber-attack/</loc>
		<lastmod>2025-01-15T23:34:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/2022%e5%b9%b4%e3%81%ab%e9%96%89%e9%8e%96%e3%81%97%e3%81%9f%e3%83%80%e3%83%bc%e3%82%af%e3%83%8d%e3%83%83%e3%83%88%e5%b8%82%e5%a0%b4%e3%80%8chydra%e3%80%8d%e3%81%ae%e5%89%b5%e8%a8%ad%e8%80%85%e3%81%ab/</loc>
		<lastmod>2025-01-16T00:29:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30268/</loc>
		<lastmod>2025-09-23T08:29:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30338/</loc>
		<lastmod>2025-10-08T03:31:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30342/</loc>
		<lastmod>2025-09-22T08:14:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30304/</loc>
		<lastmod>2025-09-23T08:26:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30317/</loc>
		<lastmod>2025-09-23T08:27:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30356/</loc>
		<lastmod>2025-09-22T08:19:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-school-was-bombed-ishikawa-prefecture-high-school-website-defaced/</loc>
		<lastmod>2025-01-17T00:05:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-teacher-folder-at-fukuoka-city-public-junior-high-school/</loc>
		<lastmod>2025-01-17T00:06:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30379/</loc>
		<lastmod>2025-09-23T06:47:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30390/</loc>
		<lastmod>2025-09-22T07:57:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30392/</loc>
		<lastmod>2025-09-23T06:19:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30396/</loc>
		<lastmod>2025-09-23T06:17:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30400/</loc>
		<lastmod>2025-09-23T08:05:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30403/</loc>
		<lastmod>2025-09-22T02:29:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30405/</loc>
		<lastmod>2025-09-23T08:07:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30407/</loc>
		<lastmod>2025-09-23T08:04:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30412/</loc>
		<lastmod>2025-09-18T05:05:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30418/</loc>
		<lastmod>2025-12-09T09:51:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30422/</loc>
		<lastmod>2025-09-24T01:16:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30427/</loc>
		<lastmod>2025-09-18T04:49:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39432/</loc>
		<lastmod>2025-09-18T05:24:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/microsoft365%e3%81%ae%e3%82%a2%e3%82%ab%e3%82%a6%e3%83%b3%e3%83%88%e3%82%92%e4%b9%97%e3%81%a3%e5%8f%96%e3%82%8baitm%e3%83%95%e3%82%a3%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0%e3%82%ad%e3%83%83%e3%83%88/</loc>
		<lastmod>2025-01-18T09:57:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e8%83%8c%e6%99%af%e3%81%ab%e3%80%8c%e8%b1%9a%e3%81%ae%e5%b1%a0%e6%ae%ba%e8%a9%90%e6%ac%ba%e3%80%8d%e7%8a%af%e7%bd%aa%e3%82%b0%e3%83%ab%e3%83%bc%e3%83%97-%e3%82%a2%e3%82%b8%e3%82%a2%e3%81%a7/</loc>
		<lastmod>2025-01-19T16:07:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/itoki-unauthorized-access/</loc>
		<lastmod>2025-01-20T01:21:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/postal-workers-take-photos-of-household-data-using-their-personal-smartphones/</loc>
		<lastmod>2025-01-20T01:23:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/2025-ransomware-attack-groups-become-more-decentralized-and-use-new-methods/</loc>
		<lastmod>2025-01-21T02:32:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/former-big-motor-information-leak/</loc>
		<lastmod>2025-01-21T02:32:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kaikatsu-club-unauthorized-access/</loc>
		<lastmod>2025-01-22T01:39:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tbeye-unauthorized-access/</loc>
		<lastmod>2025-01-22T01:39:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nagano-electric-railway-support-scam/</loc>
		<lastmod>2025-01-23T02:33:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sanrio-cyber-attack/</loc>
		<lastmod>2025-01-23T02:34:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/in-2024-the-personal-information-of-15-86-million-people-will-be-leaked-the-number-of-personal-information-leaks-and-losses-will-reach-a-new-record-high/</loc>
		<lastmod>2025-01-24T02:16:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mitsubishi-ufj-nicos-leaks-information-for-about-400000-people/</loc>
		<lastmod>2025-01-24T02:17:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e5%8c%97%e6%9c%9d%e9%ae%ae%e3%81%ae%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e8%84%85%e5%a8%81%e3%81%ab%e5%85%b1%e5%90%8c%e3%81%a7%e5%af%be%e6%8a%97%e3%80%80%e7%b1%b3%e6%97%a5%e9%9f%93%e3%81%8c%e5%a3%b0/</loc>
		<lastmod>2025-01-24T13:39:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/2025%e5%b9%b4%e3%81%ae%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%82%bd%e3%83%aa%e3%83%a5%e3%83%bc%e3%82%b7%e3%83%a7%e3%83%b3%e3%82%92%e9%81%b8/</loc>
		<lastmod>2025-01-26T12:13:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/decision-made-to-suspend-the-granting-of-privacy-marks-to-companies-affected-by-ransomware-jipdec/</loc>
		<lastmod>2025-01-27T02:49:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/iwate-asahi-television-hit-by-ransomware/</loc>
		<lastmod>2025-01-27T02:50:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30578/</loc>
		<lastmod>2025-01-27T08:53:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/120000-customer-records-leaked-at-hands/</loc>
		<lastmod>2025-01-28T02:43:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/deepseek-cyber-attack/</loc>
		<lastmod>2025-01-28T02:47:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e3%83%95%e3%82%a3%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0%e3%83%a1%e3%83%bc%e3%83%ab%e3%80%81%e3%83%95%e3%82%a3%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0%e3%82%b5%e3%82%a4%e3%83%88%e3%81%8c%e9%81%8e%e5%8e%bb/</loc>
		<lastmod>2025-01-29T00:52:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nihonkai-construction-electric-cyber-attack/</loc>
		<lastmod>2025-01-29T01:37:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/british-museum-system-outage/</loc>
		<lastmod>2025-01-29T01:39:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ginco-cyber-attack/</loc>
		<lastmod>2025-01-30T01:34:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokyo-university-of-foreign-studies-unauthorized-access/</loc>
