<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//infosecurity.by/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://infosecurity.by/info-polzovatel-vk/</loc>
		<lastmod>2026-04-15T07:19:52+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/10/vk-user.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/microsoft-ubiraet-menedzher-parolej-v-authenticator/</loc>
		<lastmod>2026-03-25T10:20:52+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2026/03/4cafd7b97b76d61ede04b4aeec7b985d1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/microsoft-ubiraet-menedzher-parolej-v-authenticator-dlya-perevoda-vseh-polzovatelej-v-edge/</loc>
		<lastmod>2026-03-25T10:19:08+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2026/03/4cafd7b97b76d61ede04b4aeec7b985d1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/cisa-chatgpt-shadowai/</loc>
		<lastmod>2026-01-29T13:48:46+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2026/01/chatgpt-ai-cisa.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/howto-create-cookie-files-policy/</loc>
		<lastmod>2026-01-29T12:25:40+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/01/cookie-policy.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/01/cookie-algorithm-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/01/welldesk-cookie.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/01/welldesk-cookie-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/01/welldesk-cookie-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/novyj-bankovskij-troyan-maverick-rasprostranyaetsya-cherez-whatsapp-web/</loc>
		<lastmod>2026-01-20T05:44:54+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2026/01/whatsapp-malware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/european-union-gdpr-changes-cookies-ai-act/</loc>
		<lastmod>2025-11-20T18:00:25+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2025/11/european-union-gdpr-changes-cookies-ai-act-scaled.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/commission-wants-end-to-cookie-pop-upsowser/</loc>
		<lastmod>2025-11-20T17:50:32+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2025/11/eu-end-of-cookie.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/human-factor-danger/</loc>
		<lastmod>2025-09-23T13:29:55+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/09/human-error-in-cyber-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/vzlom-i-utechka-v-prilozhenii-tea-app/</loc>
		<lastmod>2025-08-18T07:43:21+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2025/08/tea-app.webp</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2025/08/tea-app-usersmap.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/budte-ostorozhny-novaya-shema-moshennichestva-v-telegram/</loc>
		<lastmod>2025-03-14T09:14:21+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2025/01/gettyimages-6881890161.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2025/03/apk-danger.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/google-ubivaet-anonimnost-czifrovoj-otpechatok-vmesto-cookies/</loc>
		<lastmod>2025-03-10T08:57:59+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2025/03/google-fingerprint.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/telegram-peredal-dannye-polzovatelej-%e2%80%91-prestupnikov-pravoohranitelnym-organam-ssha/</loc>
		<lastmod>2025-01-08T07:32:11+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2025/01/gettyimages-6881890161.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2025/01/16322e16edb264badacc013507c05f961.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/svg-phishing/</loc>
		<lastmod>2024-11-28T09:52:13+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/11/phishing-svg.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/11/svg-phishing-exel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/gosduma-rf-uzhestochila-otvetstvennost-za-utechki-personalnyh-dannyh/</loc>
		<lastmod>2024-11-28T09:51:28+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/10/5-1024x617-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/false-test-captcha-infostealer/</loc>
		<lastmod>2024-11-06T11:01:54+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/11/clickfix.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/11/clickfix-banners.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/palantir-sotrudnichaet-s-microsoft-chtoby-prodavat-iskusstvennyj-intellekt-pravitelstvu/</loc>
		<lastmod>2024-08-16T14:57:27+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/08/palantir.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/messendzher-signal-zablokirovan-v-rossii/</loc>
		<lastmod>2024-08-13T12:17:18+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/08/signal-messenger.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/mininform-zanyalsya-problemami-informaczionnogo-suvereniteta/</loc>
		<lastmod>2024-06-27T11:50:38+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/02/ministr-informatsii-igor-lutskij-925x611-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/osint-telegram/</loc>
		<lastmod>2024-05-17T12:13:43+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/08/telegram-osint.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/velikobritaniya-pervoj-v-mire-vvela-zapret-na-prostye-paroli-po-umolchaniyu/</loc>
