<?xml version="1.0" encoding="utf-8" standalone="yes" ?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
  xmlns:xhtml="http://www.w3.org/1999/xhtml">
  
  <url>
    <loc>https://blog.cybergon.com/posts/cve-2024-44349/</loc>
    <lastmod>2024-10-07T16:25:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/andrea-ferrario/</loc>
    <lastmod>2024-10-07T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/</loc>
    <lastmod>2024-10-07T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/cve/</loc>
    <lastmod>2024-10-07T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/categories/</loc>
    <lastmod>2024-10-07T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/</loc>
    <lastmod>2024-10-07T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/paolo-ferro/</loc>
    <lastmod>2024-10-07T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/</loc>
    <lastmod>2024-10-07T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/</loc>
    <lastmod>2024-10-07T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/categories/analysis/</loc>
    <lastmod>2024-10-07T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/cybergon/</loc>
    <lastmod>2024-10-07T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/cybersecurity/</loc>
    <lastmod>2024-10-07T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/categories/cybersecurity/</loc>
    <lastmod>2024-10-07T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/francesca-cioffi/</loc>
    <lastmod>2024-09-23T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/cve-cybergon/</loc>
    <lastmod>2024-09-23T16:25:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/vulnerabilit%C3%A0/</loc>
    <lastmod>2024-09-23T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/digital-markets-act-come-cambia-lo-scenario-mondiale/</loc>
    <lastmod>2024-06-18T16:25:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/digitalmarketsact/</loc>
    <lastmod>2024-06-18T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/categories/strategy/</loc>
    <lastmod>2024-06-18T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/unioneeuropea/</loc>
    <lastmod>2024-06-18T16:25:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/fiction-o-realta-storia-di-una-compromissione-linux/</loc>
    <lastmod>2024-05-09T10:36:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/matteo-montoli/</loc>
    <lastmod>2024-05-09T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/backdoor/</loc>
    <lastmod>2024-05-09T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/opensource/</loc>
    <lastmod>2024-05-09T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/xzutils/</loc>
    <lastmod>2024-05-09T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/almanacco-2023/</loc>
    <lastmod>2023-12-20T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/filadelfio-emanuele/</loc>
    <lastmod>2023-12-20T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/almanacco/</loc>
    <lastmod>2023-12-20T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/trend/</loc>
    <lastmod>2023-12-20T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/cloud-security-best-practice/</loc>
    <lastmod>2023-11-08T10:36:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/ilaria-martinelli/</loc>
    <lastmod>2023-11-08T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/bestpractice/</loc>
    <lastmod>2023-11-08T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/cloud/</loc>
    <lastmod>2023-11-08T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/strategy/</loc>
    <lastmod>2023-11-08T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/la-fine-di-qabkot-nuovo-emotet/</loc>
    <lastmod>2023-09-04T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/botnet/</loc>
    <lastmod>2023-09-04T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/malware/</loc>
    <lastmod>2023-09-04T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/qakbot/</loc>
    <lastmod>2023-09-04T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/analisi-ransomware-cactus/</loc>
    <lastmod>2023-06-29T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/jacopo-candido-augelli/</loc>
    <lastmod>2023-06-29T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/marco-prosdocimi/</loc>
    <lastmod>2023-06-29T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/cactus/</loc>
    <lastmod>2023-06-29T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/ransomware/</loc>
    <lastmod>2023-06-29T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/intelligenza-artificiale-e-cybersecurity/</loc>
    <lastmod>2023-06-15T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/intelligenzaartificiale/</loc>
    <lastmod>2023-06-15T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/rischi/</loc>
    <lastmod>2023-06-15T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/vantaggi/</loc>
    <lastmod>2023-06-15T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/implicazioni-chatgpt-sicurezza-informatica/</loc>
    <lastmod>2023-05-17T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/chatgpt/</loc>
    <lastmod>2023-05-17T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/implicazioni/</loc>
    <lastmod>2023-05-17T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/direttiva-nis2/</loc>
