
    <urlset 
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" 
      xmlns:coveo="https://www.coveo.com/schemas/metadata" 
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9/siteindex.xsd">
      <url>
                <loc>https://www.solutionsgranted.com/blog/zapium-ransomware-increases-pressure-to-pay-up-sept-29-2017</loc>
                <lastmod>2017-09-29T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-net-framework-remote-code-execution-sep-27-2017</loc>
                <lastmod>2017-09-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ransomware-asking-for-nudes-instead-of-bitcoins-sep-22-2017</loc>
                <lastmod>2017-09-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/optionbleed-memory-disclosure-vulnerability-in-apache-sep-22-2017</loc>
                <lastmod>2017-09-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-mazarbot-spreads-via-phishing-pages-for-raiffeisen-bank-sep-15-2017</loc>
                <lastmod>2017-09-15T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cashandler-a-new-variant-family-of-infostealer-trojan-actively-spreading-in-the-wild-sep-8-2017</loc>
                <lastmod>2017-09-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/apache-struts-2-cve-2017-9805-remote-code-execution-sep-7-2017</loc>
                <lastmod>2017-09-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/symantec-messaging-gateway-remote-command-execution-vulnerability-sep-1st-2017</loc>
                <lastmod>2017-09-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/dropper-trojan-delivers-shade-ransomware-and-zcash-crypto-miner-sep-1st-2017</loc>
                <lastmod>2017-09-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/synccrypt-ransomware-hides-behind-an-image-file-aug-25-2017</loc>
                <lastmod>2017-08-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/static-analysis-of-malicious-pdfs-august-182017</loc>
                <lastmod>2017-08-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/the-evolution-of-android-rat-spynote-continues-august-18-2017</loc>
                <lastmod>2017-08-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/newshell-ransomware-spotted-in-the-wild-aug-11-2017</loc>
                <lastmod>2017-08-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-updates-coverage-aug-8-2017</loc>
                <lastmod>2017-08-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ebaywall-ransomware-a-digital-revenge-against-ebay-aug-04-2017</loc>
                <lastmod>2017-08-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/hpe-intelligent-management-center-integer-underflow-vulnerability-aug-3-2017</loc>
                <lastmod>2017-08-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cve-2017-0199-attacks-still-active-july-28-2017</loc>
                <lastmod>2017-07-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-ransomware-spreading-as-codec-pack-installer-july-28-2017</loc>
                <lastmod>2017-07-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/hackers-now-attacking-unconfigured-wordpress-sites-july-22-2017</loc>
                <lastmod>2017-07-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/amnesia-ransomware-continues-high-payment-trend-july-21-2017</loc>
                <lastmod>2017-07-21T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/lockpos-the-new-point-of-sale-malware-actively-spreading-in-the-wild-jul-14-2017</loc>
                <lastmod>2017-07-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/fenrir-ransomware-pretends-to-be-adobe-acrobat-reader-jul-7-2017</loc>
                <lastmod>2017-07-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/phasing-out-smb1-its-time-to-consider-july-7-2017</loc>
                <lastmod>2017-07-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/wannacry-copycat-rampant-on-android-ecosystem-june-282017</loc>
                <lastmod>2017-06-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/the-not-petya-ransomware-spreading-worldwide-june-27-2017</loc>
                <lastmod>2017-06-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/master-ransomware-nets-168k-so-far-june-23rd-2017</loc>
                <lastmod>2017-06-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/live-exploits-intercepted-for-cve-2017-0143-jun-23rd-2017</loc>
                <lastmod>2017-06-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/attackers-use-eternalblue-exploit-to-enroll-adylkuzz-mining-botnet-may-19-2017</loc>
                <lastmod>2017-06-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-variant-of-dharma-ransomware-spotted-in-the-wild</loc>
                <lastmod>2017-06-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/whycry-ransomware-spotted-in-the-wild-jun-15-2017</loc>
                <lastmod>2017-06-15T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/pdf-spam-attachment-delivers-jaff-ransomware-with-3400-ransom-may-12-2017</loc>
                <lastmod>2017-06-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/sql-injection-vulnerability-in-joomla-cve-2017-8917-june-09-2017</loc>