		<lastmod>2024-05-11T10:23:13+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/05/iot.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/strany-s-samym-vysokim-urovnem-kiberprestupnosti-v-mire/</loc>
		<lastmod>2024-05-10T09:34:37+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/05/countries-cyber-cryme-top10.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/05/journal.pone_.0297312.t001.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/messendzher-signal-ispolzuetsya-gosdepartamentom-i-speczsluzhbami-ssha-dlya-smeny-rezhimov-za-rubezhom/</loc>
		<lastmod>2024-05-10T09:32:18+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/05/signal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/osint-kirgizia/</loc>
		<lastmod>2024-04-25T05:19:20+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/07/kyrgyz-osint.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/novye-shemy-moshennichestva-v-otnoshenii-abonentov-sotovoj-svyazi/</loc>
		<lastmod>2024-04-01T10:15:00+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/04/vishing-a1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/it-security-conference-projdet-v-minske-27-28-marta/</loc>
		<lastmod>2024-03-20T10:16:53+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/03/it-sec-conf.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/fake-voice-email/</loc>
		<lastmod>2024-03-18T12:48:59+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/03/fake-voicemail-messages.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/03/fake-voice-email.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/osnovnye-ugrozy-informaczionnoj-bezopasnosti/</loc>
		<lastmod>2024-03-15T08:32:51+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/03/infosec-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/operativniki-smogut-legalno-poluchat-informacziyu-s-kompyuterov-grazhdan-cherez-udalennyj-dostup/</loc>
		<lastmod>2024-01-29T08:39:13+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/proslushka-3-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/zakon-o-zashhite-pdn-comment/</loc>
		<lastmod>2024-01-19T08:01:54+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/02/personal-data-comment.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/password-policy/</loc>
		<lastmod>2024-01-19T07:49:47+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/11/fishing-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/v-belarusi-poyavilsya-naczionalnyj-centr-zashhity-personalnyh-dannyh/</loc>
		<lastmod>2024-01-19T07:21:05+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/11/zashita-persdata.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/11/andrej-gaev.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/google-chrome-block-cookie/</loc>
		<lastmod>2024-01-08T07:43:44+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2024/01/google-blocks-cookie.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/v-belarusi-hotyat-uzhestochit-otvetstvennost-za-utechku-personalnyh-dannyh/</loc>
		<lastmod>2023-12-11T11:03:42+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/12/personal-data.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/kvishing-quishing-ili-qr-fishing/</loc>
		<lastmod>2023-12-06T05:50:02+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/12/qr-code-phishing-attacks.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/12/qr-phishing-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/insider-threat/</loc>
		<lastmod>2023-11-28T12:49:05+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/10/insider-threat.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/belarus-igf-2023/</loc>
		<lastmod>2023-10-25T07:58:25+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/10/belarus-igf-2023.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/v-rossii-hotyat-vvesti-samozapret-na-vydachu-kreditov/</loc>
		<lastmod>2023-10-11T05:36:18+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/10/samozapret.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/anb-i-cisa-nazvali-10-osnovnyh-oshibok-v-konfiguraczii-kiberbezopasnosti/</loc>
		<lastmod>2023-10-09T12:13:11+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/10/5-1024x617-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/google-alters-search-queries/</loc>
		<lastmod>2023-10-06T07:55:32+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/10/google-alters-search-queries.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/sim-phishing/</loc>
		<lastmod>2023-09-25T07:23:11+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/09/sim-phishing.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/obrabotka-personalnyh-dannyh-v-stranah-odkb/</loc>
		<lastmod>2023-09-05T12:20:36+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/09/information-security.jpeg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/howto-ciso/</loc>
		<lastmod>2023-09-02T18:06:50+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/09/ciso.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/microsoft-preduprezhdaet-o-roste-chisla-atak-chelovek-poseredine-s-obhodom-mfa/</loc>
		<lastmod>2023-08-30T11:11:33+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/08/cookie-steal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/positive-soccon-projdet-v-minske/</loc>
