<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet type='text/xsl' href='https://cybersecurity-info.com/csi-ttm/wp-content/plugins/google-sitemap-generator/sitemap.xsl'?><!-- sitemap-generator-url='http://www.arnebrachhold.de' sitemap-generator-version='4.1.23' -->
<!-- generated-on='2026年4月27日 8:35 PM' -->
<urlset xmlns:xsi='http://www.w3.org/2001/XMLSchema-instance' xsi:schemaLocation='http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd' xmlns='http://www.sitemaps.org/schemas/sitemap/0.9'>	<url>
		<loc>https://cybersecurity-info.com/column/34092/</loc>
		<lastmod>2025-04-25T01:40:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34107/</loc>
		<lastmod>2025-04-25T01:39:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34112/</loc>
		<lastmod>2025-04-25T01:39:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/personal-information-of-562-people-posted-online-for-81-days-kumamoto-city/</loc>
		<lastmod>2025-04-08T23:33:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-health-culture-promotion-association-5300-personal-information-records-lost/</loc>
		<lastmod>2025-04-08T23:34:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34134/</loc>
		<lastmod>2025-04-25T01:26:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34139/</loc>
		<lastmod>2025-04-25T01:32:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34142/</loc>
		<lastmod>2025-04-25T01:27:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34146/</loc>
		<lastmod>2025-04-25T01:29:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34151/</loc>
		<lastmod>2025-04-25T01:29:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34154/</loc>
		<lastmod>2025-04-25T01:33:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34157/</loc>
		<lastmod>2025-04-25T01:36:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34159/</loc>
		<lastmod>2025-04-25T01:37:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34166/</loc>
		<lastmod>2025-04-25T01:38:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34169/</loc>
		<lastmod>2025-04-25T01:38:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34173/</loc>
		<lastmod>2025-04-25T01:38:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ivanti%e8%a3%bd%e5%93%81%e3%81%ab%e6%96%b0%e3%81%9f%e3%81%aa%e8%84%86%e5%bc%b1%e6%80%a7cve-2025-22457%e3%80%80%e6%94%bb%e6%92%83%e8%80%85%e3%81%ab%e6%82%aa%e7%94%a8%e3%81%95%e3%82%8c%e3%81%a6%e7%99%ba/</loc>
		<lastmod>2025-04-09T22:01:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-association-for-the-international-exposition-warning-about-fake-websites/</loc>
		<lastmod>2025-04-09T22:56:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/fake-account-posing-as-the-anti-phishing-council-discovered/</loc>
		<lastmod>2025-04-09T23:00:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34202/</loc>
		<lastmod>2025-04-25T01:22:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34209/</loc>
		<lastmod>2025-04-25T01:22:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34280/</loc>
		<lastmod>2025-04-25T01:23:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34284/</loc>
		<lastmod>2025-04-25T01:23:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34332/</loc>
		<lastmod>2025-04-25T01:23:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34343/</loc>
		<lastmod>2025-04-25T01:24:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34349/</loc>
		<lastmod>2025-04-25T01:24:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34365/</loc>
		<lastmod>2025-04-25T01:25:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34379/</loc>
		<lastmod>2025-04-25T01:25:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34391/</loc>
		<lastmod>2025-04-25T01:26:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nippon-ceramic-unauthorized-access/</loc>
		<lastmod>2025-04-10T22:50:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-on-toppan/</loc>
		<lastmod>2025-04-10T22:51:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34420/</loc>
		<lastmod>2025-04-25T00:53:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34426/</loc>
		<lastmod>2025-04-25T01:12:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34434/</loc>
		<lastmod>2025-08-18T07:16:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34442/</loc>
		<lastmod>2025-04-25T01:14:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34454/</loc>
		<lastmod>2025-04-25T01:15:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34484/</loc>
		<lastmod>2025-04-25T01:15:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34492/</loc>
		<lastmod>2025-04-25T01:16:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/33413/</loc>
		<lastmod>2025-04-25T02:28:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34514/</loc>
		<lastmod>2025-04-25T01:20:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34501/</loc>
		<lastmod>2025-04-25T01:16:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34521/</loc>
		<lastmod>2025-04-25T01:21:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34531/</loc>
		<lastmod>2025-04-25T01:21:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34537/</loc>
		<lastmod>2025-04-25T01:21:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hotstrap-site-tampered-with/</loc>
		<lastmod>2025-04-13T22:26:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kinki-regional-bureau-of-health-and-welfare-hyogo-office-information-leak/</loc>
		<lastmod>2025-04-13T22:27:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34164/</loc>
		<lastmod>2025-04-25T01:37:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/four-employees-were-disciplined-for-illegally-viewing-female-employees-devices-a-total-of-2867-times/</loc>
		<lastmod>2025-04-15T00:46:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/video-production-request-for-400000-yen-scam-message-victim-of-sns-account-hijacking/</loc>
		<lastmod>2025-04-15T00:48:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/iij-data-of-over-4-million-subscribers-leaked/</loc>
		<lastmod>2025-04-15T23:04:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japanese-society-for-developmental-biology-unauthorized-access/</loc>
		<lastmod>2025-04-15T23:03:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/out-of-kidzania-in-koriyama-2024-ransomware-email-sent-to-erroneous-address/</loc>
		<lastmod>2025-04-16T21:35:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/matsui-securities-phishing-alert/</loc>
		<lastmod>2025-04-16T21:36:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e8%84%86%e5%bc%b1%e6%80%a7%e3%83%97%e3%83%ad%e3%82%b0%e3%83%a9%e3%83%a0cve%e3%82%81%e3%81%90%e3%82%8a%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3/</loc>
		<lastmod>2025-04-17T14:16:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nine-banks-nationwide-suspected-of-cyberattack/</loc>
		<lastmod>2025-04-17T23:05:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kenso-unauthorized-access/</loc>
		<lastmod>2025-04-17T23:06:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34669/</loc>
		<lastmod>2026-04-23T09:00:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/daihatsu-approximately-17000-pieces-of-information-leaked/</loc>
		<lastmod>2025-04-21T01:08:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/personal-information-of-students-sent-to-all-parents-in-the-school-year-188-people-downloaded-tokyo/</loc>
		<lastmod>2025-04-21T01:08:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/approximately-50-6-billion-yen-stolen-in-three-months-a-sharp-increase-in-unauthorized-access-exploiting-online-trading-services-financial-services-agency/</loc>
		<lastmod>2025-04-21T23:20:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sumikai-net-ransomware-victim/</loc>
		<lastmod>2025-04-21T23:21:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/circuit-design-ransomware-victim/</loc>
		<lastmod>2025-04-23T00:27:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/atorio-due-next-tama-plaza-unauthorized-access/</loc>
		<lastmod>2025-04-23T00:28:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e8%87%aa%e5%8b%95%e5%8c%96%e3%81%95%e3%82%8c%e3%81%9f%e8%84%85%e5%a8%81%e3%81%8c%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e7%a9%ba%e9%96%93%e3%81%a7%e5%a2%97%e5%a4%a7%e3%80%80%e8%83%8c%e6%99%af%e3%81%abai/</loc>
		<lastmod>2025-04-23T16:05:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hiroyuki-fake-posts-etc-image-bulletin-board-4chan-hacked-impact-spreads/</loc>
		<lastmod>2025-04-23T23:17:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sumitomo-forestry-crest-support-fraud/</loc>
		<lastmod>2025-04-23T23:18:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/at-the-osaka-kansai-expo-qr-codes-will-display-other-peoples-information-affecting-the-personal-information-of-up-to-200-people/</loc>
		<lastmod>2025-04-24T23:13:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/difference-unauthorized-access/</loc>
		<lastmod>2025-04-24T23:13:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34817/</loc>
		<lastmod>2025-04-25T05:59:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34953/</loc>
		<lastmod>2025-04-25T07:01:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34993/</loc>
		<lastmod>2025-09-23T07:39:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35002/</loc>
		<lastmod>2025-04-25T09:21:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/34880/</loc>
		<lastmod>2026-04-14T07:44:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35013/</loc>
		<lastmod>2025-04-25T10:58:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/acrylic-sports-club-unauthorized-access/</loc>
		<lastmod>2025-04-27T23:39:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/civil-engineering-company-in-aichi-prefecture-has-its-data-encrypted-and-inaccessible/</loc>
		<lastmod>2025-04-27T23:40:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35045/</loc>
		<lastmod>2025-04-28T09:24:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35055/</loc>
		<lastmod>2025-04-28T10:39:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e6%97%a5%e7%94%a3%e3%83%aa%e3%83%bc%e3%83%95ze1%e3%81%ab%e9%81%a0%e9%9a%94%e6%93%8d%e4%bd%9c%e3%81%95%e3%82%8c%e3%82%8b%e8%84%86%e5%bc%b1%e6%80%a7%e3%80%80black-hat-asia-2025%e3%81%a7%e7%a0%94/</loc>
		<lastmod>2025-04-28T17:34:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e3%82%af%e3%82%a2%e3%83%a9%e3%83%ab%e3%83%b3%e3%83%97%e3%83%bc%e3%83%ab%e5%9b%bd%e9%9a%9b%e7%a9%ba%e6%b8%af%e3%81%ab%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e6%94%bb%e6%92%83%e3%80%80qilin%e3%83%a9/</loc>
		<lastmod>2025-04-29T15:24:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/chugoku-electric-power-company-unauthorized-access/</loc>
		<lastmod>2025-04-29T16:09:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/data-taken-out-copied-usb-destroyed-and-resignation-more-than-18000-customers-affected-iwate-prefectural-bank/</loc>
		<lastmod>2025-04-29T16:10:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35116/</loc>
		<lastmod>2025-04-30T08:54:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/phishing-cases-surge-to-a-record-high-of-108713-from-the-previous-month-with-many-tactics-masquerading-as-legitimate-brands/</loc>
		<lastmod>2025-04-30T22:34:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/yodogawa-steel-works-ransomware-damage/</loc>
		<lastmod>2025-04-30T22:38:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35108/</loc>
		<lastmod>2025-05-01T08:09:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/personal-information-leak-at-kansai-airport-and-osaka-international-airport/</loc>
		<lastmod>2025-05-02T00:41:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hackers-share-stolen-information-via-subscription-service-266-increase-in-malware-attacks-caused-by-infostealers/</loc>
		<lastmod>2025-05-02T00:43:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/former-matsukura-family-residence-damage-from-tampering/</loc>
		<lastmod>2025-05-07T00:37:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/chukyo-kaiun-ransomware-damage/</loc>
		<lastmod>2025-05-07T00:38:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/pr-times-unauthorized-access-2/</loc>
		<lastmod>2025-05-08T00:27:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/saito-collotype-printing-ransomware-attack/</loc>
		<lastmod>2025-05-08T00:28:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/toyama-prefectural-agriculture-forestry-and-fisheries-research-center-forest-research-institute-spam-mail/</loc>
		<lastmod>2025-05-09T00:55:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hotel-new-grand-unauthorized-access/</loc>
		<lastmod>2025-05-09T00:56:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-experiences-record-number-of-ransomware-attacks-with-over-3-4-million-leaked-data/</loc>
		<lastmod>2025-05-12T00:49:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/digital-technology-approximately-6400-pieces-of-information-flow/</loc>
		<lastmod>2025-05-12T00:50:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35201/</loc>
		<lastmod>2025-09-22T07:54:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%80%8c%e5%8c%97%e6%9c%9d%e9%ae%ae%e3%81%ae%e6%96%b0%e3%81%9f%e3%81%aa%e8%84%85%e5%a8%81%e3%81%8cqilin%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%82%92%e5%b1%95%e9%96%8b/</loc>
		<lastmod>2025-05-13T02:21:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/yamagata-agricultural-support-center-support-scam/</loc>
		<lastmod>2025-05-12T23:07:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/information-leaked-from-gasoline-coupon-delivery-in-nagano-prefecture/</loc>
		<lastmod>2025-05-12T23:08:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/api-security-survey-report-2025-akamai-technologies/</loc>
		<lastmod>2025-05-13T23:42:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tenki-jp-cyber-attack/</loc>
		<lastmod>2025-05-13T23:44:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/yamagata-university-professor-falls-victim-to-support-scam-personal-information-of-2306-students-at-risk-of-being-leaked/</loc>
		<lastmod>2025-05-15T01:01:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ibaraki-prefecture-personal-information-has-been-publicly-available-for-about-three-years/</loc>
		<lastmod>2025-05-15T01:02:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/newton-financial-ransomware-victim/</loc>
		<lastmod>2025-05-15T22:06:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/chiba-prefecture-approximately-11400-student-records-have-been-available-for-viewing-for-over-three-years/</loc>
		<lastmod>2025-05-15T22:08:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/skylark-holdings-unauthorized-access/</loc>
		<lastmod>2025-05-18T21:54:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/about-48-of-people-responded-that-false-information-on-social-media-is-correct-information/</loc>
		<lastmod>2025-05-18T21:57:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35458/</loc>
		<lastmod>2025-09-23T09:28:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35467/</loc>
		<lastmod>2025-09-22T07:50:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-government-passes-a-new-law-to-introduce-active-cyber-defense/</loc>
		<lastmod>2025-05-19T22:53:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/more-than-7000-cybercrime-volunteers-deployed-nationwide-national-police-agency-revitalizes-support-and-efforts/</loc>
		<lastmod>2025-05-19T22:44:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/enecloud-deletion-type-ransomware-damage/</loc>
		<lastmod>2025-05-21T00:19:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/dior-unauthorized-access/</loc>
		<lastmod>2025-05-21T00:21:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/qilin%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%81%8ccmic-cmo-usa%e3%82%92%e6%94%bb%e6%92%83%e3%81%8b-%e7%8b%99%e3%82%8f%e3%82%8c%e3%81%a6%e3%81%84%e3%82%8b%e5%8c%bb%e7%99%82/</loc>
		<lastmod>2025-05-21T08:38:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nrs-server-unauthorized-access-victim/</loc>
		<lastmod>2025-05-22T00:55:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokyo-2025-deaflympics-personal-information-leaked/</loc>
		<lastmod>2025-05-22T00:56:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/about-70-of-companies-are-concerned-about-the-lack-of-trust-when-introducing-generative-ai/</loc>
		<lastmod>2025-05-22T23:33:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nippon-valve-cyber-attack/</loc>
		<lastmod>2025-05-22T23:35:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35558/</loc>