    <lastmod>2023-04-20T10:36:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/direttiva/</loc>
    <lastmod>2023-04-20T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/nis2/</loc>
    <lastmod>2023-04-20T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/regolamento-dora/</loc>
    <lastmod>2023-03-30T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/dora/</loc>
    <lastmod>2023-03-30T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/regolamento/</loc>
    <lastmod>2023-03-30T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/analisi-del-malware-qakbot/</loc>
    <lastmod>2023-03-07T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/attacco-server-vmware-esxi/</loc>
    <lastmod>2023-02-14T10:16:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/attacco/</loc>
    <lastmod>2023-02-14T10:16:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/vmwareesxi/</loc>
    <lastmod>2023-02-14T10:16:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/almanacco-2022/</loc>
    <lastmod>2022-12-29T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/funzionamento-malware-qakbot/</loc>
    <lastmod>2022-12-22T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/simone-errico/</loc>
    <lastmod>2022-12-22T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/furto-identita-come-difendersi/</loc>
    <lastmod>2022-11-16T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/margherita-fontana/</loc>
    <lastmod>2022-11-16T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/identitadigitale/</loc>
    <lastmod>2022-11-16T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/nuove-vulnerabilita-microsoft-exchange/</loc>
    <lastmod>2022-10-06T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/proxynotshell/</loc>
    <lastmod>2022-10-06T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/vulnerabilities/</loc>
    <lastmod>2022-10-06T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/utility-cyber-security-rischi-settore/</loc>
    <lastmod>2022-09-29T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/risks/</loc>
    <lastmod>2022-09-29T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/utility/</loc>
    <lastmod>2022-09-29T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/domenico-orlando/</loc>
    <lastmod>2022-07-28T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/lockbit-la-nuova-versione-30/</loc>
    <lastmod>2022-07-28T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/cybercrime/</loc>
    <lastmod>2022-07-28T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/lockbit3.0/</loc>
    <lastmod>2022-07-28T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/la-sicurezza-informatica-nel-metaverso/</loc>
    <lastmod>2022-07-04T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/metaverse/</loc>
    <lastmod>2022-07-04T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/cosa-sono-gli-attacchi-ddos-e-come-proteggersi/</loc>
    <lastmod>2022-06-06T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/fabio-gallo/</loc>
    <lastmod>2022-06-06T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/attacchiddos/</loc>
    <lastmod>2022-06-06T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/smart-city-la-citta-interconessa-deve-anche-essere-cyber-sicura/</loc>
    <lastmod>2022-05-16T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/citt%C3%A0interconessa/</loc>
    <lastmod>2022-05-16T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/smartcity/</loc>
    <lastmod>2022-05-16T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/hermetic_wiper/</loc>
    <lastmod>2022-04-26T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/analisi/</loc>
    <lastmod>2022-04-26T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/hermeticwiper/</loc>
    <lastmod>2022-04-26T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/cyber-security-awareness-quando-il-fattore-umano-puo-ridurre-il-rischio-di-un-attacco-informatico/</loc>
    <lastmod>2022-04-04T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/awareness/</loc>
    <lastmod>2022-04-04T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/education-e-cyber-security-italia-sul-podio-per-attacchi-subiti/</loc>
    <lastmod>2022-03-15T10:16:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/education/</loc>
    <lastmod>2022-03-15T10:16:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/cyberwar-i-rischi-di-sicurezza-e-le-azioni-di-mitigazione-per-le-aziende/</loc>
    <lastmod>2022-03-02T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/marco-nilo/</loc>
    <lastmod>2022-03-02T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/cyberwar/</loc>
    <lastmod>2022-03-02T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/attacchi-side-channel-quando-basta-ascoltare-l-hardware/</loc>
    <lastmod>2022-02-10T10:16:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/crittografia/</loc>
    <lastmod>2022-02-10T10:16:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/sidechannel/</loc>
    <lastmod>2022-02-10T10:16:00+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/perch%C3%A8-la-cyber-security-rappresenta-una-priorita-nel-settore-healthcare/</loc>
    <lastmod>2022-01-28T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/healthcare/</loc>