		<lastmod>2023-08-28T13:46:39+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/08/positive-soccon.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/kitajskij-regulyator-predlozhil-ezhegodnyj-audit-operatorov-pdn/</loc>
		<lastmod>2023-08-08T07:35:33+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/08/cyberspace-administration-china.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/rostelekom-dns/</loc>
		<lastmod>2023-02-15T05:57:19+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/09/dns.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/iba-activecloud/</loc>
		<lastmod>2023-02-08T17:39:42+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/01/iba-activecloud.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/the-blank-image-attack/</loc>
		<lastmod>2023-01-30T20:01:19+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/01/blank-image-attack2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/01/blank-image-attack-example-docusign-1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/01/blank-image-attack-example-docusign-2.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/01/blank-image-attack-example-docusign-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/novaya-shema-moshennichestva-mintrud/</loc>
		<lastmod>2023-01-27T12:13:52+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2023/01/vishing-attenzione-al-phishing-telefonico.webp</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/nczzpd-belarusi-zapuskaet-oficzialnyj-sajt/</loc>
		<lastmod>2023-01-09T12:55:06+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/02/cpdby-site.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/direktor-nczpd-gaev-rasskazal-belorusy-pd/</loc>
		<lastmod>2023-01-09T12:54:36+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/12/andrey-gaev-nczpd.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/12/andrey_gaev_05_12_2021_61.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/12/andrey_gaev_05_12_2021_71.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/zakon-o-zashite-personalnyh-dannyh-belarus/</loc>
		<lastmod>2023-01-09T12:52:57+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/05/zashhita-personalnyih-dannyih.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/osint-v-rb-zakonno-voprosy-i-otvety-o-sbore-hranenii-i-rasprostranenii-personalnyh-dannyh/</loc>
		<lastmod>2023-01-09T12:52:06+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/06/obrabotka-i-zashhita-personalnyih-dannyih.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/tiktok-forbes-financial-times/</loc>
		<lastmod>2022-12-28T08:13:44+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/12/93820851ad28dd30c51bd41876e54ab51.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/exmatter-blackcat-ransomware/</loc>
		<lastmod>2022-12-05T05:37:20+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/12/blackcat-ransomware.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/v-ssha-zapretili-tehniku-dlya-videonablyudeniya-i-kommunikaczij-kitajskogo-proizvodstva/</loc>
		<lastmod>2022-11-30T05:44:34+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/11/huawei.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/quiet-exploration-guide/</loc>
		<lastmod>2022-10-18T11:19:04+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/07/cyber-security.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/07/foca-osint-result.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/kakie-paroli-brutforsyat-zloumyshlenniki-soglasno-dannym-majkrosoft/</loc>
		<lastmod>2022-10-18T11:15:46+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/10/password-login.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/moshennik-kosmonavt/</loc>
		<lastmod>2022-10-13T11:48:35+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/10/roscosmos.jpeg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/10/moshennik-kosmonavt.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/signaly-bluetooth-dlya-otslezhivaniya-smartfonov/</loc>
		<lastmod>2022-06-27T09:22:25+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/06/bluetooth-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/infosec-crimes-belarus-5let/</loc>
		<lastmod>2022-06-03T11:59:54+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/06/email-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/ib-rus-software/</loc>
		<lastmod>2022-05-31T08:01:52+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/05/ib-software.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/iphones-attack-turned-off/</loc>
		<lastmod>2022-05-25T06:34:45+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/05/ihpone-attack.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/apple-google-i-microsoft-passkey-fido/</loc>
		<lastmod>2022-05-13T10:14:26+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/05/passwordless-authentication.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/cia-instructs-russian-spy/</loc>
		<lastmod>2022-05-04T09:04:39+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/05/cia-instructs-russian-spy.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/google-fonts-goodbye/</loc>