		<lastmod>2026-01-15T06:42:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/iketei-online-unauthorized-access/</loc>
		<lastmod>2025-05-25T23:57:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/om-manufacturing-ransomware-victim/</loc>
		<lastmod>2025-05-25T23:58:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/ai%e3%82%92%e6%b4%bb%e7%94%a8%e3%81%97%e3%81%9f%e3%83%90%e3%83%bc%e3%83%81%e3%83%a3%e3%83%abciso%e3%81%a7%e5%8d%93%e8%b6%8a%e3%81%97%e3%81%9f%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3/</loc>
		<lastmod>2025-05-26T15:06:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/four-days-unauthorized-access/</loc>
		<lastmod>2025-05-26T22:42:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/beware-of-fake-emails-claiming-to-be-from-paypay/</loc>
		<lastmod>2025-05-26T22:43:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/rhotse-ransomware-victim/</loc>
		<lastmod>2025-05-28T00:55:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/matching-app-omiai-victim-of-unauthorized-access/</loc>
		<lastmod>2025-05-28T00:57:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/what-is-lumma-stealer-malware/</loc>
		<lastmod>2025-05-29T00:41:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokyo-keizai-university-third-party-access-to-student-information-system/</loc>
		<lastmod>2025-05-29T00:46:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mitsubishi-estate-house-net-spam-mail/</loc>
		<lastmod>2025-05-29T23:49:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/igeta-fuji-support-fraud-victim/</loc>
		<lastmod>2025-05-29T23:50:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e9%80%a3%e8%bc%89%e3%80%90%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e6%94%bb%e6%92%83%e3%81%ae%e6%ad%b4%e5%8f%b2%e3%80%91wannacry%e3%81%a8notpetya%e3%81%ab%e3%82%88%e3%82%8b%e5%a4%a7%e8%a6%8f%e6%a8%a1/</loc>
		<lastmod>2025-05-30T01:12:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35708/</loc>
		<lastmod>2025-09-22T08:43:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35724/</loc>
		<lastmod>2025-09-22T07:45:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35748/</loc>
		<lastmod>2025-09-22T07:48:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35756/</loc>
		<lastmod>2025-09-22T07:45:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ivanti%e3%81%aeepmm%e8%84%86%e5%bc%b1%e6%80%a7%e3%82%92%e6%82%aa%e7%94%a8%e3%81%97%e3%81%9f%e6%94%bb%e6%92%83%e3%80%80%e4%b8%ad%e5%9b%bd%e8%84%85%e5%a8%81%e3%82%a2%e3%82%af%e3%82%bf%e3%83%bc%e3%81%8c/</loc>
		<lastmod>2025-05-31T11:41:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/ntt%e3%82%b3%e3%83%a0%e3%81%ae%e3%83%87%e3%83%bc%e3%82%bf%e6%b5%81%e5%87%ba%e4%ba%8b%e4%bb%b6%e3%82%92%e5%8f%97%e3%81%91%e3%81%a6s2w%e3%81%8c%e3%83%8f%e3%83%83%e3%82%ad%e3%83%b3%e3%82%b0%e3%83%95/</loc>
		<lastmod>2025-05-31T11:57:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/adidas-unauthorized-access/</loc>
		<lastmod>2025-06-01T23:31:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tannan-construction-ransomware-victim/</loc>
		<lastmod>2025-06-01T23:32:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/a-large-scale-phishing-scheme-involving-32000-emails-is-occurring/</loc>
		<lastmod>2025-06-03T00:32:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tama-library-unauthorized-access/</loc>
		<lastmod>2025-06-03T00:34:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/only-12-5-of-students-handle-data-appropriately-many-issues-with-erasing-data-from-giga-school-devices/</loc>
		<lastmod>2025-06-03T23:26:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-catalyst-suffers-from-unauthorized-access/</loc>
		<lastmod>2025-06-03T23:27:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-atomic-energy-agency-unauthorized-access/</loc>
		<lastmod>2025-06-04T14:24:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/a-new-method-that-deliberately-does-not-install-malware-approximately-9000-routers-already-compromised/</loc>
		<lastmod>2025-06-04T14:26:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35811/</loc>
		<lastmod>2025-09-23T06:13:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36051/</loc>
		<lastmod>2025-06-06T07:41:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hackers-japan-is-a-good-target-current-trend-in-cyber-attacks-is-not-destroying/</loc>
		<lastmod>2025-06-08T22:34:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/groupware-setting-error-chiba-city-prefectural-high-school/</loc>
		<lastmod>2025-06-08T22:34:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ryosan-ryoyo-holdings-website-tampering/</loc>
		<lastmod>2025-06-10T00:16:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/k-all-unauthorized-access/</loc>
		<lastmod>2025-06-10T00:17:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/princess-rinrins-information-security-class-information-leak/</loc>
		<lastmod>2025-06-10T21:18:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-automobile-research-institute-certification-center-support-scam/</loc>
		<lastmod>2025-06-10T21:19:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/bookig-com%e3%83%95%e3%82%a3%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0%e6%94%bb%e6%92%83%e3%80%80%e5%81%bd%e8%a3%85captcha%e3%81%a7rat%e3%81%ab%e6%84%9f%e6%9f%93%e3%81%95%e3%81%9b%e3%81%a6%e6%83%85%e5%a0%b1/</loc>
		<lastmod>2025-06-11T07:35:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ufotable-unauthorized-access/</loc>
		<lastmod>2025-06-11T23:32:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/multiple-fake-sites-of-the-osaka-prefectural-police-official-website-found/</loc>
		<lastmod>2025-06-11T23:33:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/softbank-137000-pieces-of-information-leaked-person-who-took-the-information-to-security-cameras/</loc>
		<lastmod>2025-06-12T23:38:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/southern-japan-dairy-cooperative-cyber-attack-2/</loc>
		<lastmod>2025-06-12T23:45:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e5%81%bdcaptcha%e3%81%a7%e6%82%aa%e6%84%8f%e3%81%ae%e3%82%b3%e3%83%9e%e3%83%b3%e3%83%89%e3%82%92%e5%ae%9f%e8%a1%8c%e3%81%95%e3%81%9b%e3%82%8bclickfix%e3%81%ae%e8%83%8c%e6%99%af%e3%81%ab%e3%81%82/</loc>
		<lastmod>2025-06-14T21:43:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/rakumachi-unauthorized-access/</loc>
		<lastmod>2025-06-15T22:54:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/information-leaked-after-sending-out-cancer-screening-flyers-to-5837-people-yokosuka-city/</loc>
		<lastmod>2025-06-15T22:55:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35267/</loc>
		<lastmod>2025-09-22T03:51:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/wechat-approximately-4-billion-personal-information-records-leaked-the-largest-ever/</loc>
		<lastmod>2025-06-17T00:34:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hackers-lurk-in-the-cloud-for-long-periods-of-time-some-companies-receive-nearly-500-alerts-a-day/</loc>
		<lastmod>2025-06-17T00:36:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/chipla-personal-information-leak/</loc>
		<lastmod>2025-06-17T23:35:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-jikko-ransomware-victim/</loc>
		<lastmod>2025-06-17T23:36:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36317/</loc>
		<lastmod>2025-09-23T06:44:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/over-10000-personal-information-leaked-from-daiso/</loc>
		<lastmod>2025-06-19T00:05:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/setsunan-university-mistakenly-sends-information-on-over-9000-graduates/</loc>
		<lastmod>2025-06-19T00:06:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/seminar/2025-07-18/</loc>
		<lastmod>2025-10-15T07:53:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nagoya-university-1626-students-personal-information-suspected-to-be-leaked-after-faculty-member-falls-victim-to-support-scam/</loc>
		<lastmod>2025-06-20T01:03:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-gymnastics-association-website-suspended-for-tampering/</loc>
		<lastmod>2025-06-20T01:01:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36449/</loc>
		<lastmod>2025-09-11T09:55:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e7%b0%a1%e6%98%93%e6%8a%95%e7%a8%bf%e3%82%b5%e3%82%a4%e3%83%88x%e3%81%ae%e5%a4%a7%e8%a6%8f%e6%a8%a1%e9%9a%9c%e5%ae%b3%e3%80%80%e3%83%9c%e3%83%83%e3%83%88%e5%8c%96%e3%81%97%e3%81%9f%e5%9b%bd%e5%86%85i/</loc>
		<lastmod>2025-06-21T14:30:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/in-japan-an-average-of-1322-cyber-attacks-occur-per-organization-per-week-what-are-the-risk-countermeasures-in-this-hyper-connected-world/</loc>
		<lastmod>2025-06-22T19:40:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ace-consultant-ransomware/</loc>
		<lastmod>2025-06-22T19:41:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36452/</loc>
		<lastmod>2025-09-23T07:38:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sepa-bank-victim-of-cyber-attack/</loc>
		<lastmod>2025-06-24T01:41:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/im-la-floria-unauthorized-access/</loc>
		<lastmod>2025-06-24T01:42:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/approximately-34-of-ransomware-intrusions-are-caused-by-leaked-authentication-information-what-is-an-infostealer-information-stealing-malware/</loc>
		<lastmod>2025-06-25T02:08:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/fujisan-co-jp-unauthorized-access/</loc>
		<lastmod>2025-06-25T02:11:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36510/</loc>
		<lastmod>2025-09-23T06:12:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/confidence-in-ransomware-countermeasures-drops-by-more-than-20-after-victimization/</loc>
		<lastmod>2025-06-26T00:22:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ticket-pia-user-information-leaked/</loc>
		<lastmod>2025-06-26T00:22:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36865/</loc>
		<lastmod>2025-09-23T06:10:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36912/</loc>
		<lastmod>2025-09-22T02:27:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36914/</loc>
		<lastmod>2025-09-19T08:59:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36916/</loc>
		<lastmod>2025-09-22T07:31:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36918/</loc>
		<lastmod>2025-09-22T07:30:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36924/</loc>
		<lastmod>2025-09-23T07:36:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/18-year-old-i-wanted-money-to-spend-sells-other-peoples-rakuten-accounts-earning-2-million-yen-in-profits/</loc>
		<lastmod>2025-06-27T00:35:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/gibraltar-life-insurance-company-suffers-unauthorized-access-from-third-party-affecting-550-employees-and-contractors/</loc>
		<lastmod>2025-06-27T00:40:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36954/</loc>
		<lastmod>2025-09-22T07:14:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36959/</loc>
		<lastmod>2025-09-22T07:22:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36964/</loc>
		<lastmod>2025-09-22T07:26:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36970/</loc>
		<lastmod>2025-09-22T07:24:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36977/</loc>
		<lastmod>2025-09-22T07:18:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36993/</loc>
		<lastmod>2025-09-22T07:12:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37005/</loc>
		<lastmod>2025-09-22T07:17:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37013/</loc>
		<lastmod>2025-09-22T07:23:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37019/</loc>
		<lastmod>2025-09-22T07:27:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37030/</loc>
		<lastmod>2025-09-22T07:16:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37041/</loc>
		<lastmod>2025-09-22T07:28:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37053/</loc>
		<lastmod>2025-09-22T07:15:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37083/</loc>
		<lastmod>2025-09-22T07:11:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/36990/</loc>
		<lastmod>2025-09-18T04:50:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%82%a2%e3%82%b8%e3%82%a2%e3%83%bb%e5%8d%97%e5%a4%aa%e5%b9%b3%e6%b4%8b%e5%9c%b0%e5%9f%9f%e3%81%a7%e6%83%85%e5%a0%b1%e7%aa%83%e5%8f%96%e3%81%ab%e9%96%a2%e4%b8%8e%e3%81%aeip%e3%80%81%e3%83%89%e3%83%a1/</loc>
		<lastmod>2025-06-28T10:17:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kumiai-chemical-industry-unauthorized-access/</loc>
		<lastmod>2025-06-30T01:35:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/pal-closet-unauthorized-access/</loc>
		<lastmod>2025-06-30T01:37:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37203/</loc>
		<lastmod>2025-06-30T03:05:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37209/</loc>
		<lastmod>2025-06-30T03:17:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37211/</loc>
		<lastmod>2025-06-30T03:28:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37215/</loc>
		<lastmod>2025-06-30T03:57:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37233/</loc>
		<lastmod>2025-06-30T05:24:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37254/</loc>
		<lastmod>2025-06-30T05:31:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37289/</loc>
		<lastmod>2025-06-30T07:32:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37189/</loc>
		<lastmod>2025-09-18T04:42:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37334/</loc>
		<lastmod>2025-06-30T07:57:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37341/</loc>
		<lastmod>2025-06-30T08:15:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e4%b8%ad%e6%9d%b1%e3%81%ae%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e6%88%a6%e3%81%8c%e6%bf%80%e5%8c%96%e3%80%80gps%e3%82%b9%e3%83%97%e3%83%bc%e3%83%95%e3%82%a3%e3%83%b3%e3%82%b0%e3%81%a7%e6%b5%b7/</loc>
		<lastmod>2025-06-30T11:27:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mens-clothing-store-haruyama-falls-victim-to-cyber-attack/</loc>
		<lastmod>2025-07-01T01:42:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/system-exe-unauthorized-access-victim/</loc>
		<lastmod>2025-07-01T01:43:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/new-government-security-organization-national-cyber-command-center-launched-to-preemptively-neutralize-attacks/</loc>
		<lastmod>2025-07-01T23:34:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/machine-tool-manufacturer-experiences-system-failure-due-to-cyber-attack-efforts-to-identify-intrusion-route/</loc>
		<lastmod>2025-07-01T23:35:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37453/</loc>
		<lastmod>2025-09-22T03:49:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37494/</loc>
		<lastmod>2025-09-22T07:09:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cosmo-oil-customer-information-can-now-be-viewed-from-outside/</loc>
		<lastmod>2025-07-03T03:27:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nippon-ceramic-ransomware/</loc>
		<lastmod>2025-07-03T03:28:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-majority-of-companies-started-investing-in-security-because-other-companies-were-attacked-by-cyberattacks-approximately-70-of-companies-intend-to-increase-their-investment-in-security-in-the-futur/</loc>
		<lastmod>2025-07-04T02:21:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/toyotsu-machinery-unauthorized-access/</loc>
		<lastmod>2025-07-04T02:23:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/pokemon-center-online-website-down-all-members-forced-to-reset-passwords/</loc>
		<lastmod>2025-07-07T00:33:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/aichi-prefectural-mock-exam-unauthorized-access/</loc>
		<lastmod>2025-07-07T00:34:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37726/</loc>
		<lastmod>2025-09-23T07:34:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/oriental-guard-research-unauthorized-access/</loc>
		<lastmod>2025-07-08T00:58:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shinko-plastics-hit-by-ransomware/</loc>
		<lastmod>2025-07-08T00:59:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37386/</loc>
		<lastmod>2025-09-23T06:08:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37800/</loc>
		<lastmod>2025-09-22T02:25:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37807/</loc>
		<lastmod>2025-09-19T08:39:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37822/</loc>