		<lastmod>2025-01-30T01:37:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30858/</loc>
		<lastmod>2025-01-30T06:56:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30860/</loc>
		<lastmod>2025-01-30T07:09:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30862/</loc>
		<lastmod>2025-01-30T07:25:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30868/</loc>
		<lastmod>2025-01-30T07:33:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37870/</loc>
		<lastmod>2025-01-30T08:30:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30874/</loc>
		<lastmod>2025-01-30T08:44:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-most-impactful-cyber-attack-last-year-was-as-expected-top-10-information-security-threats-for-2025-announced/</loc>
		<lastmod>2025-01-31T00:57:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-neuroscience-society-unauthorized-access/</loc>
		<lastmod>2025-01-31T00:58:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30903/</loc>
		<lastmod>2025-01-31T03:20:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30909/</loc>
		<lastmod>2025-02-04T07:25:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30912/</loc>
		<lastmod>2025-01-31T03:58:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30918/</loc>
		<lastmod>2025-01-31T04:12:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30922/</loc>
		<lastmod>2025-01-31T04:25:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30926/</loc>
		<lastmod>2025-01-31T04:37:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30931/</loc>
		<lastmod>2025-06-20T07:38:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30932/</loc>
		<lastmod>2025-06-20T10:25:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30943/</loc>
		<lastmod>2025-01-31T08:28:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30949/</loc>
		<lastmod>2025-01-31T08:30:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30954/</loc>
		<lastmod>2025-01-31T08:40:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/microsoft-edge%e3%81%8c%e3%82%b5%e3%83%9d%e3%83%bc%e3%83%88%e8%a9%90%e6%ac%ba%e3%83%9a%e3%83%bc%e3%82%b8%e3%82%92%e9%81%ae%e6%96%ad%e3%81%99%e3%82%8b%e3%82%b9%e3%82%b1%e3%82%a2%e3%82%a6%e3%82%a7/</loc>
		<lastmod>2025-01-31T11:01:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hotto-motto-unauthorized-access/</loc>
		<lastmod>2025-02-03T02:07:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hamamatsu-regional-innovation-promotion-agency-unauthorized-access/</loc>
		<lastmod>2025-02-03T02:09:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/beavers-recommendation-based-on-the-personal-information-protection-act/</loc>
		<lastmod>2025-02-04T02:35:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/70-of-japanese-companies-do-not-report-ransomware-attacks/</loc>
		<lastmod>2025-02-04T02:32:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31029/</loc>
		<lastmod>2025-02-04T05:39:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31035/</loc>
		<lastmod>2025-02-04T06:14:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31038/</loc>
		<lastmod>2025-02-04T06:22:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31039/</loc>
		<lastmod>2025-02-04T06:32:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31042/</loc>
		<lastmod>2025-02-04T07:11:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31044/</loc>
		<lastmod>2025-02-04T07:21:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31049/</loc>
		<lastmod>2025-02-04T08:22:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31054/</loc>
		<lastmod>2025-02-04T08:22:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31051/</loc>
		<lastmod>2025-02-04T08:22:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31062/</loc>
		<lastmod>2025-02-04T08:35:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31067/</loc>
		<lastmod>2025-06-20T11:21:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/notification-documents-submitted-by-60-medical-corporations-go-missing-in-shinjuku-ward-tokyo/</loc>
		<lastmod>2025-02-05T02:11:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31070/</loc>
		<lastmod>2025-02-05T07:02:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31085/</loc>
		<lastmod>2025-02-05T02:23:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/usb-memory-stick-lost-at-a-municipal-junior-high-school-in-kure-city-hiroshima-prefecture/</loc>
		<lastmod>2025-02-05T02:11:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31101/</loc>
		<lastmod>2025-02-05T02:23:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31109/</loc>
		<lastmod>2025-02-05T02:48:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31112/</loc>
		<lastmod>2025-06-20T07:29:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31115/</loc>
		<lastmod>2025-12-19T08:07:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31120/</loc>
		<lastmod>2025-06-20T07:30:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31124/</loc>
		<lastmod>2025-10-08T03:54:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31126/</loc>
		<lastmod>2025-02-05T05:25:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31129/</loc>
		<lastmod>2025-02-05T06:13:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31132/</loc>
		<lastmod>2025-02-05T06:53:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31136/</loc>
		<lastmod>2025-02-05T07:13:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31140/</loc>
		<lastmod>2025-02-05T09:12:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31114/</loc>
		<lastmod>2025-02-05T07:52:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31146/</loc>
		<lastmod>2025-02-05T08:02:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31148/</loc>
		<lastmod>2025-02-05T08:13:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31151/</loc>
		<lastmod>2025-02-05T09:00:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/31155/</loc>
		<lastmod>2025-02-05T09:12:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/new-hacker-group-funksec/</loc>
		<lastmod>2025-02-06T02:02:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ryukyu-shimpo-news-agency-information-leak/</loc>
		<lastmod>2025-02-06T02:02:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-electric-association-hit-by-ransomware/</loc>
		<lastmod>2025-02-07T01:22:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/gambit-actors-and-talent-contract-information-stolen/</loc>