		<lastmod>2022-04-27T11:46:21+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/04/google-fonts-goodbye.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/cyber-military-intelligence-group/</loc>
		<lastmod>2022-03-24T08:38:50+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/03/cmig-sign.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/uk-ban-whatsapp/</loc>
		<lastmod>2022-03-23T13:04:51+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/03/uk-whatsapp.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/probivka-opredeleniya-mestopolozheniya-cheloveka/</loc>
		<lastmod>2022-03-16T07:57:48+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/03/dlbi-probiv.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/beltelecom-dpi-block/</loc>
		<lastmod>2022-03-16T07:38:22+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/03/deeppacketinspection1.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/03/icetrade-dpi-beltelecom.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/cia-covert-ops/</loc>
		<lastmod>2022-02-13T18:14:51+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/02/cia-covert-ops.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/tscm/</loc>
		<lastmod>2022-01-27T09:57:33+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/01/tscm.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/01/meroprijatija_dlja_zashhity_pomeshhenij.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/whatsapp-ubn-usa/</loc>
		<lastmod>2022-01-24T06:18:56+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/01/whatsapp-dea-drugs.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/01/3a168e78f9e3f631eff66b8014b905b3.jpg_fitscale.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/lilygo-badusb-fbi/</loc>
		<lastmod>2022-01-18T06:39:28+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/01/badusb.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2022/01/lilygo-badusb-fbi-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/kak-i-za-skolko-vzlamyvayut-elektronnuyu-pochtu/</loc>
		<lastmod>2021-12-22T09:42:05+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/12/skolko-vzlamyvayut-elektronnuyu-pochtu.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/mandiant-obvinila-vlasti-belarusi-v-svyazi-s-kibergruppoj-ghostwriter/</loc>
		<lastmod>2021-11-26T14:08:31+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/11/mandiant.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/cybersecurity-terms-a-to-z-dictionary-including-definition/</loc>
		<lastmod>2021-11-16T06:13:48+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/10/cybersecurity-terms-a-to-z-dictionary.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/kak-mozhno-poluchit-informacziyu-s-kompyuterov-putem-udalennogo-dostupa/</loc>
		<lastmod>2021-11-11T07:25:09+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/remote-control.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/kompyuter_rukovodstvo1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/kompyuter_devushka_moshennichestvo_kiberbezopasnost_khaker_infobezopasnost1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/kompyuter_noutbuk_rabota_ofis_devushka1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/noutbuk_ruki_rabota_udalenka_kompyuter1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/sbor-informaczii-s-pomoshhyu-osint/</loc>
		<lastmod>2021-11-11T07:20:28+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/05/osint.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/eksperty-oprovergayut-fakt-vzloma-zashhishhyonnogo-messendzhera-signal/</loc>
		<lastmod>2021-11-11T07:16:33+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/02/signal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/mirovaya-vojna-za-chelovecheskuyu-bigdatu-epizod-pervyj-koronavirus-chast-1/</loc>
		<lastmod>2021-11-11T07:15:28+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/human-bigdata-1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/mirovaya-vojna-za-chelovecheskuyu-bigdatu-epizod-pervyj-koronavirus-chast-2/</loc>
		<lastmod>2021-11-11T07:11:31+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/human-bigdata-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/cisa-launches-new-joint-cyber-defense-collaborative/</loc>
		<lastmod>2021-11-11T07:05:38+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/08/cisa-launches-new-joint-cyber-defense-collaborative.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/samye-populyarnye-paroli-v-internete-issledovanie/</loc>
		<lastmod>2021-11-09T12:37:47+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/05/popular-passwords.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/vidy-soczialnoj-inzhenerii/</loc>
		<lastmod>2021-11-09T12:32:16+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/04/social-engineering.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/chto-takoe-security-awareness/</loc>
		<lastmod>2021-11-05T09:29:12+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/04/security-awareness.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/datashare/</loc>
		<lastmod>2021-10-12T11:37:05+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/10/datashare-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/10/datashare-2.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/10/datashare-3.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/10/datashare-4.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/osint-kazahstan/</loc>