		<lastmod>2025-09-19T08:23:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37830/</loc>
		<lastmod>2025-09-22T02:08:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37835/</loc>
		<lastmod>2025-09-22T02:20:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nippon-steel-solutions-zero-day-attack/</loc>
		<lastmod>2025-07-09T00:52:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/furuno-electric-unauthorized-access/</loc>
		<lastmod>2025-07-09T00:53:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37996/</loc>
		<lastmod>2025-09-22T03:39:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37990/</loc>
		<lastmod>2025-09-22T03:44:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/seminar/2025-07-24/</loc>
		<lastmod>2025-07-26T01:47:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38022/</loc>
		<lastmod>2025-09-22T03:37:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-danger-of-stalkerware-stealing-information-from-approximately-62000-users-without-their-knowledge/</loc>
		<lastmod>2025-07-10T02:08:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/qantas-airways-unauthorized-access/</loc>
		<lastmod>2025-07-10T02:09:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37929/</loc>
		<lastmod>2025-07-10T09:11:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/half-of-japanese-companies-consider-measures-after-ransomware-infection-only-13-5-have-prepared-manuals/</loc>
		<lastmod>2025-07-11T01:06:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nara-prefecture-employee-illegally-views-personnel-data-and-email-correspondence-fined-200000-yen-and-disciplined/</loc>
		<lastmod>2025-07-11T01:06:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38126/</loc>
		<lastmod>2026-02-25T07:49:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/approximately-230000-phishing-reports-a-cat-and-mouse-game-with-spam-filters/</loc>
		<lastmod>2025-07-14T02:14:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/53-of-ransomware-victims-successfully-negotiate-to-reduce-damages-but-it-also-exposes-companies-vulnerabilities/</loc>
		<lastmod>2025-07-14T02:15:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/37878/</loc>
		<lastmod>2026-02-24T06:07:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38479/</loc>
		<lastmod>2025-09-22T02:10:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-mainichi-shimbun-digital/</loc>
		<lastmod>2025-07-15T01:36:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shinchosha-damage-caused-by-ransomware/</loc>
		<lastmod>2025-07-15T01:40:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/2024%e5%b9%b4%e3%81%ae%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a8%e3%82%a2%e8%ba%ab%e4%bb%a3%e9%87%91%e8%a6%81%e6%b1%82%e9%a1%8d%e3%81%8c%e5%89%8d%e5%b9%b4%e6%af%9434%ef%bc%85%e3%81%ae/</loc>
		<lastmod>2025-07-15T01:56:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/so-net-unauthorized-access/</loc>
		<lastmod>2025-07-16T01:23:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ags-group-cyber-attack/</loc>
		<lastmod>2025-07-16T01:24:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38618/</loc>
		<lastmod>2025-09-22T02:00:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38553/</loc>
		<lastmod>2026-02-26T04:14:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38646/</loc>
		<lastmod>2025-09-19T08:55:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38684/</loc>
		<lastmod>2025-09-22T02:09:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38617/</loc>
		<lastmod>2025-09-18T05:30:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/louis-vuitton-unauthorized-access/</loc>
		<lastmod>2025-07-17T01:26:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/new-backup-device-uses-physical-power-to-combat-unauthorized-access-and-ransomware/</loc>
		<lastmod>2025-07-17T01:26:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38760/</loc>
		<lastmod>2026-02-24T09:23:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38782/</loc>
		<lastmod>2026-02-27T02:39:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38795/</loc>
		<lastmod>2025-09-19T08:43:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38818/</loc>
		<lastmod>2025-09-19T08:19:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38826/</loc>
		<lastmod>2025-09-19T08:35:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38840/</loc>
		<lastmod>2025-09-19T08:42:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nippon-life-insurance-employee-takes-out-internal-documents-president-apologizes/</loc>
		<lastmod>2025-07-18T01:33:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/credit-information-agency-cic-information-stolen-by-third-party-including-credit-card-information/</loc>
		<lastmod>2025-07-18T01:34:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38847/</loc>
		<lastmod>2026-02-19T08:54:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38991/</loc>
		<lastmod>2025-09-22T02:17:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39016/</loc>
		<lastmod>2025-09-22T02:16:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e3%80%8cdevman%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%81%8c%e8%b1%8a%e7%94%b0%e9%80%9a%e5%95%86%e5%ad%90%e4%bc%9a%e7%a4%be%e3%81%ae%e3%82%a8%e3%83%ac%e3%83%9e%e3%83%86/</loc>
		<lastmod>2025-07-21T21:40:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/55-of-companies-say-cloud-security-is-difficult-current-situation-makes-management-difficult-due-to-complex-systems/</loc>
		<lastmod>2025-07-22T00:56:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/logo-form-unauthorized-login/</loc>
		<lastmod>2025-07-22T00:57:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/38047/</loc>
		<lastmod>2025-09-22T03:35:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39042/</loc>
		<lastmod>2025-09-22T02:17:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokai-university-infected-with-ransomware/</loc>
		<lastmod>2025-07-23T00:18:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/uniden-holdings-unauthorized-access/</loc>
		<lastmod>2025-07-23T00:19:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39142/</loc>
		<lastmod>2025-09-22T02:15:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/research/how-many-people-use-shadow-ai/</loc>
		<lastmod>2025-07-23T22:41:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39164/</loc>
		<lastmod>2025-09-22T02:11:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/beware-of-fake-online-shopping-sites-that-use-yokai-watch-characters-and-logos-without-permission/</loc>
		<lastmod>2025-07-24T00:36:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/smartphones-can-make-you-either-a-perpetrator-or-a-victim-proper-use-of-sns-seminar-held-for-junior-high-school-students-and-their-parents-yamagata-prefecture/</loc>
		<lastmod>2025-07-24T00:35:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39208/</loc>
		<lastmod>2026-02-27T04:14:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39223/</loc>
		<lastmod>2026-02-25T03:05:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39199/</loc>
		<lastmod>2025-09-23T09:25:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39230/</loc>
		<lastmod>2025-09-22T02:16:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39249/</loc>
		<lastmod>2026-02-27T06:22:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39256/</loc>
		<lastmod>2025-09-22T02:12:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39267/</loc>
		<lastmod>2025-09-22T02:12:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39274/</loc>
		<lastmod>2025-09-22T02:14:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sharepoint-server%e3%82%92%e7%8b%99%e3%81%a3%e3%81%9f%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e6%94%bb%e6%92%83%e3%81%8c%e6%b4%bb%e7%99%ba%e5%8c%96%e3%80%81ms%e3%81%8c%e6%9b%b4%e6%96%b0%e3%83%97%e3%83%ad/</loc>
		<lastmod>2025-07-24T09:12:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39141/</loc>
		<lastmod>2025-09-24T06:47:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39133/</loc>
		<lastmod>2026-02-20T04:21:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39118/</loc>
		<lastmod>2026-03-04T04:37:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39128/</loc>
		<lastmod>2025-09-24T06:50:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39340/</loc>
		<lastmod>2025-09-22T02:11:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/music-streaming-service-confirms-cases-of-users-being-directed-to-fake-payment-pages/</loc>
		<lastmod>2025-07-25T02:53:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-impact-and-issues-of-leaving-domains-abandoned-where-past-anime-sites-have-been-turned-into-sites-that-redirect-users-to-online-casinos/</loc>
		<lastmod>2025-07-25T02:54:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39335/</loc>
		<lastmod>2025-09-24T06:29:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39255/</loc>
		<lastmod>2025-09-24T06:26:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39418/</loc>
		<lastmod>2025-10-14T08:53:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39428/</loc>
		<lastmod>2025-09-22T01:54:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39435/</loc>
		<lastmod>2026-02-19T04:31:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39402/</loc>
		<lastmod>2025-09-24T06:20:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39385/</loc>
		<lastmod>2026-02-26T09:15:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39351/</loc>
		<lastmod>2025-09-24T06:17:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39364/</loc>
		<lastmod>2025-09-24T06:00:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39441/</loc>
		<lastmod>2026-03-04T01:38:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39324/</loc>
		<lastmod>2025-09-24T06:22:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39450/</loc>
		<lastmod>2026-02-20T02:41:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/research/how-many-company-do-security-learning-for-ai/</loc>
		<lastmod>2025-08-18T00:36:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokiwa-ransomware-victim/</loc>
		<lastmod>2025-07-28T00:20:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/takenaka-corporation-introduces-service-to-visualize-signs-of-cyber-attacks-and-risks-in-response-to-the-increasing-complexity-of-the-digital-environment/</loc>
		<lastmod>2025-07-28T00:21:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39489/</loc>
		<lastmod>2025-09-22T01:51:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39496/</loc>
		<lastmod>2025-10-14T08:51:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39501/</loc>
		<lastmod>2025-09-22T02:07:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39506/</loc>
		<lastmod>2025-10-14T08:50:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39514/</loc>
		<lastmod>2025-10-14T08:50:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39518/</loc>
		<lastmod>2026-02-27T09:16:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39531/</loc>
		<lastmod>2025-09-22T01:53:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39538/</loc>
		<lastmod>2026-02-18T09:21:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kawasaki-equipment-industry-ransomware-victim/</loc>
		<lastmod>2025-07-29T01:44:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/welfare-support-organizations-server-hit-by-ransomware-threatening-to-release-and-sell-information-if-ransom-is-not-paid/</loc>
		<lastmod>2025-07-29T01:44:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39552/</loc>
		<lastmod>2026-02-19T03:19:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39573/</loc>
		<lastmod>2026-02-20T09:33:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39595/</loc>
		<lastmod>2025-09-22T01:52:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39612/</loc>
		<lastmod>2025-09-22T02:10:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39626/</loc>
		<lastmod>2025-10-14T08:48:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39641/</loc>
		<lastmod>2025-10-14T08:47:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e8%84%86%e5%bc%b1%e6%80%a7%e6%83%85%e5%a0%b1%e3%82%92%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e4%bc%81%e6%a5%ad%e3%81%ab%e4%ba%8b%e5%89%8d%e9%80%9a/</loc>
		<lastmod>2025-07-29T11:47:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/42-of-companies-have-achieved-a-balance-between-ai-and-security/</loc>
		<lastmod>2025-07-29T22:52:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/a-warning-message-appears-saying-your-website-is-infected-with-a-virus-a-website-has-been-tampered-with-by-a-third-party-kusatsu-city-shiga-prefecture/</loc>
		<lastmod>2025-07-29T22:52:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39687/</loc>
		<lastmod>2026-02-20T10:36:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39696/</loc>
		<lastmod>2026-02-25T08:44:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39689/</loc>
		<lastmod>2025-09-22T07:04:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39781/</loc>
		<lastmod>2026-02-19T06:49:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39743/</loc>
		<lastmod>2025-09-22T07:06:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/what-is-the-new-cyber-attack-choice-jacking-latest-cases-and-countermeasures/</loc>
		<lastmod>2025-07-31T01:56:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hakuba-iwatake-mountain-resort-suffers-from-unauthorized-access/</loc>
		<lastmod>2025-07-31T01:57:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39830/</loc>
		<lastmod>2025-09-22T01:50:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39839/</loc>
		<lastmod>2025-09-22T01:51:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39576/</loc>
		<lastmod>2026-02-27T08:09:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39625/</loc>
		<lastmod>2025-09-24T05:42:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39584/</loc>
		<lastmod>2025-09-24T05:55:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39838/</loc>
		<lastmod>2025-09-24T05:51:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39873/</loc>
		<lastmod>2025-09-24T06:13:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%81%aeai%e5%8c%96%e3%80%81%e8%87%aa%e5%8b%95%e5%8c%96%e3%81%ab%e9%87%8e%e5%bf%83%e7%9a%84%e3%81%ab%e5%8f%96/</loc>
		<lastmod>2025-07-31T12:15:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/us-dating-app-tea-suspects-personal-information-leak-of-over-72000-users-class-action-lawsuit-erupts/</loc>
		<lastmod>2025-08-01T00:46:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/allianz-life-suffers-from-large-scale-unauthorized-access/</loc>
		<lastmod>2025-08-01T00:46:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/generative-ai-tools-steal-customer-data-and-internal-secrets-in-99-of-corporate-environments/</loc>
		<lastmod>2025-08-04T02:56:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/skylark-holdings-unauthorized-access-2/</loc>
		<lastmod>2025-08-04T02:57:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40010/</loc>
		<lastmod>2025-09-23T09:23:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/orange-a-major-french-telecommunications-company-falls-victim-to-a-cyber-attack/</loc>
		<lastmod>2025-08-04T23:45:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/new-cyber-x-physical-security-diagnostic-service-launched-alsok-x-gmo/</loc>
		<lastmod>2025-08-04T23:46:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/2025-obon-holiday-information-security-comprehensive-measures-including-past-cases/</loc>
		<lastmod>2025-08-06T00:14:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/personal-information-of-7531-voters-may-have-been-leaked-during-the-upper-house-election-affecting-three-voting-districts-in-sendai-city/</loc>
		<lastmod>2025-08-06T00:17:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40130/</loc>
		<lastmod>2025-09-23T09:22:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40141/</loc>
		<lastmod>2025-09-23T09:03:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/gujo-hachimanya-specialty-products-online-store-unauthorized-access/</loc>
		<lastmod>2025-08-06T22:24:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/recruit-co-illegally-took-out-personal-information-of-481-employees-and-used-it-externally/</loc>
		<lastmod>2025-08-06T22:25:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39080/</loc>
		<lastmod>2025-09-22T03:09:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39198/</loc>
		<lastmod>2025-09-22T03:21:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40204/</loc>