		<lastmod>2025-02-07T01:23:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%81%ab%e3%82%88%e3%82%8b%e6%9a%97%e5%8f%b7%e9%80%9a%e8%b2%a8%e6%94%af%e6%89%95%e3%81%84%e3%81%8c%e6%98%a8%e5%b9%b4%e3%81%af35%ef%bc%85/</loc>
		<lastmod>2025-02-08T23:11:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ministry-of-finance-after-drinking-nine-glasses-of-beer-pc-and-administrative-documents-were-lost/</loc>
		<lastmod>2025-02-12T00:45:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/personal-information-of-over-200-children-and-guardians-sent-to-a-recycle-shop/</loc>
		<lastmod>2025-02-12T00:47:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/credentials-leaked-at-approximately-22-of-japanese-companies/</loc>
		<lastmod>2025-02-13T00:18:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/lion-unauthorized-access/</loc>
		<lastmod>2025-02-13T00:19:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/approximately-1212510000-web-cyber-attacks-per-year-japan-ranks-second-for-source-of-attacks/</loc>
		<lastmod>2025-02-14T01:53:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/youth-support-group-victim-of-unauthorized-access-can/</loc>
		<lastmod>2025-02-14T01:54:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e5%86%85%e9%96%a3%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%82%bb%e3%83%b3%e3%82%bf%e3%83%bc%e3%81%8cddos%e6%94%bb%e6%92%83%e3%81%b8%e3%81%ae/</loc>
		<lastmod>2025-02-15T05:06:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/autome-giken-ransomware/</loc>
		<lastmod>2025-02-17T02:51:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/genkai-towns-special-hometown-tax-donation-website-illegally-accessed/</loc>
		<lastmod>2025-02-17T02:51:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/support-scam-roadside-station-in-miyazaki-prefecture/</loc>
		<lastmod>2025-02-18T00:35:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-nichino-greening/</loc>
		<lastmod>2025-02-18T00:36:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/utsunomiya-central-clinic-ransomware-victim/</loc>
		<lastmod>2025-02-19T00:28:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kyoei-fire-marine-insurance-ransomware-damage/</loc>
		<lastmod>2025-02-19T00:29:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/high-school-student-indicted-for-stealing-7000-credit-card-details-from-chatgpt/</loc>
		<lastmod>2025-02-20T00:26:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/pc-support-scam-could-lead-to-leak-of-personal-information-of-approximately-660-junior-high-school-students/</loc>
		<lastmod>2025-02-20T00:27:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/62-6-of-respondents-dont-feel-the-need-for-security-investment/</loc>
		<lastmod>2025-02-21T01:10:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ippiki-official-shop-unauthorized-access/</loc>
		<lastmod>2025-02-21T01:11:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e6%94%bb%e6%92%83%e3%82%92%e6%8b%9b%e3%81%84%e3%81%9f%e3%80%8c%e9%96%89%e5%9f%9f%e7%b6%b2%e3%80%8d%e3%81%b8%e3%81%ae%e9%81%8e%e4%bf%a1/</loc>
		<lastmod>2025-02-24T01:13:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/aig-general-insurance-ransomware-damage/</loc>
		<lastmod>2025-02-25T01:13:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/approximately-30-of-japanese-companies-responded-that-ai-cyber-attacks-pose-major-challenges/</loc>
		<lastmod>2025-02-25T01:14:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e6%9d%b1%e4%ba%ac%e9%83%bd%e3%81%8c%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%82%bb%e3%83%b3%e3%82%bf%e3%83%bc%e3%82%92%e5%89%b5%e8%a8%ad%e3%81%b8/</loc>
		<lastmod>2025-02-25T05:28:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/piratefi-malware/</loc>
		<lastmod>2025-02-26T00:59:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/takeda-pharmaceuticals-agency-hit-by-ransomware/</loc>
		<lastmod>2025-02-26T01:00:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-domino-chain-of-cyber-attacks-meti-announces-strengthened-support-for-small-and-medium-sized-enterprises/</loc>
		<lastmod>2025-02-26T20:40:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kyushu-womens-university-and-other-institutions-suffer-unauthorized-access/</loc>
		<lastmod>2025-02-26T20:41:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-kashiwazaki-seika-online-shop/</loc>
		<lastmod>2025-02-28T00:14:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nara-prefecture-policy-promotion-division-personal-information-documents-lost/</loc>
		<lastmod>2025-02-28T00:16:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e9%87%8d%e5%a4%a7%e3%81%aa%e8%84%86%e5%bc%b1%e6%80%a7cve-2025-22467%e3%81%ae%e3%83%91%e3%83%83%e3%83%81%e6%9c%aa%e9%81%a9%e7%94%a8%e3%81%ae%e3%83%87%e3%83%90%e3%82%a4%e3%82%b9%e3%81%8c%e6%97%a5/</loc>
		<lastmod>2025-02-28T13:50:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/appropriate-use-of-medicines-council-cyber-attack/</loc>
		<lastmod>2025-03-03T23:20:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/loss-of-student-data-incidents-occurring-in-multiple-schools-saitama-city/</loc>
		<lastmod>2025-03-03T23:21:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/total-web-shop-unauthorized-access/</loc>
		<lastmod>2025-03-05T00:12:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/jobtra-academy-unauthorized-access/</loc>
		<lastmod>2025-03-05T00:13:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/pokemon-center-online-personal-information-leak/</loc>
		<lastmod>2025-03-06T01:11:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-tops-asia-for-malware-impact-with-a-total-of-106139174-infections-recorded/</loc>
		<lastmod>2025-03-06T01:09:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/musashikoganei-clinic-unauthorized-access/</loc>
		<lastmod>2025-03-07T01:17:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/okayama-seagulls-information-leak/</loc>
		<lastmod>2025-03-07T01:18:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e9%87%8f%e5%ad%90%e7%a7%91%e5%ad%a6%e6%8a%80%e8%a1%93%e7%a0%94%e7%a9%b6%e9%96%8b%e7%99%ba%e6%a9%9f%e6%a7%8b%e3%81%ab%e3%82%bc%e3%83%ad%e3%83%87%e3%82%a4%e6%94%bb%e6%92%83%e3%80%80%e3%83%aa%e3%83%a2/</loc>
		<lastmod>2025-03-09T09:00:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/event/international-cybersecurity-olympiad-ico/</loc>