		<lastmod>2021-10-04T13:57:53+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/07/osint-rk.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/kak-mozhno-ustanovit-lichnost-polzovatelya-v-telegram/</loc>
		<lastmod>2021-10-04T10:02:19+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/smartfon-mobilnyy-telefon.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/telefon-telegram.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/iphone-delaet-foto-vladelcza-v-infrakrasnom-svete/</loc>
		<lastmod>2021-10-04T09:42:48+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/05/iphone-infrared-photo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/rkn-poluchil-dostup-k-telefonam/</loc>
		<lastmod>2021-10-01T10:54:19+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/10/rkn-mobile-phones.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/atlas-interneta-netlasio/</loc>
		<lastmod>2021-09-17T08:51:37+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/09/netlas-scanner.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/protonmail-alles/</loc>
		<lastmod>2021-09-15T06:46:01+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/09/protonmail.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/09/protonmail-rules.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/sk-belarusi-poluchil-dostup-k-kameram-videonablyudeniya/</loc>
		<lastmod>2021-08-24T08:29:04+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/08/camera-surveillance.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/apple-budet-skanirovat-fotografii-polzovatelej-dlya-vyyavleniya/</loc>
		<lastmod>2021-08-11T13:16:25+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/08/apple-child-abuse.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/08/apple-csam-detection.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/china-bot-net/</loc>
		<lastmod>2021-08-09T10:01:26+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/08/china-bot-net_final.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/08/ai-fake-faces.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/proekt-pegas-globalnaya-slezhka-za-zhurnalistami/</loc>
		<lastmod>2021-08-09T09:58:09+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/07/pegasus-project.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/07/photo_2021-07-22_13-55-53.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/07/pegasus-threats.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/whatsapp-messages/</loc>
		<lastmod>2021-08-05T07:50:37+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/08/whatsapp-messages.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/apple-airtag-stalkerware/</loc>
		<lastmod>2021-08-03T14:36:34+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/08/stalkerware-spyware-threats.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/08/trackers-1-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/08/trackers-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/nsa-wirelesswarning/</loc>
		<lastmod>2021-07-30T11:03:08+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/07/nsa-wirelesswarning.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/fbr-wifi-catcher/</loc>
		<lastmod>2021-07-23T12:47:39+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/07/wifi-fbi-catcher.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/gmail-bezopasnost-bimi/</loc>
		<lastmod>2021-07-14T07:46:28+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/07/gmail-bimi.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/07/gws_bimi_1.gif</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/linkedin-data-leak-700/</loc>
		<lastmod>2021-06-30T06:52:49+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/06/linkedin-data-leak.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/06/linkedin-data-breach-700-million-accounts.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/06/linkedin-data-breach-700-million-users-exposed-2021-leak.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/tiktok-biometricheskie-dannye-polzovatelej/</loc>
		<lastmod>2021-06-24T08:45:33+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/06/tiktok-security.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/mvd-rossii-orm/</loc>
		<lastmod>2021-06-11T11:34:46+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/06/zakon-ord-ib.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/06/lukatsky.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/fbr-zashifrovannye-smartfony/</loc>
		<lastmod>2021-06-09T08:23:56+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/06/fbr.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/06/fbi-smartphone.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/fbr-nachnet-peredavat-paroli-servisu-hibp/</loc>
		<lastmod>2021-05-31T14:02:00+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/05/haveibeenpwned-fbi-password-cooperation.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/05/ntlm-hash-password-list.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/05/fbi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/speczsluzhby-nahodyat-sotovye-telefony/</loc>