		<lastmod>2025-09-23T09:19:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40217/</loc>
		<lastmod>2025-09-23T09:20:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39980/</loc>
		<lastmod>2025-09-22T03:28:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39996/</loc>
		<lastmod>2025-09-22T03:18:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40245/</loc>
		<lastmod>2026-02-17T06:30:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ai-strengthens-attacks-with-unique-extortion-tools-latest-ransomware-trends-report/</loc>
		<lastmod>2025-08-07T23:12:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hosei-university-unauthorized-access/</loc>
		<lastmod>2025-08-07T23:13:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39642/</loc>
		<lastmod>2025-09-18T05:15:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39614/</loc>
		<lastmod>2025-09-24T04:15:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39547/</loc>
		<lastmod>2026-03-04T08:16:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39606/</loc>
		<lastmod>2025-09-24T04:13:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39910/</loc>
		<lastmod>2026-02-26T07:11:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e7%94%bb%e5%83%8f%e3%81%abrat%e5%9f%8b%e3%82%81%e8%be%bc%e3%81%bf%e3%80%81%e5%8c%97%e3%83%8f%e3%83%83%e3%82%ab%e3%83%bc%e3%81%8c%e3%82%b9%e3%83%86%e3%82%ac%e3%83%8e%e3%82%b0%e3%83%a9%e3%83%95/</loc>
		<lastmod>2025-08-08T13:27:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/27413/</loc>
		<lastmod>2025-09-22T05:39:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40349/</loc>
		<lastmod>2025-09-22T03:06:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/30929/</loc>
		<lastmod>2025-08-11T06:48:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40475/</loc>
		<lastmod>2025-09-23T07:27:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40494/</loc>
		<lastmod>2025-09-23T07:30:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/osaka-acute-and-general-medical-center-cyber-attack-damages-settlement-with-1-billion-yen-payment/</loc>
		<lastmod>2025-08-12T01:23:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-attack-at-cleaning-company-approximately-30-computers-encrypted/</loc>
		<lastmod>2025-08-12T01:24:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40587/</loc>
		<lastmod>2025-09-23T07:32:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40478/</loc>
		<lastmod>2025-09-23T06:01:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40530/</loc>
		<lastmod>2025-08-12T04:06:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40701/</loc>
		<lastmod>2025-08-12T06:08:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40626/</loc>
		<lastmod>2025-09-23T06:00:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40721/</loc>
		<lastmod>2025-09-23T08:57:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40736/</loc>
		<lastmod>2025-09-23T06:04:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40819/</loc>
		<lastmod>2025-09-23T09:00:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40834/</loc>
		<lastmod>2025-09-23T06:57:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/surugaya-unauthorized-access/</loc>
		<lastmod>2025-08-13T00:49:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/heart-disease-examination-photos-posted-on-social-media-then-deleted-innocent-information-leak/</loc>
		<lastmod>2025-08-13T00:50:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40937/</loc>
		<lastmod>2025-09-22T06:44:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41024/</loc>
		<lastmod>2025-08-13T08:46:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41078/</loc>
		<lastmod>2025-09-22T07:02:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/citizens-criticize-kyoto-prefecture-for-privately-using-fire-department-gps-system-to-identify-addresses/</loc>
		<lastmod>2025-08-13T23:39:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/taiwanese-semiconductor-manufacturer-faces-legal-action-over-leak-of-technical-information-to-japan-tsmc/</loc>
		<lastmod>2025-08-13T23:39:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41153/</loc>
		<lastmod>2025-09-01T08:29:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41155/</loc>
		<lastmod>2025-08-14T04:08:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41334/</loc>
		<lastmod>2025-08-15T01:48:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41340/</loc>
		<lastmod>2025-09-23T06:50:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41394/</loc>
		<lastmod>2025-09-23T08:48:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41412/</loc>
		<lastmod>2025-08-19T03:15:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41106/</loc>
		<lastmod>2025-09-22T09:03:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40794/</loc>
		<lastmod>2025-09-22T06:59:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41304/</loc>
		<lastmod>2025-09-18T03:31:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e3%83%8d%e3%83%83%e3%83%88%e3%83%af%e3%83%bc%e3%82%af%e3%82%ab%e3%83%a1%e3%83%a9%e3%82%84%e9%8c%b2%e7%94%bb%e3%83%bb%e5%86%8d%e7%94%9f%e6%a9%9f%e5%99%a8%e2%80%a5%e2%80%a5cisa%e3%81%8cd-link%e7%a4%be/</loc>
		<lastmod>2025-08-14T13:25:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/marubishi-holdings-unauthorized-access/</loc>
		<lastmod>2025-08-15T01:04:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/starto-entertainment-impersonation/</loc>
		<lastmod>2025-08-15T01:15:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41551/</loc>
		<lastmod>2025-09-23T08:55:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41591/</loc>
		<lastmod>2025-08-19T03:19:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41589/</loc>
		<lastmod>2025-12-12T10:10:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41613/</loc>
		<lastmod>2026-02-17T09:16:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41632/</loc>
		<lastmod>2025-08-19T03:31:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/research/what-is-threat-in-life/</loc>
		<lastmod>2025-08-18T00:36:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41662/</loc>
		<lastmod>2025-09-23T08:54:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-muscular-dystrophy-association-falsification-victim/</loc>
		<lastmod>2025-08-18T00:58:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/eco-hai-information-leak/</loc>
		<lastmod>2025-08-18T00:59:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41703/</loc>
		<lastmod>2025-08-18T07:22:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41712/</loc>
		<lastmod>2025-08-18T07:36:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41728/</loc>
		<lastmod>2025-08-18T07:54:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41735/</loc>
		<lastmod>2025-08-18T08:06:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41739/</loc>
		<lastmod>2025-08-18T08:30:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41747/</loc>
		<lastmod>2025-08-18T08:37:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39077/</loc>
		<lastmod>2025-09-22T03:03:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41557/</loc>
		<lastmod>2025-09-23T06:54:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41537/</loc>
		<lastmod>2025-09-22T09:02:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41750/</loc>
		<lastmod>2025-08-18T08:49:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41755/</loc>
		<lastmod>2025-08-18T09:04:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41758/</loc>
		<lastmod>2025-08-18T09:19:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41762/</loc>
		<lastmod>2025-08-18T09:27:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41765/</loc>
		<lastmod>2025-08-19T01:03:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41772/</loc>
		<lastmod>2025-08-19T01:12:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41782/</loc>
		<lastmod>2025-08-19T01:30:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41514/</loc>
		<lastmod>2025-09-22T06:43:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41360/</loc>
		<lastmod>2025-09-23T06:52:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-evolves-into-a-quadruple-extortion/</loc>
		<lastmod>2025-08-19T02:09:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-discovered-at-mitsubishi-auto-lease-1166-employee-records-leaked/</loc>
		<lastmod>2025-08-19T02:09:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41801/</loc>
		<lastmod>2025-08-19T02:04:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41861/</loc>
		<lastmod>2025-08-19T02:28:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41875/</loc>
		<lastmod>2025-08-19T02:56:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41895/</loc>
		<lastmod>2025-08-19T03:12:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41910/</loc>
		<lastmod>2025-08-19T03:24:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41935/</loc>
		<lastmod>2025-08-19T03:49:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41954/</loc>
		<lastmod>2025-08-19T04:01:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/40231/</loc>
		<lastmod>2025-09-22T02:56:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41892/</loc>
		<lastmod>2025-08-19T05:37:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41972/</loc>
		<lastmod>2025-08-19T06:09:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41994/</loc>
		<lastmod>2025-08-19T06:27:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42007/</loc>
		<lastmod>2025-08-19T06:53:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42021/</loc>
		<lastmod>2025-08-19T06:58:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42043/</loc>
		<lastmod>2025-08-19T07:37:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42051/</loc>
		<lastmod>2025-08-19T07:46:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42054/</loc>
		<lastmod>2025-08-19T07:56:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42055/</loc>
		<lastmod>2025-08-19T08:02:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42060/</loc>
		<lastmod>2025-08-19T08:14:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42063/</loc>
		<lastmod>2025-08-19T08:23:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42066/</loc>
		<lastmod>2025-08-19T08:31:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42069/</loc>
		<lastmod>2025-08-19T08:48:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42072/</loc>
		<lastmod>2025-08-19T09:09:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42075/</loc>
		<lastmod>2025-08-19T09:19:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42078/</loc>
		<lastmod>2025-08-19T09:29:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42081/</loc>
		<lastmod>2025-08-19T09:37:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42084/</loc>
		<lastmod>2025-08-19T09:44:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42087/</loc>
		<lastmod>2025-08-19T09:51:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42092/</loc>
		<lastmod>2025-08-19T10:00:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42095/</loc>
		<lastmod>2025-08-19T10:07:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/inside-the-black-basta-hacker-group/</loc>
		<lastmod>2025-08-20T00:17:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/columbia-university-falls-victim-to-cyber-attack/</loc>
		<lastmod>2025-08-20T00:17:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42128/</loc>
		<lastmod>2025-08-20T02:09:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42140/</loc>
		<lastmod>2025-08-20T02:17:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42147/</loc>
		<lastmod>2025-08-20T02:26:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42151/</loc>
		<lastmod>2025-08-20T02:35:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42004/</loc>
		<lastmod>2025-08-20T03:01:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/41975/</loc>
		<lastmod>2025-08-20T03:03:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42154/</loc>
		<lastmod>2025-08-20T06:51:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42216/</loc>
		<lastmod>2025-08-20T07:12:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42227/</loc>
		<lastmod>2025-08-20T07:41:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42242/</loc>
		<lastmod>2025-08-20T08:11:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39886/</loc>
		<lastmod>2025-09-24T02:33:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39951/</loc>
		<lastmod>2025-09-24T02:28:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42248/</loc>
		<lastmod>2025-08-20T08:55:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/39600/</loc>
		<lastmod>2025-09-24T02:26:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42253/</loc>
		<lastmod>2025-08-20T09:16:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42257/</loc>
		<lastmod>2025-08-20T09:47:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42262/</loc>
		<lastmod>2025-08-20T09:54:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42265/</loc>
		<lastmod>2025-08-20T10:00:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42268/</loc>
		<lastmod>2025-08-20T10:07:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/miura-industries-unauthorized-access/</loc>
		<lastmod>2025-08-20T23:45:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/oakwa-ransomware-victim/</loc>
		<lastmod>2025-08-20T23:45:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42288/</loc>
		<lastmod>2025-08-21T02:02:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42291/</loc>
		<lastmod>2025-08-21T02:47:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42296/</loc>
		<lastmod>2025-08-21T02:57:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42299/</loc>
		<lastmod>2025-08-21T03:09:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42302/</loc>
		<lastmod>2025-08-21T03:26:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42321/</loc>
		<lastmod>2025-08-21T03:34:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42352/</loc>
		<lastmod>2025-08-21T04:13:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42359/</loc>
		<lastmod>2025-09-22T08:47:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42366/</loc>
		<lastmod>2025-08-21T05:49:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42380/</loc>
		<lastmod>2025-09-23T08:46:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/youtube%e5%8b%95%e7%94%bb%e3%82%92%e4%bd%bf%e3%81%a3%e3%81%a6%e5%81%bd%e8%a3%85%e3%83%88%e3%83%ac%e3%83%bc%e3%83%87%e3%82%a3%e3%83%b3%e3%82%b0%e3%83%9c%e3%83%83%e3%83%88%e3%82%92pr%e2%80%95%e6%9a%97/</loc>
		<lastmod>2025-08-21T06:24:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42386/</loc>
		<lastmod>2025-08-21T09:00:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42449/</loc>
		<lastmod>2025-08-21T09:06:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42451/</loc>
		<lastmod>2025-08-21T09:14:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42454/</loc>
		<lastmod>2025-08-21T09:21:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42457/</loc>
		<lastmod>2025-08-21T09:25:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42459/</loc>
		<lastmod>2025-08-21T09:34:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42462/</loc>
		<lastmod>2025-08-21T09:43:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42464/</loc>
		<lastmod>2025-08-22T01:07:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42468/</loc>
		<lastmod>2025-08-22T01:22:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42471/</loc>
		<lastmod>2025-08-22T01:32:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42479/</loc>
		<lastmod>2025-08-22T01:51:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42482/</loc>
		<lastmod>2025-08-22T02:00:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42485/</loc>
		<lastmod>2025-08-22T02:11:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42488/</loc>
		<lastmod>2025-08-22T02:23:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42492/</loc>
		<lastmod>2025-08-22T02:55:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/raymay-fujii-unauthorized-access/</loc>
		<lastmod>2025-08-22T03:14:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42510/</loc>
		<lastmod>2025-08-22T03:06:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/colt-technology-services-cyber-attack-victim/</loc>
		<lastmod>2025-08-22T03:15:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42520/</loc>
		<lastmod>2025-08-22T03:13:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42534/</loc>