		<lastmod>2025-03-17T00:22:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ntt-com-unauthorized-access/</loc>
		<lastmod>2025-03-10T00:58:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/komoro-city-hall-personal-information-leak/</loc>
		<lastmod>2025-03-10T00:59:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokushima-prefectural-board-of-education-unauthorized-access/</loc>
		<lastmod>2025-03-10T22:23:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hokuriku-broadcasting-information-leak/</loc>
		<lastmod>2025-03-10T22:25:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e6%94%bb%e6%92%83%e3%81%ae%e5%8f%af%e8%83%bd%e6%80%a7%e3%80%80x%e3%81%a7%e4%b8%96%e7%95%8c%e7%9a%84%e3%81%aa%e9%9a%9c%e5%ae%b3%e3%81%8c%e7%99%ba%e7%94%9f/</loc>
		<lastmod>2025-03-11T16:31:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/student-performance-data-was-shared-with-the-entire-grade/</loc>
		<lastmod>2025-03-12T00:09:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-attack-on-medical-academy/</loc>
		<lastmod>2025-03-12T00:10:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/oyatsu-company-unauthorized-access/</loc>
		<lastmod>2025-03-12T20:20:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/approximately-640-teachers-and-students-usb-flash-drives-were-lost/</loc>
		<lastmod>2025-03-12T20:22:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/lollipop-spam/</loc>
		<lastmod>2025-03-14T01:47:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-youth-hostel-association-hit-by-cyber-attack/</loc>
		<lastmod>2025-03-14T01:52:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/toa-university-information-leak/</loc>
		<lastmod>2025-03-16T23:54:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/yamagata-bank-fraud/</loc>
		<lastmod>2025-03-16T23:55:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32308/</loc>
		<lastmod>2025-04-03T07:07:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/yuko-tamura-city-council-member-i-provided-the-login-information/</loc>
		<lastmod>2025-03-17T22:18:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/eid-impersonation/</loc>
		<lastmod>2025-03-17T22:21:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32368/</loc>
		<lastmod>2025-04-25T06:15:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32381/</loc>
		<lastmod>2025-04-25T06:09:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32387/</loc>
		<lastmod>2025-04-25T06:13:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32390/</loc>
		<lastmod>2025-04-25T06:11:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32360/</loc>
		<lastmod>2025-09-23T08:01:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32398/</loc>
		<lastmod>2025-04-25T06:08:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32401/</loc>
		<lastmod>2025-04-25T06:14:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32404/</loc>
		<lastmod>2025-04-25T06:13:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32408/</loc>
		<lastmod>2025-04-25T06:15:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32411/</loc>
		<lastmod>2025-04-25T06:09:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32417/</loc>
		<lastmod>2025-04-25T06:11:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32420/</loc>
		<lastmod>2025-04-25T06:10:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32407/</loc>
		<lastmod>2025-03-18T08:10:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32423/</loc>
		<lastmod>2025-04-25T06:10:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e5%bf%ab%e6%b4%bbclub%e4%b8%8d%e6%ad%a3%e3%82%a2%e3%82%af%e3%82%bb%e3%82%b9%e8%aa%bf%e6%9f%bb%e5%ae%8c%e4%ba%86%e3%80%8c%e5%80%8b%e4%ba%ba%e6%83%85%e5%a0%b1%e6%bc%8f%e3%81%88%e3%81%84%e3%80%81/</loc>
		<lastmod>2025-03-18T14:18:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/uniqlo-gu-unauthorized-access/</loc>
		<lastmod>2025-03-19T00:14:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/official-x-naota-himena-hijacked/</loc>
		<lastmod>2025-03-19T00:16:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32458/</loc>
		<lastmod>2025-04-25T05:56:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32479/</loc>
		<lastmod>2025-04-25T05:43:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32492/</loc>
		<lastmod>2025-04-25T06:07:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32488/</loc>
		<lastmod>2025-04-25T06:06:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32495/</loc>
		<lastmod>2025-04-25T05:57:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32484/</loc>
		<lastmod>2025-03-19T04:01:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32507/</loc>
		<lastmod>2025-04-25T05:54:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32512/</loc>
		<lastmod>2025-04-25T06:03:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32517/</loc>
		<lastmod>2025-03-19T05:49:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32508/</loc>
		<lastmod>2025-04-25T06:08:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32523/</loc>
		<lastmod>2025-04-25T05:58:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32522/</loc>
		<lastmod>2025-03-19T06:50:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32529/</loc>
		<lastmod>2025-04-25T05:55:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32543/</loc>
		<lastmod>2025-04-25T05:56:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32551/</loc>
		<lastmod>2025-04-25T05:59:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32540/</loc>
		<lastmod>2025-04-25T04:06:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32561/</loc>
		<lastmod>2025-04-25T05:54:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32567/</loc>
		<lastmod>2025-04-25T05:55:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32569/</loc>
		<lastmod>2025-04-25T05:43:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32564/</loc>
		<lastmod>2025-04-25T05:58:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32588/</loc>
		<lastmod>2025-04-25T06:02:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32591/</loc>
		<lastmod>2025-04-25T05:57:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32597/</loc>
		<lastmod>2025-04-25T05:54:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32571/</loc>
		<lastmod>2025-03-19T09:00:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32589/</loc>
		<lastmod>2025-04-25T06:01:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32468/</loc>