		<lastmod>2021-05-27T09:02:06+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/05/proslushka-sotovye.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/czena-budushhego/</loc>
		<lastmod>2021-05-07T19:19:22+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/05/cifra.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/virusy-shifrovalshhiki-predstavlyayut-glavnuyu-ugrozu-dlya-kompanij/</loc>
		<lastmod>2021-05-05T17:58:43+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/04/virus-shifrovalshhik.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/04/types-of-vpo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/04/otrasly-vpo.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/04/dostavka-vpo.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/cellebrite-signal/</loc>
		<lastmod>2021-04-27T21:17:28+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/04/signal-cellebrite.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/kak-cia-sozdavalo-google/</loc>
		<lastmod>2021-04-27T20:13:15+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/cia-google.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/wordpress-blokirovat-floc-ot-google/</loc>
		<lastmod>2021-04-20T09:22:05+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/04/wordpress-floc.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/rost-prestuplenij-v-sfere-it/</loc>
		<lastmod>2021-04-19T17:40:46+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/04/it-criminal.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/otslezhivayushhie-pikseli-v-elektronnyh-pismah/</loc>
		<lastmod>2021-04-18T16:12:48+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/04/spy-pixel-mailbox.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/bitcoin-eto-blago-dlya-slezhki-cia/</loc>
		<lastmod>2021-04-16T20:44:43+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/04/bitcoin-cia.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/wi-fi-smogut-otslezhivat-obekty-v-prostranstve/</loc>
		<lastmod>2021-04-04T19:42:49+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/04/wi-fi-detect-devices.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/04/wi-fi-detect-distinguish-people.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/uchyonye-razrabotali-kompaktnuyu-antennu-dlya-zaryadki-ustrojstv-ot-signala-5g/</loc>
		<lastmod>2021-03-31T19:33:16+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/uchyonye-razrabotali-kompaktnuyu-antennu-dlya-zaryadki-ustrojstv-ot-signala-5g.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/new-york-times-ajfony-i-czifrovizacziya/</loc>
		<lastmod>2021-03-27T06:37:00+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/steve-cutts-n.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/deanonimizacziya-polzovatelej-messendzherov/</loc>
		<lastmod>2021-03-25T19:39:09+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/deanonimizacziya-polzovatelej-messendzherov.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/proekt-kipod-kak-nas-identificziruyut-na-ulicze/</loc>
		<lastmod>2021-03-20T17:34:23+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/kipod-raspoznavanie-lic-osintby.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/izrailskaya-kompaniya-cellebrite-perestanet-prodavat-tehnologii-po-vzlomu-telefonov-v-belarus-i-rossiyu/</loc>
		<lastmod>2021-03-19T13:39:35+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/phone-hack.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/icetrade-cellebrite.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/in-q-tel-vladeet-informacziej-o-tom-kto-vladeet-informacziej/</loc>
		<lastmod>2021-03-16T09:15:33+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/digital-big-data.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/iqtnewweb.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/cia-building-hall-1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/osint.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/osint-map.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/facebook-darpa-cia-dod.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/cia-iqt-facebook-google-microsoft.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/izrailskij-shpionskij-furgon-vzlamyvayushhij-ajfony/</loc>
		<lastmod>2021-03-15T08:33:03+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/izrailskij-shpionskij-furgon-vzlamyvayushhij-ajfony.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/meriya-moskvy-razrabotala-sobstvennyj-zashhishhennyj-messendzher/</loc>
		<lastmod>2021-03-15T08:16:27+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/meriya-moskvy-razrabotala-sobstvennyj-zashhishhennyj-messendzher.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/litovskaya-razvedka-rasskazala-kakie-metody-ispolzuet-kgb-belarusi-dlya-verbovki-litovczev/</loc>
		<lastmod>2021-03-13T13:34:35+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/dgb-vsd-lietuvos.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/skrytaya-syemka-verbovka.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/v-menedzhere-parolej-lastpass-dlya-android-obnaruzhili-sem-vstroennyh-trekerov/</loc>