		<lastmod>2025-08-22T03:24:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42540/</loc>
		<lastmod>2025-08-22T03:36:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42543/</loc>
		<lastmod>2025-08-22T03:42:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42547/</loc>
		<lastmod>2025-08-22T08:59:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42546/</loc>
		<lastmod>2025-08-22T03:55:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42550/</loc>
		<lastmod>2025-08-22T04:03:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42557/</loc>
		<lastmod>2025-08-22T06:31:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42592/</loc>
		<lastmod>2025-08-22T07:09:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42244/</loc>
		<lastmod>2025-08-22T07:11:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42148/</loc>
		<lastmod>2025-09-22T08:57:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42623/</loc>
		<lastmod>2025-08-22T07:20:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42628/</loc>
		<lastmod>2025-08-22T07:34:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42636/</loc>
		<lastmod>2025-08-22T07:45:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42644/</loc>
		<lastmod>2025-08-22T07:52:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42651/</loc>
		<lastmod>2025-08-22T08:01:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42656/</loc>
		<lastmod>2025-08-22T08:08:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42660/</loc>
		<lastmod>2025-08-22T08:25:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42670/</loc>
		<lastmod>2025-08-22T08:31:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42676/</loc>
		<lastmod>2025-08-22T08:36:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42683/</loc>
		<lastmod>2025-08-22T08:44:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42689/</loc>
		<lastmod>2025-08-22T08:52:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42574/</loc>
		<lastmod>2025-08-22T08:55:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42696/</loc>
		<lastmod>2025-08-22T09:01:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42700/</loc>
		<lastmod>2025-08-22T09:12:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/new-cyber-attacks-targeting-websites-67-per-second-double-the-number-from-the-previous-year/</loc>
		<lastmod>2025-08-25T02:46:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/system-failure-at-nippon-plast-due-to-cyber-attack/</loc>
		<lastmod>2025-08-25T02:47:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42722/</loc>
		<lastmod>2025-08-26T08:50:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42778/</loc>
		<lastmod>2025-08-25T05:52:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42860/</loc>
		<lastmod>2025-08-26T02:55:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42861/</loc>
		<lastmod>2025-08-26T02:54:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42863/</loc>
		<lastmod>2025-08-26T02:54:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42918/</loc>
		<lastmod>2025-09-22T06:41:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42934/</loc>
		<lastmod>2025-08-27T05:59:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42862/</loc>
		<lastmod>2025-08-26T02:54:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42877/</loc>
		<lastmod>2025-08-25T10:44:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42865/</loc>
		<lastmod>2025-08-25T10:43:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42879/</loc>
		<lastmod>2025-08-25T10:42:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42883/</loc>
		<lastmod>2025-08-25T10:41:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42884/</loc>
		<lastmod>2025-08-25T10:53:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/42885/</loc>
		<lastmod>2025-08-26T02:53:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/research/rouei-news-ishiki/</loc>
		<lastmod>2025-08-25T23:36:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/gurunavi-member-information-leaked-stolen-passwords-used-to-log-in-illegally/</loc>
		<lastmod>2025-08-26T00:43:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kanto-regional-development-bureaus-email-server-is-illegally-used/</loc>
		<lastmod>2025-08-26T00:43:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43032/</loc>
		<lastmod>2025-08-26T08:59:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43052/</loc>
		<lastmod>2025-08-26T02:52:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43053/</loc>
		<lastmod>2025-08-26T02:51:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43103/</loc>
		<lastmod>2025-08-26T09:02:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43054/</loc>
		<lastmod>2025-08-26T03:09:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43055/</loc>
		<lastmod>2025-08-26T03:16:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43056/</loc>
		<lastmod>2025-08-26T03:59:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43057/</loc>
		<lastmod>2025-08-26T04:15:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43058/</loc>
		<lastmod>2025-08-26T04:21:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43059/</loc>
		<lastmod>2025-08-26T04:33:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43060/</loc>
		<lastmod>2025-08-26T04:45:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43061/</loc>
		<lastmod>2025-08-26T04:59:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43171/</loc>
		<lastmod>2025-08-26T05:12:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43173/</loc>
		<lastmod>2025-08-26T05:18:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43174/</loc>
		<lastmod>2025-08-26T05:23:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43175/</loc>
		<lastmod>2025-08-26T05:27:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43176/</loc>
		<lastmod>2025-08-26T05:29:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43177/</loc>
		<lastmod>2025-08-26T05:31:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43062/</loc>
		<lastmod>2025-08-26T05:34:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43192/</loc>
		<lastmod>2025-08-26T05:39:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43235/</loc>
		<lastmod>2025-09-23T08:44:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43242/</loc>
		<lastmod>2025-08-26T08:58:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43193/</loc>
		<lastmod>2025-08-26T07:19:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43194/</loc>
		<lastmod>2025-08-26T07:22:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43195/</loc>
		<lastmod>2025-08-26T08:26:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43196/</loc>
		<lastmod>2025-08-26T08:19:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43198/</loc>
		<lastmod>2025-08-26T08:18:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43199/</loc>
		<lastmod>2025-08-26T08:15:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43197/</loc>
		<lastmod>2025-08-26T08:14:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43200/</loc>
		<lastmod>2025-08-26T08:13:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43201/</loc>
		<lastmod>2025-08-26T08:13:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43258/</loc>
		<lastmod>2025-08-26T08:12:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43259/</loc>
		<lastmod>2025-08-26T08:30:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43261/</loc>
		<lastmod>2025-08-26T08:39:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43387/</loc>
		<lastmod>2025-08-26T08:58:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/over-142-million-phishing-scams-detected-including-those-stealing-face-and-fingerprint-data/</loc>
		<lastmod>2025-08-27T02:35:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shibaura-institute-of-technology-unauthorized-access/</loc>
		<lastmod>2025-08-27T02:36:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43408/</loc>
		<lastmod>2025-08-27T02:38:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43409/</loc>
		<lastmod>2025-08-27T02:38:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43410/</loc>
		<lastmod>2025-08-27T02:43:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43411/</loc>
		<lastmod>2025-08-27T03:02:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43412/</loc>
		<lastmod>2025-08-27T03:04:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43413/</loc>
		<lastmod>2025-08-27T03:10:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43414/</loc>
		<lastmod>2025-08-27T03:18:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43415/</loc>
		<lastmod>2025-08-27T03:22:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43416/</loc>
		<lastmod>2025-08-27T03:29:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43417/</loc>
		<lastmod>2025-08-27T03:34:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43537/</loc>
		<lastmod>2025-09-03T08:00:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43418/</loc>
		<lastmod>2025-08-27T04:57:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43419/</loc>
		<lastmod>2025-08-27T05:02:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43420/</loc>
		<lastmod>2025-08-27T05:12:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43336/</loc>
		<lastmod>2025-08-27T06:09:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43677/</loc>
		<lastmod>2025-09-22T08:46:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43687/</loc>
		<lastmod>2025-08-27T09:08:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/yamato-transport-fake-emails-are-getting-more-sophisticated-qr-codes-and-app-updates-are-signs-of-fraud/</loc>
		<lastmod>2025-08-28T00:54:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/phishing-scams-on-the-rise-again-exceeding-220000-cases-per-month-tactics-include-requests-to-set-up-multi-factor-authentication-and-information-regarding-compensation/</loc>
		<lastmod>2025-08-28T00:54:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43526/</loc>
		<lastmod>2025-08-28T06:43:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43814/</loc>
		<lastmod>2025-08-28T03:35:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43556/</loc>
		<lastmod>2025-09-03T08:14:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43552/</loc>
		<lastmod>2025-09-03T08:07:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43544/</loc>
		<lastmod>2025-08-28T06:41:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43541/</loc>
		<lastmod>2025-09-03T08:02:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43858/</loc>
		<lastmod>2025-08-28T09:05:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-attacks-have-become-127-more-sophisticated-traditional-security-measures-are-no-longer-sufficient/</loc>
		<lastmod>2025-08-29T00:21:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/stationery-manufacturers-website-suffers-unauthorized-access/</loc>
		<lastmod>2025-08-29T00:21:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43879/</loc>
		<lastmod>2025-09-23T06:48:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43902/</loc>
		<lastmod>2025-09-23T06:41:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/security-guide-for-sme-2025/</loc>
		<lastmod>2025-10-16T01:17:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43919/</loc>
		<lastmod>2026-01-13T09:47:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43943/</loc>
		<lastmod>2025-09-23T06:40:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43955/</loc>
		<lastmod>2025-09-23T06:41:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43964/</loc>
		<lastmod>2025-09-23T06:42:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43973/</loc>
		<lastmod>2025-08-29T08:13:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44107/</loc>
		<lastmod>2025-08-29T09:00:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44077/</loc>
		<lastmod>2026-01-15T06:27:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44129/</loc>
		<lastmod>2025-08-29T10:41:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%83%96%e3%83%a9%e3%83%b3%e3%83%89%e5%93%81%e3%81%ae%e5%81%bd%e9%80%a0%e3%83%ac%e3%82%b7%e3%83%bc%e3%83%88%e3%82%92%e7%94%9f%e6%88%90%e3%81%99%e3%82%8b%e3%82%b8%e3%82%a7%e3%83%8d%e3%83%ac%e3%83%bc/</loc>
		<lastmod>2025-08-29T14:29:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e7%94%9f%e6%88%90ai%e3%81%8c%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e6%94%bb%e6%92%83%e3%81%a7%e6%82%aa%e7%94%a8%e3%81%95%e3%82%8c%e3%81%a6%e3%81%84%e3%82%8b%e5%85%b7%e4%bd%93%e7%9a%84%e3%81%aa%e5%ae%9f/</loc>
		<lastmod>2025-08-31T09:19:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/configuration-error-during-security-update-targeted-by-unauthorized-access-information-leak-unknown-accreative/</loc>
		<lastmod>2025-09-01T00:39:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nagoya-industrial-promotion-corporations-email-address-misused-by-a-third-party/</loc>
		<lastmod>2025-09-01T00:39:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/52-of-companies-are-polarized-between-those-who-use-and-those-who-ban-ai-trade-secret-leaks-have-increased-sharply-in-the-past-five-years/</loc>
		<lastmod>2025-09-02T00:42:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/large-scale-unauthorized-access-to-energy-service-company-3-06-million-customer-points-also-misused/</loc>
		<lastmod>2025-09-02T00:42:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/2025-what-we-should-do/</loc>
		<lastmod>2025-09-02T18:30:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/2203-personal-details-revealed-on-online-gift-service-anygift/</loc>
		<lastmod>2025-09-03T00:09:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/osaki-medicals-system-infected-with-ransomware/</loc>
		<lastmod>2025-09-03T00:10:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43914/</loc>
		<lastmod>2025-09-03T01:33:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44015/</loc>
		<lastmod>2025-09-03T01:37:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44035/</loc>
		<lastmod>2025-09-03T01:39:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/43966/</loc>
		<lastmod>2025-09-03T01:42:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44098/</loc>
		<lastmod>2026-04-23T10:52:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44244/</loc>
		<lastmod>2025-09-03T08:22:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44262/</loc>
		<lastmod>2025-09-03T09:48:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/440-personal-information-entries-on-city-website-we-will-thoroughly-verify-them-with-multiple-staff-members-from-now-on-hiroshima-prefecture/</loc>
		<lastmod>2025-09-04T02:01:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/printer-security-survey-86-concerned-about-the-risk-of-information-leakage-when-disposing-of-printers/</loc>
		<lastmod>2025-09-04T02:02:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44368/</loc>
		<lastmod>2025-09-23T06:31:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44389/</loc>
		<lastmod>2025-09-04T09:53:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ryochi-management-unauthorized-access/</loc>
		<lastmod>2025-09-05T00:57:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kibi-kogen-medical-rehabilitation-center-two-cases-of-personal-information-leaks/</loc>
		<lastmod>2025-09-05T01:03:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44375/</loc>
		<lastmod>2025-09-05T01:18:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44482/</loc>
		<lastmod>2025-09-05T08:49:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44507/</loc>
		<lastmod>2025-09-23T08:21:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44506/</loc>
		<lastmod>2026-02-18T04:33:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44524/</loc>
		<lastmod>2025-09-09T07:32:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44521/</loc>
		<lastmod>2026-02-18T07:57:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44542/</loc>
		<lastmod>2026-01-14T09:42:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44468/</loc>
		<lastmod>2025-09-05T08:51:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e3%82%bb%e3%82%ad%e3%83%a5%e3%83%aa%e3%83%86%e3%82%a3%e3%83%81%e3%83%bc%e3%83%a0%e3%83%a1%e3%83%b3%e3%83%90%e3%83%bc%e3%81%ae%e8%a7%a3%e9%9b%87%e3%82%92%e8%a6%81%e6%b1%82-%e3%80%8c%e3%83%86/</loc>
		<lastmod>2025-09-07T11:57:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-attack-takes-over-dam-for-four-hours-water-is-released-fear-and-anxiety-among-citizens-norway/</loc>
		<lastmod>2025-09-08T00:55:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/wetmaster-ransomware-damage/</loc>