    <lastmod>2022-01-28T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/attacchi-alla-supply-chain-nel-mondo-dell-open-source/</loc>
    <lastmod>2022-01-13T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/jeremy-bernard-moeys/</loc>
    <lastmod>2022-01-13T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/supplychain/</loc>
    <lastmod>2022-01-13T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/almanacco-2021-eventi-passati-trend-e-considerazioni/</loc>
    <lastmod>2021-12-30T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/samuele-salvia/</loc>
    <lastmod>2021-12-15T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/vulnerabilita-apache-log4j-le-5-cose-da-fare/</loc>
    <lastmod>2021-12-15T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/log4j/</loc>
    <lastmod>2021-12-15T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/vulnerability/</loc>
    <lastmod>2021-12-15T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/la-crittografia-nell-era-dei-computer-quantistici/</loc>
    <lastmod>2021-12-02T10:16:00+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/black-friday-e-cyber-monday-i-rischi-informatici-dell-e-commerce/</loc>
    <lastmod>2021-11-16T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/jeremy-moeys/</loc>
    <lastmod>2021-11-16T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/blackfriday/</loc>
    <lastmod>2021-11-16T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/cybermonday/</loc>
    <lastmod>2021-11-16T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/e-commerce/</loc>
    <lastmod>2021-11-16T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/elisa-ballerio/</loc>
    <lastmod>2021-10-28T12:20:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/francesco-sirio-monti/</loc>
    <lastmod>2021-10-28T12:20:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/lattacco-informatico-alla-piattaforma-streaming-pi%C3%B9-grande-al-mondo-il-caso-twitch/</loc>
    <lastmod>2021-10-28T12:20:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/cyberattack/</loc>
    <lastmod>2021-10-28T12:20:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/twitch/</loc>
    <lastmod>2021-10-28T12:20:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/insider-threats-quando-attacco-informatico-proviene-dall-interno/</loc>
    <lastmod>2021-10-15T10:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/cyberintelligence/</loc>
    <lastmod>2021-10-15T10:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/insiderthreats/</loc>
    <lastmod>2021-10-15T10:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/pegasus-la-storia-e-le-caratteristiche-del-malware-zero-click/</loc>
    <lastmod>2021-09-28T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/stefano-andreatta/</loc>
    <lastmod>2021-09-28T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/attacchi-alla-supply-chain-il-caso-kaseya/</loc>
    <lastmod>2021-07-06T10:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/kaseya/</loc>
    <lastmod>2021-07-06T10:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/la-cyber-security-a-difesa-della-tavola-italiana/</loc>
    <lastmod>2021-06-30T10:36:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/attack/</loc>
    <lastmod>2021-06-30T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/food/</loc>
    <lastmod>2021-06-30T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/ai-confini-della-rete-viaggio-nel-dark-web/</loc>
    <lastmod>2021-06-16T10:36:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/fabio-crestani/</loc>
    <lastmod>2021-06-16T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/bitcoin/</loc>
    <lastmod>2021-06-16T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/darkweb/</loc>
    <lastmod>2021-06-16T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/market/</loc>
    <lastmod>2021-06-16T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/quattro-lezioni-dal-caso-axios/</loc>
    <lastmod>2021-04-13T10:36:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/incident/</loc>
    <lastmod>2021-04-13T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/response/</loc>
    <lastmod>2021-04-13T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/davide-cabiola/</loc>
    <lastmod>2021-03-10T10:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/vulnerabilita-critica-microsoft-exchange-mitigation/</loc>
    <lastmod>2021-03-10T10:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/microsoft/</loc>
    <lastmod>2021-03-10T10:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/quando-attacco-non-fa-rumore-malware-fileless/</loc>
    <lastmod>2021-02-18T10:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/fileless/</loc>
    <lastmod>2021-02-18T10:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/la-fine-di-emotet-operazione-europol/</loc>
    <lastmod>2021-01-29T10:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/sara-loprete/</loc>
    <lastmod>2021-01-29T10:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/emotet/</loc>
    <lastmod>2021-01-29T10:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/europol/</loc>
    <lastmod>2021-01-29T10:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/almanacco-2020-eventi-e-trend/</loc>
    <lastmod>2021-01-07T10:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/marco-lucchina/</loc>