		<lastmod>2025-09-23T09:30:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32538/</loc>
		<lastmod>2025-03-19T10:17:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32615/</loc>
		<lastmod>2025-04-25T03:22:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32617/</loc>
		<lastmod>2025-04-25T03:27:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32619/</loc>
		<lastmod>2025-04-25T03:23:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32621/</loc>
		<lastmod>2025-04-25T03:24:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32625/</loc>
		<lastmod>2025-04-08T08:39:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32629/</loc>
		<lastmod>2025-04-10T02:24:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32631/</loc>
		<lastmod>2025-04-08T08:34:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32633/</loc>
		<lastmod>2025-04-08T08:22:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32636/</loc>
		<lastmod>2025-04-08T08:17:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32639/</loc>
		<lastmod>2025-04-08T08:15:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32641/</loc>
		<lastmod>2025-04-08T08:13:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32644/</loc>
		<lastmod>2025-04-25T03:26:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32646/</loc>
		<lastmod>2025-04-25T03:22:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32648/</loc>
		<lastmod>2025-04-25T03:29:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32650/</loc>
		<lastmod>2025-04-25T03:27:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32653/</loc>
		<lastmod>2025-04-25T04:05:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32655/</loc>
		<lastmod>2025-04-25T03:31:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32657/</loc>
		<lastmod>2025-04-08T08:10:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32660/</loc>
		<lastmod>2025-04-25T03:25:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32662/</loc>
		<lastmod>2025-04-25T03:21:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32665/</loc>
		<lastmod>2025-04-25T03:25:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32668/</loc>
		<lastmod>2025-04-25T04:06:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32670/</loc>
		<lastmod>2025-04-25T03:24:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32673/</loc>
		<lastmod>2025-04-25T04:04:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32678/</loc>
		<lastmod>2025-04-08T07:35:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32681/</loc>
		<lastmod>2025-04-08T07:33:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32676/</loc>
		<lastmod>2025-04-08T06:28:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32689/</loc>
		<lastmod>2025-04-08T07:28:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32695/</loc>
		<lastmod>2025-04-08T07:31:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32687/</loc>
		<lastmod>2025-03-21T02:56:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32692/</loc>
		<lastmod>2025-04-08T06:34:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32708/</loc>
		<lastmod>2025-04-25T03:18:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32715/</loc>
		<lastmod>2025-04-08T07:14:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32707/</loc>
		<lastmod>2025-05-12T05:45:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32716/</loc>
		<lastmod>2025-09-23T07:57:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32732/</loc>
		<lastmod>2025-04-08T07:39:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32736/</loc>
		<lastmod>2025-04-08T07:52:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32740/</loc>
		<lastmod>2025-04-08T07:47:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32742/</loc>
		<lastmod>2025-04-08T07:45:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32723/</loc>
		<lastmod>2025-04-08T06:37:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32744/</loc>
		<lastmod>2025-04-08T07:42:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32753/</loc>
		<lastmod>2025-04-08T07:25:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32755/</loc>
		<lastmod>2025-04-08T07:21:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32750/</loc>
		<lastmod>2025-04-08T06:43:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32760/</loc>
		<lastmod>2025-04-08T07:11:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32762/</loc>
		<lastmod>2025-03-21T07:23:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32734/</loc>
		<lastmod>2025-09-23T07:58:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32765/</loc>
		<lastmod>2025-04-08T07:09:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32769/</loc>
		<lastmod>2025-09-23T08:00:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32771/</loc>
		<lastmod>2025-04-08T06:40:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32777/</loc>
		<lastmod>2025-04-08T06:39:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32778/</loc>
		<lastmod>2025-04-08T07:55:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32783/</loc>
		<lastmod>2025-04-08T07:37:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32775/</loc>
		<lastmod>2025-09-22T03:52:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32781/</loc>
		<lastmod>2025-04-08T06:31:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32790/</loc>
		<lastmod>2025-03-21T09:50:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/jalan-unauthorized-access/</loc>
		<lastmod>2025-03-24T01:07:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/bell-data-ransomware/</loc>
		<lastmod>2025-03-24T01:08:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32812/</loc>
		<lastmod>2025-04-08T06:26:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32814/</loc>
		<lastmod>2025-09-23T07:48:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32821/</loc>
		<lastmod>2025-09-23T07:50:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32820/</loc>
		<lastmod>2025-04-08T06:24:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32830/</loc>
		<lastmod>2025-09-23T07:49:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32835/</loc>
		<lastmod>2025-04-08T06:23:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32836/</loc>
		<lastmod>2025-09-23T06:39:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32845/</loc>
		<lastmod>2025-04-25T03:07:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32849/</loc>