		<lastmod>2025-09-08T00:55:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44652/</loc>
		<lastmod>2025-09-17T03:06:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sakai-city-cultural-promotion-foundation-information-leak/</loc>
		<lastmod>2025-09-09T01:27:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-the-visiphone-store/</loc>
		<lastmod>2025-09-09T01:28:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/miura-industry-cyber-attack/</loc>
		<lastmod>2025-09-10T00:55:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mitsuuroko-information-leak/</loc>
		<lastmod>2025-09-10T00:56:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cybersecurity-olympiad-2025-award-kichiji/</loc>
		<lastmod>2025-09-09T17:20:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/comedy-group-doburoku-instagram-account-hacked-recovery-continues/</loc>
		<lastmod>2025-09-11T01:09:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/government-agencies-urge-users-not-to-spread-security-vulnerabilities-if-they-are-discovered-as-they-could-be-exploited/</loc>
		<lastmod>2025-09-11T01:09:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/35844/</loc>
		<lastmod>2025-09-22T08:39:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/suspected-unauthorized-access-to-shingaku-navi-website-for-personal-information-leaked-over-a-total-of-3-years-and-2-months/</loc>
		<lastmod>2025-09-11T22:11:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/concrete-technology-research-group-keeps-personal-information-secret-for-two-years-and-three-months/</loc>
		<lastmod>2025-09-11T22:15:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44900/</loc>
		<lastmod>2025-12-25T02:08:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44914/</loc>
		<lastmod>2025-10-30T02:45:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44920/</loc>
		<lastmod>2026-04-21T05:05:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44968/</loc>
		<lastmod>2026-03-17T03:26:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44967/</loc>
		<lastmod>2026-04-21T02:04:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/44983/</loc>
		<lastmod>2026-03-17T04:33:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/45009/</loc>
		<lastmod>2025-10-30T02:46:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/45024/</loc>
		<lastmod>2025-10-30T02:46:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/45039/</loc>
		<lastmod>2026-03-17T05:50:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e9%96%8b%e7%99%ba%e8%80%85%e3%82%92%e7%8b%99%e3%81%a3%e3%81%9f%e5%b7%a7%e5%a6%99%e3%81%aa%e6%94%bb%e6%92%83%e3%81%8c%e7%a2%ba%e8%aa%8d%e3%81%95%e3%82%8c%e3%82%8b%e3%80%80%e3%83%9e%e3%83%ab%e3%83%90/</loc>
		<lastmod>2025-09-13T12:54:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-wool-textile-suffers-from-unauthorized-access/</loc>
		<lastmod>2025-09-16T00:31:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/236450-pieces-of-information-may-have-been-stolen-from-a-ticket-sales-system-community-network/</loc>
		<lastmod>2025-09-16T00:31:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/a-students-personal-information-was-found-in-a-photo-promoting-a-dating-app-by-an-education-board-employee-in-tottori-prefecture/</loc>
		<lastmod>2025-09-17T00:13:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/concrete-product-manufacturer-says-communication-delays-may-occur-due-to-ransomware-damage/</loc>
		<lastmod>2025-09-17T00:14:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kyoto-institute-of-technology-information-leak/</loc>
		<lastmod>2025-09-18T00:32:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tezukayama-gakuin-university-unauthorized-access/</loc>
		<lastmod>2025-09-18T00:33:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/google%e3%80%8c%e8%84%85%e8%bf%ab%e3%80%8d%e3%81%aescattered-lapsus-hunters%e3%81%8c%e7%aa%81%e7%84%b6%e3%81%ae%e6%b4%bb%e5%8b%95%e4%bc%91%e6%ad%a2%e5%ae%a3%e8%a8%80%e3%80%80%e4%bd%95%e3%81%8b/</loc>
		<lastmod>2025-09-20T23:00:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kering-sa-unauthorized-access/</loc>
		<lastmod>2025-09-24T00:08:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-kuretakeso/</loc>
		<lastmod>2025-09-24T00:09:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hello-gym-information-leak/</loc>
		<lastmod>2025-09-24T22:26:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/starbucks-cyber-attack/</loc>
		<lastmod>2025-09-24T22:19:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46279/</loc>
		<lastmod>2026-02-25T06:16:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46327/</loc>
		<lastmod>2025-09-25T07:03:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/scattered-spider%e3%81%8c%e7%8a%af%e8%a1%8c%e3%82%92%e4%b8%bb%e5%bc%b5%e3%81%99%e3%82%8b%e3%83%a9%e3%82%b9%e3%83%99%e3%82%ac%e3%82%b9%e3%81%ae%e3%82%ab%e3%82%b8%e3%83%8e%e3%81%b8%e3%81%ae%e3%82%b5/</loc>
		<lastmod>2025-09-25T14:26:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/57-of-japanese-companies-plan-to-increase-investment-in-api-security-over-the-next-year-security-survey/</loc>
		<lastmod>2025-09-25T23:58:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-at-pasona/</loc>
		<lastmod>2025-09-26T00:01:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46368/</loc>
		<lastmod>2025-10-06T02:36:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46407/</loc>
		<lastmod>2025-10-09T01:07:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46355/</loc>
		<lastmod>2025-09-26T02:40:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46423/</loc>
		<lastmod>2025-10-09T01:15:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46429/</loc>
		<lastmod>2025-10-10T01:55:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46441/</loc>
		<lastmod>2025-10-09T01:07:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46421/</loc>
		<lastmod>2026-02-24T07:33:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/59-of-cyber-attack-recovery-costs-exceed-10-million-yen-1-71-million-phishing-reports-per-year/</loc>
		<lastmod>2025-09-28T22:41:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/university-website-altered-to-online-casino-site-tokyo-university-of-foreign-studies/</loc>
		<lastmod>2025-09-28T22:42:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46485/</loc>
		<lastmod>2025-10-09T01:13:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46488/</loc>
		<lastmod>2025-10-09T01:13:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46496/</loc>
		<lastmod>2025-10-10T02:53:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e8%a2%ab%e5%ae%b3%e4%bc%81%e6%a5%ad%e3%81%8c%e4%bb%8a%e5%b9%b4%e4%b8%8a%e5%8d%8a%e6%9c%9f%e3%81%af%e5%a4%a7%e5%b9%85%e5%a2%97%e5%8a%a0/</loc>
		<lastmod>2025-09-29T12:41:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/pbr-lending-unauthorized-removal-of-information/</loc>
		<lastmod>2025-09-29T23:48:08+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tenryu-saw-manufacturing-ransomware-damage/</loc>
		<lastmod>2025-09-29T23:48:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/autonomous-security-is-becoming-a-reality-will-there-be-no-need-for-security-personnel-anymore/</loc>
		<lastmod>2025-09-30T23:54:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/diamond-electric-holdings-unauthorized-access/</loc>
		<lastmod>2025-09-30T23:54:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46565/</loc>
		<lastmod>2025-10-09T03:48:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-niigatas-famous-sweets-sasa-dango/</loc>
		<lastmod>2025-10-02T01:02:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/duel-masters-junior-grand-prix-information-leak/</loc>
		<lastmod>2025-10-02T01:03:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46603/</loc>
		<lastmod>2025-10-09T01:16:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/otomoni-information-leak/</loc>
		<lastmod>2025-10-02T23:36:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/takeuchi-manufacturing-ransomware-damage/</loc>
		<lastmod>2025-10-02T23:36:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46706/</loc>
		<lastmod>2025-10-10T01:54:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/agh-insident-response/</loc>
		<lastmod>2025-10-28T06:46:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/41-of-schools-have-experienced-security-risks-due-to-ai-including-harmful-content/</loc>
		<lastmod>2025-10-06T03:26:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/harrods-hacked/</loc>
		<lastmod>2025-10-06T03:26:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46725/</loc>
		<lastmod>2025-10-09T01:04:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46789/</loc>
		<lastmod>2025-10-10T01:53:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/scattered-lapsus-hunters%e3%81%ae%e4%bb%95%e6%a5%ad%e3%81%8b-discord%e3%81%ae%e3%82%b5%e3%83%bc%e3%83%89%e3%83%91%e3%83%bc%e3%83%86%e3%82%a3%e3%82%ab%e3%82%b9%e3%82%bf%e3%83%9e%e3%83%bc/</loc>
		<lastmod>2025-10-06T23:08:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/discord-was-illegally-accessed-user-information-may-have-been-leaked/</loc>
		<lastmod>2025-10-07T00:23:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shimane-prefecture-multipurpose-facility-suffers-unauthorized-access/</loc>
		<lastmod>2025-10-07T00:21:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/heiwa-auto-group-hit-by-ransomware/</loc>
		<lastmod>2025-10-08T00:56:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/healthy-shoe-manufacturer-akaishi-illegally-accessed/</loc>
		<lastmod>2025-10-08T00:57:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/international-hacker-groups-begin-to-collaborate-claim-responsibility-for-the-theft-of-approximately-28000-records/</loc>
		<lastmod>2025-10-09T00:33:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/waseda-university-photographs-of-3418-applicants-leaked-we-didnt-understand-the-risks/</loc>
		<lastmod>2025-10-09T00:34:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46567/</loc>
		<lastmod>2025-10-09T07:31:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/iij%e3%82%92%e7%8b%99%e3%81%a3%e3%81%9f%e3%83%9e%e3%83%ab%e3%82%a6%e3%82%a7%e3%82%a2%e9%85%8d%e5%b8%83%e3%82%ad%e3%83%a3%e3%83%b3%e3%83%9a%e3%83%bc%e3%83%b3%e3%80%80%e8%91%97%e4%bd%9c%e6%a8%a9/</loc>
		<lastmod>2025-10-09T12:37:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/asahi-holdings-cyber-attack-latest-information-hacker-group-involvement-domestic-impact-etc/</loc>
		<lastmod>2025-10-10T01:06:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hackers-publish-huawei-data-stolen-on-illegal-message-board/</loc>
		<lastmod>2025-10-10T01:07:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46899/</loc>
		<lastmod>2025-10-10T02:12:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46922/</loc>
		<lastmod>2025-10-10T03:12:53+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46925/</loc>
		<lastmod>2025-10-10T06:37:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46931/</loc>
		<lastmod>2025-10-10T09:02:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46942/</loc>
		<lastmod>2025-10-13T08:09:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46940/</loc>
		<lastmod>2025-10-13T08:09:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/raas%e3%81%8b%e3%82%89eaas%e3%81%b8%e3%80%80%e3%83%93%e3%82%b8%e3%83%8d%e3%82%b9%e5%8c%96%e3%81%95%e3%82%8c%e3%82%8b%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e6%81%90%e5%96%9d/</loc>
		<lastmod>2025-10-13T10:43:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/crow-discovers-leak-of-personal-information-medical-information-including-brain-ct-images-aichi-prefecture/</loc>
		<lastmod>2025-10-13T23:20:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kumamoto-prefectural-police-unauthorized-access-and-hijacking-approximately-120000-emails-leaked-to-outside/</loc>
		<lastmod>2025-10-13T23:21:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hacker-group-claims-to-have-launched-a-cyber-attack-on-nintendo-sparking-concerns/</loc>
		<lastmod>2025-10-14T23:27:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/real-estate-agent-finds-out-about-6100-personal-information-records-were-sold-after-unauthorized-access/</loc>
		<lastmod>2025-10-14T23:28:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46632/</loc>
		<lastmod>2025-10-15T02:07:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46609/</loc>
		<lastmod>2025-10-16T06:38:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47043/</loc>
		<lastmod>2025-10-15T06:29:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47048/</loc>
		<lastmod>2025-10-15T07:12:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/whitepaper/edr-sentinelone-vs-windowsdifender/</loc>
		<lastmod>2025-10-15T20:54:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e4%bb%bb%e5%a4%a9%e5%a0%82%e3%81%b8%e3%81%ae%e4%be%b5%e5%ae%b3%e3%82%92%e4%b8%bb%e5%bc%b5%e3%81%97%e3%81%a6%e3%81%84%e3%82%8bcrimson-collective%e3%81%a8%e3%81%af%e4%bd%95%e8%80%85%e3%81%aa%e3%81%ae/</loc>
		<lastmod>2025-10-15T14:11:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/whitepaper/2025-ipa-edr-compare/</loc>
		<lastmod>2025-10-16T01:23:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/research/asahi-1st-response/</loc>
		<lastmod>2025-10-21T02:40:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kyocera-kanden-energy-llc-suffers-from-unauthorized-access/</loc>
		<lastmod>2025-10-15T23:35:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-attacks-targeting-manufacturing-sector-increase-30-year-on-year-averaging-1585-attacks-per-week/</loc>
		<lastmod>2025-10-15T23:36:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/crimson-collective-nintendo/</loc>
		<lastmod>2025-10-16T01:14:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/cybereason-levelblue-ma-risk/</loc>
		<lastmod>2025-11-04T06:54:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/46693/</loc>
		<lastmod>2025-10-16T01:43:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/okayama-prefectures-websites-go-offline-one-after-another-due-to-unauthorized-access-with-damage-including-tampering/</loc>
		<lastmod>2025-10-16T23:46:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-attacks-environments-where-new-and-old-systems-coexist-are-prime-targets-education-sector-stands-out-with-an-average-of-4175-attacks-per-week/</loc>
		<lastmod>2025-10-16T23:46:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/don-quijote-hit-by-ransomware/</loc>
		<lastmod>2025-10-19T17:30:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-attack-on-askul/</loc>
		<lastmod>2025-10-19T17:31:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47207/</loc>
		<lastmod>2025-10-20T09:21:26+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47148/</loc>
		<lastmod>2025-10-20T09:23:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47137/</loc>
		<lastmod>2025-10-20T09:28:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47033/</loc>
		<lastmod>2025-10-20T09:35:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/askul-cyber-attack-202510/</loc>
		<lastmod>2025-10-31T01:55:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/why-japan-company-got-attacked/</loc>
		<lastmod>2025-10-20T22:42:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sekisho-career-plus-cyber-attack/</loc>
		<lastmod>2025-10-21T00:45:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/reports-of-phishing-scams-increased-by-approximately-30000-from-the-previous-month-including-new-cases-of-census-fraud/</loc>
		<lastmod>2025-10-21T00:52:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/ppi-ransomeware/</loc>
		<lastmod>2025-10-21T06:45:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/why-we-should-not-choose-consulting-firm/</loc>
		<lastmod>2025-10-21T06:42:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-attack-on-askul-spreads-to-muji-loft-line-and-medical-facilities/</loc>
		<lastmod>2025-10-21T17:26:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/large-scale-amazon-outage-affects-over-2000-companies-worldwide/</loc>
		<lastmod>2025-10-21T17:27:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-security-forum-2025-winter/</loc>
		<lastmod>2025-10-28T21:43:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-hacker-group-qilin-that-attacked-asahi-anyone-can-become-a-hacker-if-they-pay/</loc>
		<lastmod>2025-10-23T00:47:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nomura-securities-ransomware-damage/</loc>