		<lastmod>2021-03-10T13:49:56+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/03/lastpass-logo.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/xiaomi-sozdala-tehnologiyu-besprovodnoj-zaryadki-kotoraya-mozhet-pitat-elektronnye-ustrojstva-distanczionno/</loc>
		<lastmod>2021-02-27T15:18:00+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/02/mi-air-charge-technology.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/merkel-nazvala-odnu-iz-samyh-bolshih-ugroz-bezopasnosti-budushhego/</loc>
		<lastmod>2021-02-24T20:20:00+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2019/02/andgela-merkel.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/chem-opasen-whatsapp/</loc>
		<lastmod>2021-02-24T17:56:56+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/02/whatsapp-danger.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/voennye-ssha-pokupayut-geodannye-polzovatelej-iz-raznyh-prilozhenij-po-vsemu-miru/</loc>
		<lastmod>2021-02-21T18:28:51+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/02/voennye-ssha-pokupayut-geodannye-polzovatelej-iz-raznyh-prilozhenij-po-vsemu-miru.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/proslushku-obedinyat-s-naruzhkoj/</loc>
		<lastmod>2021-02-21T16:42:13+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/02/slezhka-za-chelovekom-mvd.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/sistema-soczialnogo-rejtinga-v-kitae/</loc>
		<lastmod>2021-02-21T08:30:37+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/02/soc-rating-china.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/chto-takoe-sorm-i-kak-uberech-lichnuyu-zhizn-ot-speczsluzhb/</loc>
		<lastmod>2021-02-17T20:45:34+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/02/sorm.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/czifrovye-tehnologii-i-totalnaya-slezhka-v-internete-intervyu-shona-o-brajena/</loc>
		<lastmod>2021-02-16T20:22:19+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/02/czifrovye-tehnologii-i-totalnaya-slezhka-v-internete.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/laboratoriya-kasperskogo-rasskazala-kakoj-messendzher-sejchas-samyj-populyarnyj-v-belarusi/</loc>
		<lastmod>2021-02-14T18:29:48+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/02/aboratoriya-kasperskogo-rasskazala-kakoj-messendzher-sejchas-samyj-populyarnyj-v-belarusi.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/otchyot-o-czifrovyh-trendah-v-belarusi/</loc>
		<lastmod>2021-02-14T18:18:59+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/02/photo_2021-02-12_17-54-43.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/divnyj-novyj-tehnomir/</loc>
		<lastmod>2021-01-31T16:32:45+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/techno-world.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/kak-uberech-sebya-ot-proslushki-slezhki-i-perehvata-lichnoj-informaczii/</loc>
		<lastmod>2021-01-31T14:48:38+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/proslushka-3.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/besogontv-jedem-das-seine-kazhdomu-svoe/</loc>
		<lastmod>2021-01-28T20:32:10+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/besogon-tv.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/telegram-vnedryaet-funkcziyu-perenosa-perepiski-iz-whatsapp-i-drugih-prilozhenij/</loc>
		<lastmod>2021-01-28T11:00:30+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/whatsapp-telegram.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/v-tiktok-obnaruzhili-uyazvimost-kotoraya-pozvolyaet-sobirat-dannye-polzovatelej/</loc>
		<lastmod>2021-01-28T10:39:42+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/tiktok.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/vash-smartfon-proslushivayut-facebook-google-i-instagram-i-eto-ne-paranojya/</loc>
		<lastmod>2021-01-27T20:34:54+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/mobile-phone-lock.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/proizvoditeli-sistem-proslushki-otchitalis-o-roste-vyruchki-v-2018-godu-na-fone-zakona-yarovoj/</loc>
		<lastmod>2021-01-21T18:43:00+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2019/01/proslushka-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/whatsapp-peredast-dannye-polzovatelej-v-facebook/</loc>
		<lastmod>2021-01-21T17:28:47+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/whatsapp-facebook.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/whatsapp-facebook-2.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/elektromagnitnyj-smog-tehnogennyj-apokalipsis/</loc>
		<lastmod>2021-01-20T19:46:51+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/2021-01-09_16-51-551.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/pochemu-siloviki-ne-otdayut-chastoty-pod-5g-i-chem-eto-grozit/</loc>
		<lastmod>2021-01-20T15:03:09+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/4679226_original1.jpg</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2021/01/4679861_original1.jpg</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://infosecurity.by/struktura-fsb-poluchila-vozmozhnost-inicziirovat-blokirovki-sajtov-istochnikov-kiberatak/</loc>
		<lastmod>2021-01-18T11:08:46+00:00</lastmod>
		<image:image>
			<image:loc>https://infosecurity.by/wp-content/uploads/2019/08/fishing.jpg</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->