		<lastmod>2025-09-23T07:51:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32856/</loc>
		<lastmod>2025-04-25T03:09:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32786/</loc>
		<lastmod>2025-04-08T06:21:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32866/</loc>
		<lastmod>2025-04-08T06:19:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32865/</loc>
		<lastmod>2025-04-25T03:08:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32859/</loc>
		<lastmod>2025-09-23T07:53:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32872/</loc>
		<lastmod>2025-04-25T03:07:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32875/</loc>
		<lastmod>2025-09-23T07:54:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hatakenaka-noodles-unauthorized-access/</loc>
		<lastmod>2025-03-25T00:58:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/lets-become-a-novelist-victim-of-ddos-attack/</loc>
		<lastmod>2025-03-25T00:59:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32900/</loc>
		<lastmod>2025-04-04T07:23:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32905/</loc>
		<lastmod>2025-04-04T07:26:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32909/</loc>
		<lastmod>2025-04-04T08:40:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32906/</loc>
		<lastmod>2025-03-25T03:19:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32913/</loc>
		<lastmod>2025-04-08T05:59:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32924/</loc>
		<lastmod>2025-04-08T06:05:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32931/</loc>
		<lastmod>2025-04-25T06:27:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32934/</loc>
		<lastmod>2025-04-25T06:28:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32932/</loc>
		<lastmod>2025-04-04T08:28:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32936/</loc>
		<lastmod>2025-04-25T06:27:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32940/</loc>
		<lastmod>2025-04-25T06:26:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32938/</loc>
		<lastmod>2025-04-04T08:11:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32944/</loc>
		<lastmod>2025-04-25T02:55:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32948/</loc>
		<lastmod>2025-04-11T07:41:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32917/</loc>
		<lastmod>2025-03-25T07:20:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32946/</loc>
		<lastmod>2025-04-04T08:15:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32951/</loc>
		<lastmod>2025-04-25T02:52:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32957/</loc>
		<lastmod>2025-04-25T02:57:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32955/</loc>
		<lastmod>2025-04-08T06:14:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32929/</loc>
		<lastmod>2025-03-25T08:06:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32960/</loc>
		<lastmod>2025-04-25T03:01:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32968/</loc>
		<lastmod>2025-04-08T06:08:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32964/</loc>
		<lastmod>2025-04-08T06:10:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32974/</loc>
		<lastmod>2025-04-25T06:28:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32973/</loc>
		<lastmod>2025-04-08T06:16:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32980/</loc>
		<lastmod>2025-04-08T06:12:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32982/</loc>
		<lastmod>2025-03-25T10:06:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32989/</loc>
		<lastmod>2025-03-25T10:32:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/komoro-civic-garden-cyber-attack/</loc>
		<lastmod>2025-03-26T02:01:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ward-mayor-dies-personal-information-missing/</loc>
		<lastmod>2025-03-26T02:02:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33010/</loc>
		<lastmod>2025-04-04T07:19:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33013/</loc>
		<lastmod>2025-09-23T06:38:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33025/</loc>
		<lastmod>2025-04-04T06:46:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33020/</loc>
		<lastmod>2025-04-04T07:21:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33030/</loc>
		<lastmod>2025-04-04T06:57:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33032/</loc>
		<lastmod>2025-04-04T06:54:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33029/</loc>
		<lastmod>2025-04-04T07:08:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33038/</loc>
		<lastmod>2025-04-04T06:52:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33042/</loc>
		<lastmod>2025-04-04T06:49:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33023/</loc>
		<lastmod>2025-03-26T04:43:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33048/</loc>
		<lastmod>2025-03-26T05:42:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33037/</loc>
		<lastmod>2025-04-04T07:13:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33055/</loc>
		<lastmod>2025-03-26T07:17:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33056/</loc>
		<lastmod>2025-04-04T07:18:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33067/</loc>
		<lastmod>2025-04-04T06:41:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33063/</loc>
		<lastmod>2025-03-26T07:44:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33066/</loc>
		<lastmod>2025-04-04T07:15:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33074/</loc>
		<lastmod>2025-04-04T06:38:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33080/</loc>
		<lastmod>2025-04-04T06:36:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33078/</loc>
		<lastmod>2025-04-04T07:12:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33085/</loc>
		<lastmod>2025-04-04T06:23:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33089/</loc>
		<lastmod>2025-04-04T05:44:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33081/</loc>
		<lastmod>2025-09-23T06:14:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33094/</loc>
		<lastmod>2025-04-11T07:30:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33087/</loc>
		<lastmod>2025-04-04T07:05:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33100/</loc>
		<lastmod>2025-04-04T07:00:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/32996/</loc>
		<lastmod>2025-03-26T08:55:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33099/</loc>