		<lastmod>2025-10-23T00:48:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/beware-of-phishing-scams-disguised-as-a-halloween-campaign-that-aim-to-steal-your-personal-information/</loc>
		<lastmod>2025-10-24T00:20:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/personal-information-for-188-patients-was-found-problem-discovered-after-multiple-contacts-from-outside-sources-tama-general-medical-center/</loc>
		<lastmod>2025-10-24T00:21:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/wikileaks%e3%82%92%e7%9c%9f%e4%bc%bc%e3%81%9fwikileaksv2%e3%81%a8qilin%e3%83%a9%e3%83%b3%e3%82%b5%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2/</loc>
		<lastmod>2025-10-25T23:15:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/south-korean-telecommunications-giant-kt-suffers-cyberattack/</loc>
		<lastmod>2025-10-27T00:52:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sanae-takaichi-targeted-with-fake-ai-impersonating-the-prime-minister-liberal-democratic-party-issues-warning-about-personal-information-theft/</loc>
		<lastmod>2025-10-27T00:53:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47395/</loc>
		<lastmod>2025-10-27T07:50:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47401/</loc>
		<lastmod>2025-10-27T08:03:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47404/</loc>
		<lastmod>2025-10-27T08:28:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47409/</loc>
		<lastmod>2025-10-27T08:45:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mens-clothing-retailer-haruyama-suffers-cyberattack-personal-information-of-18053-customers-and-business-partners-may-have-been-leaked/</loc>
		<lastmod>2025-10-28T01:45:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/a-school-in-kyoto-was-hit-by-a-cyberattack-rendering-the-computers-of-approximately-100-teachers-and-staff-members-unusable/</loc>
		<lastmod>2025-10-28T01:50:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/gmail-leaking-202510/</loc>
		<lastmod>2025-10-28T06:42:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/seminar/securityx2025winter/</loc>
		<lastmod>2026-01-09T02:01:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/how-to-incident-response/</loc>
		<lastmod>2025-10-29T01:49:17+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/youtube-3000-videos-spreading-viruses-personal-information-is-being-stolen/</loc>
		<lastmod>2025-10-29T02:38:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/habatan-pay-information-leak/</loc>
		<lastmod>2025-10-29T02:39:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-detected-at-axa-general-insurance/</loc>
		<lastmod>2025-10-30T02:23:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nintendo-man-illegally-purchases-games-using-someone-elses-credit-card-i-did-it-because-i-wanted-them/</loc>
		<lastmod>2025-10-30T02:24:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47497/</loc>
		<lastmod>2025-10-30T07:37:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47499/</loc>
		<lastmod>2025-10-30T07:51:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47501/</loc>
		<lastmod>2025-10-30T08:06:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47506/</loc>
		<lastmod>2025-10-30T09:31:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e6%97%a5%e6%9c%ac%e3%81%ab%e3%82%b9%e3%83%9f%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0%e3%81%ae%e3%83%9c%e3%83%83%e3%83%88%e3%83%8d%e3%83%83%e3%83%88%e3%80%81%e6%84%9f%e6%9f%93%e3%82%b9%e3%83%9e%e3%83%9b/</loc>
		<lastmod>2025-10-30T10:52:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/askul-ransomehouse/</loc>
		<lastmod>2025-10-31T01:34:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/dentsu-reportedly-hit-by-a-cyberattack-thousands-of-people-expected-to-be-affected/</loc>
		<lastmod>2025-10-31T02:30:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/a-junior-high-school-teacher-was-found-drunk-and-passed-out-on-the-street-and-subsequently-lost-a-backpack-containing-student-information-kanagawa-prefecture/</loc>
		<lastmod>2025-10-31T02:30:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/sentinelone-downtime-zero/</loc>
		<lastmod>2025-10-31T07:44:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e3%83%a6%e3%83%8b%e3%83%90%e3%83%bc%e3%82%b5%e3%83%ab%e3%83%9f%e3%83%a5%e3%83%bc%e3%82%b8%e3%83%83%e3%82%af%e3%82%b8%e3%83%a3%e3%83%91%e3%83%b3%e3%81%aeec%e3%82%b5%e3%82%a4%e3%83%88%e3%80%80%e4%be%b5/</loc>
		<lastmod>2025-10-31T13:28:29+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/seiyu-unauthorized-access/</loc>
		<lastmod>2025-11-04T01:27:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/saison-fukuriko-unauthorized-access/</loc>
		<lastmod>2025-11-04T01:28:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/anthropic-claude-code-risk/</loc>
		<lastmod>2025-11-21T05:32:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/asahis-cyber-attack-what-are-people-saying-a-summary-of-comments-from-consumers-businesses-and-experts/</loc>
		<lastmod>2025-11-05T01:25:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyberattack-victim-vulcanize-london/</loc>
		<lastmod>2025-11-05T01:25:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e8%84%85%e5%a8%81%e3%82%a2%e3%82%af%e3%82%bf%e3%83%bckaruhunters%e3%81%8ciij%e3%81%b8%e3%81%ae%e4%be%b5%e5%ae%b3%e3%82%92%e4%b8%bb%e5%bc%b5%e3%81%97%e3%81%a6%e3%81%84%e3%82%8b%e3%81%a8%e3%81%ae/</loc>
		<lastmod>2025-11-05T13:58:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/enesance-holdings-suffers-cyberattack/</loc>
		<lastmod>2025-11-06T01:22:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nikkei-newspaper-infected-with-ransomware/</loc>
		<lastmod>2025-11-06T01:23:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mino-industries-suffers-cyberattack/</loc>
		<lastmod>2025-11-07T01:03:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/seino-transportation-company-suffers-unauthorized-access/</loc>
		<lastmod>2025-11-07T01:03:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e5%a2%97%e5%a4%a7%e3%81%99%e3%82%8b%e8%8b%a5%e5%b9%b4%e5%b1%a4%e3%81%ae%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e6%94%bb%e6%92%83%e8%80%85%e3%81%ab%e3%82%88%e3%82%8b%e8%84%85%e5%a8%81%e3%80%80%e8%83%8c/</loc>
		<lastmod>2025-11-08T02:57:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/bandai-channel-unauthorized-access/</loc>
		<lastmod>2025-11-10T01:15:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/10-5-billion-accesses-in-two-months-ai-bots-easily-bypass-traditional-security-measures/</loc>
		<lastmod>2025-11-10T01:16:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/leading-manufacturer-of-low-thermal-expansion-alloys-suffers-ransomware-attack/</loc>
		<lastmod>2025-11-11T00:56:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hot-pot-restaurant-website-detects-unusual-access-revealing-unauthorized-access/</loc>
		<lastmod>2025-11-11T00:57:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-at-the-national-library/</loc>
		<lastmod>2025-11-12T01:23:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-targeting-teleworkers-on-the-rise-accounting-for-approximately-62-of-infection-routes-national-police-agency/</loc>
		<lastmod>2025-11-12T01:23:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/malicious-scans-search-for-544-million-security-vulnerabilities/</loc>
		<lastmod>2025-11-13T01:03:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-five-elementary-and-junior-high-schools-approximately-16000-records-leaked-gifu-prefecture/</loc>
		<lastmod>2025-11-13T01:04:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-gift-service-giftee/</loc>
		<lastmod>2025-11-14T00:49:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shinshu-university-administrative-staff-embezzle-supporters-fees-and-other-misappropriations-over-10-years/</loc>
		<lastmod>2025-11-14T00:50:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/former-intel-engineer-steals-approximately-18000-documents/</loc>
		<lastmod>2025-11-17T01:31:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cable-tv-kani-ransomware-victim/</loc>
		<lastmod>2025-11-17T01:32:30+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/47708/</loc>
		<lastmod>2025-11-17T03:55:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/approximately-15-million-app-attacks-per-second/</loc>
		<lastmod>2025-11-18T01:49:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tokai-university-hit-by-ransomware-again/</loc>
		<lastmod>2025-11-18T01:50:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e6%97%a5%e6%9c%ac%e3%80%81%e9%9f%93%e5%9b%bd%e3%80%81%e4%b8%ad%e5%9b%bd%e3%81%aa%e3%81%a9%e3%82%92%e6%a8%99%e7%9a%84%e3%81%ab%e3%81%97%e3%81%a6%e3%81%84%e3%82%8bapt-c-60%e3%81%a8%e3%81%af/</loc>
		<lastmod>2025-11-18T13:01:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-takes-second-place-in-security-competition-held-in-over-80-countries-first-time-it-is-held-in-japan/</loc>
		<lastmod>2025-11-19T01:00:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hiroshima-institute-of-technology-cyber-attack/</loc>
		<lastmod>2025-11-19T00:57:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/83-of-organizations-that-paid-ransomware-are-being-attacked-again/</loc>
		<lastmod>2025-11-20T00:36:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ntt-data-mishandling-information-on-530-companies-and-991-individuals-leaked-to-outside-parties-hokkaido/</loc>
		<lastmod>2025-11-20T00:36:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-is-not-over-major-hacker-group-returns-number-of-victims-reaches-new-high/</loc>
		<lastmod>2025-11-20T23:58:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cl0p%e3%83%8f%e3%83%83%e3%82%ad%e3%83%b3%e3%82%b0%e3%82%b0%e3%83%ab%e3%83%bc%e3%83%97%e3%81%8c%e3%83%9e%e3%83%84%e3%83%80%e3%82%84%e3%82%ad%e3%83%a3%e3%83%8e%e3%83%b3%e3%80%81%e4%bd%8f%e5%8f%8b/</loc>
		<lastmod>2025-11-21T15:13:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/apologize-for-photocreate/</loc>
		<lastmod>2025-11-27T00:49:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/japan-college-of-rheumatology-research-website-hacked/</loc>
		<lastmod>2025-11-26T01:14:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/nara-prefecture-personal-information-lost-during-census-69-households-affected/</loc>
		<lastmod>2025-11-26T01:15:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/%e6%96%b0%e6%bd%9f%e3%81%a8%e6%bb%8b%e8%b3%80%e3%81%a7%e3%83%9c%e3%82%a4%e3%82%b9%e3%83%95%e3%82%a3%e3%83%83%e3%82%b7%e3%83%b3%e3%82%b0%e3%81%ab%e3%82%88%e3%82%8b%e4%b8%8d%e6%ad%a3%e9%80%81%e9%87%91/</loc>
		<lastmod>2025-11-26T14:40:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/18-year-old-arrested-for-unauthorized-access-over-2100-times/</loc>
		<lastmod>2025-11-27T01:36:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/takushoku-universitys-website-defaced-with-online-casino-in-cyber-attack/</loc>
		<lastmod>2025-11-27T01:35:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-attack-at-gotemba-elementary-and-junior-high-school-personal-information-of-approximately-6000-students-may-be-leaked/</loc>
		<lastmod>2025-11-28T00:52:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/information-on-4360-people-leaked-from-national-diet-library-after-server-of-subcontractor-was-illegally-accessed/</loc>
		<lastmod>2025-11-28T00:52:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cloud-server-service-provider-suffers-from-unauthorized-access-personal-information-and-system-related-information-may-be-leaked/</loc>
		<lastmod>2025-12-01T04:07:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/personal-information-of-20-patients-posted-on-social-media-discovered-after-a-citizen-reported-it/</loc>
		<lastmod>2025-12-01T04:07:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/coupang-information-leak/</loc>
		<lastmod>2025-12-02T02:45:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-attack-on-juntendo-university/</loc>
		<lastmod>2025-12-02T02:45:47+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/an-external-accommodation-booking-site-was-illegally-accessed-and-users-personal-information-may-have-been-stolen-hotel-gracery-asakusa/</loc>
		<lastmod>2025-12-03T02:01:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/names-of-230-medical-professionals-were-made-accessible-due-to-a-settings-flaw-ai-pharma/</loc>
		<lastmod>2025-12-03T02:01:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/17-year-old-high-school-student-arrested-for-cyberattack-on-kaikatsu-club-after-warning-and-reporting-the-attack/</loc>
		<lastmod>2025-12-04T02:00:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/mitsubishi-paper-mills-personal-information-of-4209-people-leaked-due-to-unauthorized-access-by-a-third-party/</loc>
		<lastmod>2025-12-04T02:01:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/osaki-medical-cyber-attack/</loc>
		<lastmod>2025-12-04T23:50:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tamada-holdings-group-cyber-attack/</loc>
		<lastmod>2025-12-04T23:51:12+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-damage-koukou-gakuen/</loc>
		<lastmod>2025-12-08T02:12:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/a-third-party-tampered-with-a-business-computer-possibly-leaking-personal-information-of-students-employees-and-other-users-kyoritsu-maintenance/</loc>
		<lastmod>2025-12-08T02:13:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tamago-repeat-abnormal-access-detected-on-server-third-party-intrusion/</loc>
		<lastmod>2025-12-09T03:31:11+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-from-overseas-massive-emails-sent-to-external-parties-chubu-productivity-center/</loc>
		<lastmod>2025-12-09T03:31:33+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/jimoty-unauthorized-access-by-a-third-party/</loc>
		<lastmod>2025-12-10T01:46:36+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/former-toyota-city-employee-rakes-in-30-million-yen-using-residents-personal-information-for-side-business/</loc>
		<lastmod>2025-12-10T01:48:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hokkaido-university-graduate-school-of-information-science-and-technology-personal-information-removal/</loc>
		<lastmod>2025-12-11T03:29:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/personal-information-of-1315-tax-accountant-exam-candidates-was-made-public-for-approximately-11-years-tac/</loc>
		<lastmod>2025-12-11T03:30:13+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/tripla-unauthorized-access/</loc>
		<lastmod>2025-12-12T01:36:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kyoto-garden-palace-unauthorized-access/</loc>
		<lastmod>2025-12-12T01:36:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%83%9e%e3%83%ab%e3%82%a6%e3%82%a7%e3%82%a2%e3%82%aa%e3%83%9a%e3%83%ac%e3%83%bc%e3%82%bf%e3%83%bc%e3%81%ab%e4%ba%ba%e6%b0%97%e3%81%ae%e3%83%91%e3%83%83%e3%82%ab%e3%83%bc%e3%83%bb%e3%82%a2%e3%82%ba/</loc>
		<lastmod>2025-12-14T03:14:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/huis-ten-bosch-unauthorized-access/</loc>
		<lastmod>2025-12-15T02:18:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/edv-future-ransomware-victim/</loc>
		<lastmod>2025-12-17T17:43:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/security-forecast-reveals-ai-firewall-adoption-will-accelerate-in-2026/</loc>
		<lastmod>2025-12-17T17:42:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/this-time-theyre-targeting-names-and-addresses-a-new-mercari-phishing-site-has-been-discovered/</loc>
		<lastmod>2025-12-17T17:42:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/48286/</loc>
		<lastmod>2025-12-16T06:01:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/5707-cases-of-financial-assistance-applicant-information-leaked-accessible-from-outside-for-approximately-nine-months-iwate-prefecture/</loc>
		<lastmod>2025-12-17T17:42:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-kobac-vehicle-inspection/</loc>
		<lastmod>2025-12-17T17:42:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ai%e3%83%81%e3%83%a3%e3%83%83%e3%83%88%e3%81%ae%e5%86%85%e5%ae%b9%e3%82%92%e5%82%8d%e5%8f%97%e3%81%97%e3%81%a6%e3%83%87%e3%83%bc%e3%82%bf%e3%83%96%e3%83%ad%e3%83%bc%e3%82%ab%e3%83%bc%e3%82%92%e4%bb%8b/</loc>
		<lastmod>2025-12-17T14:32:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/3950-welfare-recipients-and-other-passengers-left-behind-on-information-train-shizuoka-city/</loc>
		<lastmod>2025-12-17T17:41:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/slashdot-japan-fake-website-warning/</loc>
		<lastmod>2025-12-17T17:41:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/the-biggest-challenges-in-the-human-less-security-field-are-revealed-including-ai-and-cloud-security-security-survey/</loc>