    <lastmod>2021-01-07T10:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/matteo-manzoni/</loc>
    <lastmod>2020-12-15T09:46:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/sunburst-backdoor-nelle-patch-di-solarwind-orion/</loc>
    <lastmod>2020-12-15T09:46:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/sunburst/</loc>
    <lastmod>2020-12-15T09:46:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/covid-19-vaccino-gli-attacchi-informatici/</loc>
    <lastmod>2020-12-11T14:36:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/covid19/</loc>
    <lastmod>2020-12-11T14:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/il-business-dietro-al-business-cybercrime-as-a-service/</loc>
    <lastmod>2020-11-12T12:30:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/un-miliardo-di-dollari-e-lombra-di-silk-road/</loc>
    <lastmod>2020-11-08T10:36:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/silkroad/</loc>
    <lastmod>2020-11-08T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/le-piattaforme-di-videoconference-come-vettore-di-attacco/</loc>
    <lastmod>2020-09-11T11:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/videoconference/</loc>
    <lastmod>2020-09-11T11:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/cloud-e-security-adottare-una-strategia-di-difesa-efficace/</loc>
    <lastmod>2020-09-08T10:36:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/security/</loc>
    <lastmod>2020-09-08T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/categories/solutions/</loc>
    <lastmod>2020-09-08T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/advance-persistent-threat-i-nuovi-cyber-criminali/</loc>
    <lastmod>2020-08-06T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/apt/</loc>
    <lastmod>2020-08-06T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/alla-ricerca-delle-credenziali-perdute-analisi-osint/</loc>
    <lastmod>2020-07-07T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/osint/</loc>
    <lastmod>2020-07-07T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/rilevare-rispondere-alle-minacce-con-endpoint-detection-response/</loc>
    <lastmod>2020-06-25T10:36:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/detection/</loc>
    <lastmod>2020-06-25T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/endpoint/</loc>
    <lastmod>2020-06-25T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/i-sistemi-di-data-protection/</loc>
    <lastmod>2020-06-11T10:36:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/data/</loc>
    <lastmod>2020-06-11T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/protection/</loc>
    <lastmod>2020-06-11T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/sistemi/</loc>
    <lastmod>2020-06-11T10:36:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/cybercrime-e-social-network-un-binomio-da-non-sottovalutare/</loc>
    <lastmod>2020-05-25T14:16:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/socialnetwork/</loc>
    <lastmod>2020-05-25T14:16:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/phishing-ai-tempi-dello-smartworking-un-report/</loc>
    <lastmod>2020-04-28T13:46:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/phishing/</loc>
    <lastmod>2020-04-28T13:46:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/cybercrime-e-cybersecurity-intelligence-come-leva-per-la-difesa-della-tua-organizzazione/</loc>
    <lastmod>2020-04-01T10:46:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/defense/</loc>
    <lastmod>2020-04-01T10:46:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/intelligence/</loc>
    <lastmod>2020-04-01T10:46:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/log-siem-monitoraggio-sistemi-it/</loc>
    <lastmod>2020-02-24T15:46:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/log/</loc>
    <lastmod>2020-02-24T15:46:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/siem/</loc>
    <lastmod>2020-02-24T15:46:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/averagesecurity/</loc>
    <lastmod>2020-01-28T14:44:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/difesa/</loc>
    <lastmod>2020-01-28T14:44:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/strategia/</loc>
    <lastmod>2020-01-28T14:44:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/almanacco/</loc>
    <lastmod>2019-12-30T14:46:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/trend2020/</loc>
    <lastmod>2019-12-30T14:46:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/goldbrute/</loc>
    <lastmod>2019-12-13T09:46:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/authors/ivan-paterno/</loc>
    <lastmod>2019-12-13T09:46:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/goldbrute/</loc>
    <lastmod>2019-12-13T09:46:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/posts/businessmodelcanvas/</loc>
    <lastmod>2019-12-02T14:46:01+00:00</lastmod>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/businessmodel/</loc>
    <lastmod>2019-12-02T14:46:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/tags/businessmodelcanvas/</loc>
    <lastmod>2019-12-02T14:46:01+00:00</lastmod>
    <priority>0</priority>
  </url>
  
  <url>
    <loc>https://blog.cybergon.com/series/</loc>
    <priority>0</priority>
  </url>
  
</urlset>