		<lastmod>2025-04-04T07:02:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33106/</loc>
		<lastmod>2025-04-04T07:03:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tanaka-precious-metals-group-cyber-attack/</loc>
		<lastmod>2025-03-27T00:48:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/eiwa-shinkin-bank-customer-information-mistakenly-discarded/</loc>
		<lastmod>2025-03-27T00:49:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/oracle-cloud%e3%81%8b%e3%82%89%e3%83%87%e3%83%bc%e3%82%bf600%e4%b8%87%e4%bb%b6%e3%81%8c%e7%9b%97%e3%81%be%e3%82%8c%e8%b2%a9%e5%a3%b2%e3%81%95%e3%82%8c%e3%82%8b%e2%80%95cloudsek%e3%83%ac%e3%83%9d/</loc>
		<lastmod>2025-03-27T00:45:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33132/</loc>
		<lastmod>2025-04-04T05:26:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33136/</loc>
		<lastmod>2025-04-04T05:16:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33142/</loc>
		<lastmod>2025-03-27T03:57:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33155/</loc>
		<lastmod>2025-04-04T05:23:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33171/</loc>
		<lastmod>2025-04-04T05:27:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33152/</loc>
		<lastmod>2025-09-23T07:44:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33189/</loc>
		<lastmod>2025-03-27T06:17:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33182/</loc>
		<lastmod>2025-04-04T05:41:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33199/</loc>
		<lastmod>2025-09-23T07:44:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33204/</loc>
		<lastmod>2025-04-04T05:42:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33216/</loc>
		<lastmod>2025-04-04T05:29:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33215/</loc>
		<lastmod>2025-09-23T07:43:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33226/</loc>
		<lastmod>2025-04-04T05:35:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33234/</loc>
		<lastmod>2025-04-04T05:31:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33232/</loc>
		<lastmod>2025-09-23T07:47:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33237/</loc>
		<lastmod>2025-04-25T02:44:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33137/</loc>
		<lastmod>2025-09-23T07:45:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33211/</loc>
		<lastmod>2025-09-23T06:39:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e3%81%8a%e8%8c%b6%e3%82%b5%e3%82%a4%e3%83%88%e3%80%81%e8%a8%8886778%e4%bb%b6%e3%81%ae%e9%a1%a7%e5%ae%a2%e6%83%85%e5%a0%b1%e6%b5%81%e5%87%ba%e3%81%ae%e5%8f%af%e8%83%bd%e6%80%a7%e3%80%80%e5%a4%96/</loc>
		<lastmod>2025-03-30T22:18:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e7%a5%9e%e6%88%b8%e3%81%ae%e6%b0%b4%e6%97%8f%e9%a4%a8%e3%81%a7%e5%80%8b%e4%ba%ba%e6%83%85%e5%a0%b112931%e4%bb%b6%e6%b5%81%e5%87%ba%e3%80%80%e3%82%b7%e3%82%b9%e3%83%86%e3%83%a0%e4%b8%8d%e5%82%99/</loc>
		<lastmod>2025-03-30T22:17:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33277/</loc>
		<lastmod>2025-04-03T07:35:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33283/</loc>
		<lastmod>2025-04-03T07:43:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%80%902025%e5%b9%b4%e7%89%88%e3%80%91oracle%e3%83%87%e3%83%bc%e3%82%bf%e3%83%99%e3%83%bc%e3%82%b9%e3%81%ab%e3%82%a2%e3%82%af%e3%82%bb%e3%82%b9%e3%81%a7%e3%81%8d%e3%81%aa%e3%81%84%ef%bc%9fora-01157/</loc>
		<lastmod>2025-03-28T02:16:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33280/</loc>
		<lastmod>2025-09-23T07:41:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33312/</loc>
		<lastmod>2025-04-03T07:14:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33309/</loc>
		<lastmod>2025-09-23T06:38:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33324/</loc>
		<lastmod>2025-04-25T02:19:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33335/</loc>
		<lastmod>2025-04-25T02:15:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33188/</loc>
		<lastmod>2025-04-03T08:41:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33346/</loc>
		<lastmod>2025-04-25T02:27:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33355/</loc>
		<lastmod>2025-04-25T03:06:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33362/</loc>
		<lastmod>2025-04-25T02:13:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33351/</loc>
		<lastmod>2025-09-23T07:40:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33370/</loc>
		<lastmod>2025-04-04T03:49:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33374/</loc>
		<lastmod>2025-04-04T03:48:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33361/</loc>
		<lastmod>2025-04-04T05:13:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33383/</loc>
		<lastmod>2025-04-04T03:42:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33387/</loc>
		<lastmod>2025-04-04T03:42:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33373/</loc>
		<lastmod>2025-04-03T07:21:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33382/</loc>
		<lastmod>2025-09-23T07:42:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33394/</loc>
		<lastmod>2025-04-04T03:42:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33332/</loc>
		<lastmod>2025-03-28T07:00:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33393/</loc>
		<lastmod>2025-03-28T07:29:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33369/</loc>
		<lastmod>2025-03-28T07:48:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33406/</loc>
		<lastmod>2025-04-04T03:34:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33401/</loc>
		<lastmod>2025-04-03T07:27:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33410/</loc>
		<lastmod>2025-04-03T07:31:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33411/</loc>
		<lastmod>2025-04-04T03:31:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33415/</loc>
		<lastmod>2025-03-28T08:48:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33417/</loc>
		<lastmod>2025-04-04T03:26:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/junkosha-ransomware/</loc>
		<lastmod>2025-03-31T00:33:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ishizawa-laboratorys-website-has-been-tampered-with/</loc>
		<lastmod>2025-03-31T00:34:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e5%a4%aa%e9%99%bd%e5%85%89%e7%99%ba%e9%9b%bb%e3%82%b7%e3%82%b9%e3%83%86%e3%83%a0%e3%81%ae%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%83%aa%e3%82%b9%e3%82%af%e3%81%8c%e9%ab%98%e3%81%be%e3%81%a3%e3%81%a6/</loc>