		<lastmod>2025-12-22T21:47:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/saitama-university-grades-of-8373-students-now-available-for-viewing-no-leaks/</loc>
		<lastmod>2025-12-22T21:47:35+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/48392/</loc>
		<lastmod>2025-12-19T04:16:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e4%bd%8e%e5%b9%b4%e9%bd%a2%e5%8c%96%e3%81%99%e3%82%8b%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e7%8a%af%e7%bd%aa%e2%80%95%e3%80%8c%e5%bf%ab%e6%b4%bbclub%e3%80%8d%e6%94%bb%e6%92%83%e3%81%a7%e9%80%ae/</loc>
		<lastmod>2025-12-21T06:06:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/pornhub-and-openai-are-facing-growing-concerns-over-unauthorized-access-and-user-data-leaks-mixpanel/</loc>
		<lastmod>2025-12-22T02:41:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/government-to-double-ai-personnel-to-strengthen-cyberattack-countermeasures-questions-raised-over-funding-source/</loc>
		<lastmod>2025-12-22T21:47:45+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-login-by-a-third-party-to-wowow/</loc>
		<lastmod>2025-12-22T21:49:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-gunma-prefecture-leisure-facility-website/</loc>
		<lastmod>2025-12-22T21:49:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/48436/</loc>
		<lastmod>2025-12-23T10:00:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-nissan-dealership/</loc>
		<lastmod>2025-12-25T01:54:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/sakata-seed-company-suffers-from-unauthorized-access-by-a-third-party/</loc>
		<lastmod>2025-12-24T01:43:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/48469/</loc>
		<lastmod>2025-12-24T06:47:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/48484/</loc>
		<lastmod>2025-12-24T09:41:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/if-things-continue-like-this-there-is-a-risk-of-the-building-collapsing-they-say-they-target-personal-information-taking-advantage-of-the-earthquake-damage/</loc>
		<lastmod>2025-12-25T01:55:51+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-hits-yokosuka-gakuin-photos-and-video-data-may-have-been-leaked/</loc>
		<lastmod>2025-12-25T18:43:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/48504/</loc>
		<lastmod>2025-12-25T07:35:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/48513/</loc>
		<lastmod>2025-12-25T09:13:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/your-personal-information-is-being-sold-top-100-online-shops-to-watch-out-for-revealed/</loc>
		<lastmod>2025-12-25T18:45:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/uncategorized/information-on-590000-fujifilm-medical-employees-and-other-medical-professionals-leaked-due-to-unauthorized-access/</loc>
		<lastmod>2025-12-25T18:46:19+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/48537/</loc>
		<lastmod>2025-12-26T08:10:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%82%b5%e3%82%a4%e3%83%90%e3%83%bc%e7%8a%af%e7%bd%aaai%e3%82%a8%e3%83%bc%e3%82%b8%e3%82%a7%e3%83%b3%e3%83%88%e3%81%b8%e3%81%ae%e5%85%86%e5%80%99-%e3%80%80%e3%80%80%e3%80%80dragonforce%e3%81%ae/</loc>
		<lastmod>2025-12-29T01:43:42+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e8%8b%b1%e5%b0%8f%e5%a3%b2%e5%a4%a7%e6%89%8b%e3%83%9e%e3%83%bc%e3%82%af%ef%bc%86%e3%82%b9%e3%83%9a%e3%83%b3%e3%82%b5%e3%83%bc%e6%94%bb%e6%92%83%e3%81%a8dragonforce%e3%80%81scattered-spider/</loc>
		<lastmod>2025-12-31T03:10:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/environmental-measurement-and-analysis-data-was-illegally-accessed-and-some-of-it-was-deleted-japan-edd-certification-promotion-council/</loc>
		<lastmod>2026-01-05T00:53:31+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/it-infrastructure-provider-suffers-from-unauthorized-access-no-customer-personal-information-has-been-leaked/</loc>
		<lastmod>2026-01-05T00:54:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/if-you-search-for-your-name-the-personal-information-of-2084-people-is-revealed-on-the-izumo-city-website/</loc>
		<lastmod>2026-01-05T23:40:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/it-human-resources-support-company-hit-by-cyber-attack-personal-information-of-24-business-partners-at-risk-of-being-leaked-lassic/</loc>
		<lastmod>2026-01-05T23:40:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/48585/</loc>
		<lastmod>2026-01-06T09:38:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/top-10-security-news-stories-of-2025/</loc>
		<lastmod>2026-01-07T01:41:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-tokushima-university-hospitals-system-personal-information-of-18920-patients-and-staff-members-leaked/</loc>
		<lastmod>2026-01-07T01:43:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/49039/</loc>
		<lastmod>2026-01-07T06:09:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-attack-on-tokyo-fm/</loc>
		<lastmod>2026-01-08T01:09:43+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/2026-will-be-the-era-of-human-authentication-security-predictions-published/</loc>
		<lastmod>2026-01-08T01:10:14+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/49108/</loc>
		<lastmod>2026-01-08T06:04:18+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/2026-01-09/</loc>
		<lastmod>2026-01-09T01:59:56+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/korean-air-unauthorized-access/</loc>
		<lastmod>2026-01-09T02:15:57+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cybersecurity-focused-exhibition-and-seminar-event-security-days-spring-2026-to-be-held/</loc>
		<lastmod>2026-01-09T02:16:10+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/2026-01-09-15/</loc>
		<lastmod>2026-01-09T07:34:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/49380/</loc>
		<lastmod>2026-01-14T02:09:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/d-link%e3%81%ae%e6%97%a7%e5%9e%8bdns%e3%83%ab%e3%83%bc%e3%82%bf%e3%83%bc%e3%81%ae%e8%84%86%e5%bc%b1%e6%80%a7%e3%82%92%e6%82%aa%e7%94%a8%e3%81%97%e3%81%9f%e6%94%bb%e6%92%83%e3%81%8c%e7%a2%ba%e8%aa%8d/</loc>
		<lastmod>2026-01-09T10:43:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/instagram%e3%82%a2%e3%82%ab%e3%82%a6%e3%83%b3%e3%83%881750%e4%b8%87%e4%bb%b6%e6%b5%81%e5%87%ba%e6%83%85%e5%a0%b1%e3%80%80instagram%e3%81%afsns%e6%8a%95%e7%a8%bf%e3%81%a7%e4%be%b5%e5%ae%b3%e5%90%a6/</loc>
		<lastmod>2026-01-12T15:30:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/legal-pawn-cyber-attack-that-tricked-ai-japan-leads-the-world-in-malware-blocking-with-approximately-232-million-cases/</loc>
		<lastmod>2026-01-13T02:33:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/virus-warning-on-pc-leads-to-15000-yen-transfer-personal-information-of-approximately-1700-users-is-also-disclosed-to-the-yotsukaido-city-crime-prevention-association/</loc>
		<lastmod>2026-01-13T02:33:54+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/meta-responds-to-reports-that-hackers-exposed-17-5-million-instagram-user-records/</loc>
		<lastmod>2026-01-14T01:45:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ransomware-hits-nursing-university-server-risking-leak-of-students-personal-information-okinawa/</loc>
		<lastmod>2026-01-14T01:45:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/49503/</loc>
		<lastmod>2026-01-14T08:06:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/will-promoting-digital-transformation-lead-to-an-increase-in-cyberattacks-the-bottleneck-is-not-budget-but-people/</loc>
		<lastmod>2026-01-15T02:07:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/support-scam-at-nara-prefecture-motor-vehicle-tax-office-calling-a-fake-support-center/</loc>
		<lastmod>2026-01-15T02:09:15+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/humans-can-no-longer-defend-against-this-ai-bots-continue-to-attack-24-hours-a-day-changing-the-role-of-security-officers/</loc>
		<lastmod>2026-01-16T00:11:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ntt-docomo-that-app-is-fake-the-risk-of-d-payment-being-used-without-permission-by-a-fake-app/</loc>
		<lastmod>2026-01-16T00:12:05+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/180%e4%b8%87%e5%8f%b0%e8%b6%85%e3%81%aeandroid%e3%83%87%e3%83%90%e3%82%a4%e3%82%b9%e3%81%8c%e6%84%9f%e6%9f%93%e3%80%80kimwolf%e3%83%9c%e3%83%83%e3%83%88%e3%83%8d%e3%83%83%e3%83%88%e3%81%a8%e3%81%af/</loc>
		<lastmod>2026-01-18T14:36:20+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ntt-launches-new-service-that-also-monitors-the-dark-web/</loc>
		<lastmod>2026-01-19T05:21:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ai-has-a-1-in-27-chance-of-leaking-information-cyber-attacks-continue-at-educational-institutions/</loc>
		<lastmod>2026-01-19T05:22:34+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/1300-pieces-of-customer-information-may-have-been-leaked-from-eneos-group-company-after-a-subcontractor-was-hit-by-a-cyber-attack/</loc>
		<lastmod>2026-01-20T01:24:52+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/a-surge-in-chatwork-accounts-posing-as-real-companies-beware-of-spoofed-accounts/</loc>
		<lastmod>2026-01-20T01:25:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/49606/</loc>
		<lastmod>2026-01-30T09:23:39+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/large-corporations-are-quietly-abandoning-companies-with-lax-security-practices-survey-report/</loc>
		<lastmod>2026-01-21T02:38:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/jr-kyushu-58-group-companies-hit-by-cyber-attack-nine-years-worth-of-employee-information-leaked/</loc>
		<lastmod>2026-01-21T02:39:16+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/49630/</loc>
		<lastmod>2026-01-21T09:27:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/suntorys-contractor-falls-victim-to-cyber-attack-information-of-over-900-event-attendees-may-have-been-affected/</loc>
		<lastmod>2026-01-22T01:00:09+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/parent-child-security-skills-cyber-test-to-protect-against-social-media-illegal-part-time-jobs-and-information-leaks/</loc>
		<lastmod>2026-01-22T01:01:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/49648/</loc>
		<lastmod>2026-01-22T08:20:01+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/horipro-incorrect-form-settings-expose-the-names-sns-etc-of-322-people/</loc>
		<lastmod>2026-01-23T01:45:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/library-maintenance-association-ransomware-attacks-force-revert-to-fax-and-email-recovery-takes-one-month/</loc>
		<lastmod>2026-01-23T01:46:03+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/iij%e3%82%b5%e3%83%bc%e3%83%93%e3%82%b9%e3%81%ae%e9%a1%a7%e5%ae%a2%e3%81%ab%e7%a8%8e%e5%8b%99%e8%aa%bf%e6%9f%bb%e3%82%92%e8%a3%85%e3%81%a3%e3%81%9f%e3%83%a1%e3%83%bc%e3%83%ab%e3%80%80%e3%83%95/</loc>
		<lastmod>2026-01-24T16:41:00+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/jimoty-unauthorized-access-victim/</loc>
		<lastmod>2026-01-26T02:32:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ministry-of-agriculture-forestry-and-fisheries-leaks-4500-personal-numbers-including-my-number-due-to-wrong-destination-address/</loc>
		<lastmod>2026-01-26T02:33:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/test/</loc>
		<lastmod>2026-01-27T05:45:44+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/what-information-would-be-problematic-if-leaked-78-3-answered-xx-24-4-answered-name-and-39-5-answered-address-survey-on-handling-of-personal-information/</loc>
		<lastmod>2026-01-27T03:01:21+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/miyazaki-nihon-university-approximately-10000-student-information-leaked-in-support-fraud/</loc>
		<lastmod>2026-01-27T03:02:27+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/49714/</loc>
		<lastmod>2026-01-27T06:52:07+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%82%b3%e3%83%8d%e3%82%af%e3%83%86%e3%83%83%e3%83%89%e3%82%ab%e3%83%bc%e3%81%ae%e3%83%8f%e3%83%83%e3%82%ad%e3%83%b3%e3%82%b0%e3%82%b3%e3%83%b3%e3%83%86%e3%82%b9%e3%83%88%e3%80%8cpwn20wn-automotive/</loc>
		<lastmod>2026-01-27T16:00:40+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/softbank-8600-personal-information-leaks-not-an-external-cyber-attack/</loc>
		<lastmod>2026-01-28T01:30:50+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/domestic-cyber-attack-reports-double-year-on-year-with-over-90-being-phishing-scams-jpcert/</loc>
		<lastmod>2026-01-28T01:32:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/49787/</loc>
		<lastmod>2026-01-28T08:43:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyberattack-damage-is-the-worst-ever-security-holes-from-contractors/</loc>
		<lastmod>2026-01-29T01:43:59+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/just-curtain-online-shop-was-illegally-accessed-by-a-third-party/</loc>
		<lastmod>2026-01-29T01:44:46+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/ai-risk-ranked-in-top-10-security-threats-for-the-first-time-ipa/</loc>
		<lastmod>2026-01-30T00:43:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/dmm-group-publishing-company-suffers-from-unauthorized-access/</loc>
		<lastmod>2026-01-30T00:44:22+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/49865/</loc>
		<lastmod>2026-01-30T08:29:49+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/49873/</loc>
		<lastmod>2026-01-30T10:08:48+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e7%9b%b4%e8%bf%911%e3%82%ab%e6%9c%88%e3%81%ae%e4%b8%96%e7%95%8c%e3%81%aeddos%e6%94%bb%e6%92%83%e6%83%85%e5%8b%a2%e3%80%80%e3%83%96%e3%83%a9%e3%82%b8%e3%83%ab%e3%81%8c%e7%aa%81%e5%87%ba%e3%80%81/</loc>
		<lastmod>2026-01-30T14:37:23+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/unauthorized-access-to-kamaasa-shoten/</loc>
		<lastmod>2026-02-02T02:30:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/momo-natural-unauthorized-access/</loc>
		<lastmod>2026-02-02T02:30:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/shiseido-unauthorized-login-by-spoofing-occurred/</loc>
		<lastmod>2026-02-03T01:10:32+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/what-kind-of-security-personnel-does-your-company-need-latest-skills-map-released-jnsa/</loc>
		<lastmod>2026-02-03T01:11:25+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/kagoshima-prefectural-high-school-student-says-he-can-see-other-students-information-exam-data-for-313-students-exposed-to-public-view/</loc>
		<lastmod>2026-02-04T01:14:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/juntendo-university-hospital-loses-pc-containing-patient-information-for-approximately-50-people-says-it-is-unlikely-to-have-been-leaked/</loc>
		<lastmod>2026-02-04T01:15:04+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/49949/</loc>
		<lastmod>2026-02-04T09:48:24+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/information-leaked-on-moltbook/</loc>
		<lastmod>2026-02-06T01:29:38+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/two-unauthorized-communications-were-made-to-the-outside-possible-information-leak-online-service-for-accounting-firms/</loc>
		<lastmod>2026-02-04T22:45:37+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/security-measures-now-a-requirement-for-transactions-cyber-attacks-hit-record-high-of-1968-per-week-survey-report/</loc>
		<lastmod>2026-02-06T01:32:28+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/hokuto-bank-information-leak/</loc>
		<lastmod>2026-02-06T01:32:55+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/%e3%83%9d%e3%83%bc%e3%83%a9%e3%83%b3%e3%83%89%e3%81%ae%e5%86%8d%e7%94%9f%e5%8f%af%e8%83%bd%e3%82%a8%e3%83%8d%e3%83%ab%e3%82%ae%e3%83%bc%e3%82%b7%e3%82%b9%e3%83%86%e3%83%a0%e3%81%ab%e3%82%b5%e3%82%a4/</loc>
		<lastmod>2026-02-08T10:34:02+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/prime-minister-takaichis-video-message-for-cyber-security-month-cyber-attacks-affect-us-all/</loc>
		<lastmod>2026-02-09T01:34:58+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/news/cyber-attacks-on-the-financial-sector-have-doubled-in-one-year/</loc>
		<lastmod>2026-02-09T01:36:06+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
	<url>
		<loc>https://cybersecurity-info.com/column/49998/</loc>
		<lastmod>2026-02-10T03:50:41+00:00</lastmod>
		<changefreq>monthly</changefreq>
		<priority>0.2</priority>
	</url>
</urlset><!-- <p>Please edit wp-db.inc.php in wp-includes and set SAVEQUERIES to true if you want to see the queries.</p> --> <!-- Request ID: 3543ea3d6e0af4c628595de0553cf990; Queries for sitemap: 2005; Total queries: 2080; Seconds: 0.51; Memory for sitemap: 20MB; Total memory: 30MB -->