		<lastmod>2025-03-31T02:58:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokiwa-industry-cyber-attack/</loc>
		<lastmod>2025-03-31T23:41:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sapporo-city-university-web-server-tampering/</loc>
		<lastmod>2025-03-31T23:42:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33470/</loc>
		<lastmod>2025-09-18T05:07:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/centrair-unauthorized-access/</loc>
		<lastmod>2025-04-02T01:30:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/southern-japan-dairy-cooperative-cyber-attack/</loc>
		<lastmod>2025-04-02T01:31:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33445/</loc>
		<lastmod>2025-04-03T03:07:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/manufacturing-industry-accounts-for-24-8-of-all-cyber-attacks-with-unauthorized-access-the-most-common-cause-at-61-1/</loc>
		<lastmod>2025-04-03T00:56:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/zeon-corporation-unauthorized-access/</loc>
		<lastmod>2025-04-03T00:57:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33619/</loc>
		<lastmod>2025-04-03T03:11:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33629/</loc>
		<lastmod>2025-04-03T05:33:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33636/</loc>
		<lastmod>2025-04-03T06:40:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33637/</loc>
		<lastmod>2025-04-03T06:07:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33647/</loc>
		<lastmod>2025-04-03T06:34:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33651/</loc>
		<lastmod>2025-04-03T06:44:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33659/</loc>
		<lastmod>2025-04-03T07:12:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33657/</loc>
		<lastmod>2025-04-03T07:35:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33667/</loc>
		<lastmod>2025-04-03T07:47:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33677/</loc>
		<lastmod>2025-04-03T07:59:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33690/</loc>
		<lastmod>2025-04-03T09:07:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nhk-personal-information-leak-email-sent-to-the-wrong-address/</loc>
		<lastmod>2025-04-04T00:34:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/gaora-unauthorized-access/</loc>
		<lastmod>2025-04-04T00:35:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33723/</loc>
		<lastmod>2025-04-04T01:28:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33727/</loc>
		<lastmod>2025-04-04T02:12:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33738/</loc>
		<lastmod>2025-04-04T02:34:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33749/</loc>
		<lastmod>2025-04-04T03:13:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33776/</loc>
		<lastmod>2025-04-04T04:27:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33803/</loc>
		<lastmod>2025-04-04T04:57:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33808/</loc>
		<lastmod>2025-04-04T06:34:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33847/</loc>
		<lastmod>2025-04-04T07:07:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33873/</loc>
		<lastmod>2025-04-04T07:30:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33894/</loc>
		<lastmod>2025-04-04T07:44:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33897/</loc>
		<lastmod>2025-04-04T08:40:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33906/</loc>
		<lastmod>2025-04-04T08:57:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/food-supermarket-chain-yamanaka-personal-information-leaked/</loc>
		<lastmod>2025-04-07T02:05:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/former-ja-employee-leaks-500-personal-details-to-contractor-embezzles-2-million-yen/</loc>
		<lastmod>2025-04-07T02:06:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33929/</loc>
		<lastmod>2025-04-07T03:55:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33933/</loc>
		<lastmod>2025-04-07T04:09:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33936/</loc>
		<lastmod>2025-04-07T04:16:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33938/</loc>
		<lastmod>2025-04-07T05:13:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33943/</loc>
		<lastmod>2025-04-07T05:32:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33945/</loc>
		<lastmod>2025-04-07T07:10:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33949/</loc>
		<lastmod>2025-04-07T07:29:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33951/</loc>
		<lastmod>2025-04-07T07:47:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33956/</loc>
		<lastmod>2025-04-07T08:25:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33961/</loc>
		<lastmod>2025-04-07T08:44:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33963/</loc>
		<lastmod>2025-04-07T09:07:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/d-carrier-plus-unauthorized-access/</loc>
		<lastmod>2025-04-07T22:58:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/online-design-tool-figma-student-information-leaked/</loc>
		<lastmod>2025-04-07T22:59:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33983/</loc>
		<lastmod>2025-04-08T01:41:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33985/</loc>
		<lastmod>2025-04-08T03:12:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33989/</loc>
		<lastmod>2025-04-08T03:39:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33993/</loc>
		<lastmod>2025-04-08T04:19:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33995/</loc>
		<lastmod>2025-04-08T04:46:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34005/</loc>
		<lastmod>2025-04-08T06:32:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34044/</loc>
		<lastmod>2025-04-08T07:03:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34051/</loc>
		<lastmod>2025-04-25T01:42:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34076/</loc>
		<lastmod>2025-04-25T01:43:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
</urlset><!-- <p>Please edit wp-db.inc.php in wp-includes and set SAVEQUERIES to true if you want to see the queries.</p> --> <!-- Request ID: 1d78796da887e8a63ec3a8135264530b; Queries for sitemap: 2006; Total queries: 2081; Seconds: 0.5; Memory for sitemap: 16MB; Total memory: 26MB -->