                <lastmod>2017-06-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/resurrection-ransomware-plays-audio-from-a-horror-movie-jun-9-2017</loc>
                <lastmod>2017-06-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/samba-patched-seven-year-old-vulnerability-june-2-2017</loc>
                <lastmod>2017-06-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-marcher-update-adds-anti-emulation-feature-june-012017</loc>
                <lastmod>2017-06-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/eternalrocks-computer-worm-may-26-2017</loc>
                <lastmod>2017-05-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/elmers-glue-locker-demands-35k-but-fails-to-encrypt-may-26th-2017</loc>
                <lastmod>2017-05-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/what-you-should-know-about-eternalblue-exploit-and-wannacry-ransomware</loc>
                <lastmod>2017-05-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/type-confusion-vulnerability-in-microsoft-security-products-cve-2017-0290-may-11-2017</loc>
                <lastmod>2017-05-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/internet-explorer-memory-corruption-vulnerability-cve-2017-0202-may-5-2017</loc>
                <lastmod>2017-05-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-botnet-spreads-via-game-guides-may-5-2017</loc>
                <lastmod>2017-05-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/bind-control-channel-denial-of-service-apr-28-2017</loc>
                <lastmod>2017-04-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/hidden-tear-kit-gives-birth-to-karmen-ransomware-april-28th-2017</loc>
                <lastmod>2017-04-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/shadowbroker-releases-alleged-nsa-equationgroup-exploit-code-dump-easter-egg-on-good-friday-4-14-2017-posted-april-20-2017</loc>
                <lastmod>2017-04-20T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/the-android-banker-marcher-continues-to-evolve-april-14-2017</loc>
                <lastmod>2017-04-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/recent-microsoft-office-zero-day-cve-2017-0199-attacks-spotted-in-the-wild-apr-13-2017</loc>
                <lastmod>2017-04-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-march-14-2017</loc>
                <lastmod>2017-04-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/buffer-overflow-vulnerability-in-the-webdav-service-of-microsoft-iis-cve-2017-7269-mar-31-2017</loc>
                <lastmod>2017-04-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/chinese-ransomware-spotted-in-the-wild-apr-7-2017</loc>
                <lastmod>2017-04-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/important-css-directive-causes-ms-outlook-to-crash-apr-7-2017</loc>
                <lastmod>2017-04-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/sage-2-2-updated-with-audio-alert-and-reduced-ransom-march-29th-2017</loc>
                <lastmod>2017-03-29T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/apache-struts2-cve-2017-5638-vulnerability-follow-up-mar-24-2017</loc>
                <lastmod>2017-03-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-variant-of-atros-infostealer-actively-spreading-in-the-wild-mar-24-2017</loc>
                <lastmod>2017-03-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/alma-ransomware-delivered-via-rig-exploit-kit-march-17-2017</loc>
                <lastmod>2017-03-17T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/a-new-updated-version-of-terror-exploit-kit-observed-by-sonicwall-march-13th-2017</loc>
                <lastmod>2017-03-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/critical-vulnerability-on-apache-struts2-mar-10-2017</loc>
                <lastmod>2017-03-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/how-to-own-a-web-server-by-writing-an-email-jan-4-2017</loc>
                <lastmod>2017-03-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/wordpress-mobile-app-native-plugin-vulnerability-leads-to-web-site-pwnage-mar-03-2017</loc>
                <lastmod>2017-03-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/trumplocker-makes-you-pay-to-bring-down-its-cyber-walls-mar-03-2017</loc>
                <lastmod>2017-03-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/malicious-android-banker-for-serbank-february-24-2017</loc>
                <lastmod>2017-02-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-feb-23-2017</loc>
                <lastmod>2017-02-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-variants-of-sage-ransomware-spotted-in-the-wild-feb-17-2017</loc>
                <lastmod>2017-02-17T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-postpones-february-security-updates-to-march-feb-16-2017</loc>
                <lastmod>2017-02-16T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cancer-ransomware-forgets-how-to-ransomware-feb-10-2017</loc>
                <lastmod>2017-02-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/openssl-multiple-vulnerabilities-feb-10-2017</loc>
                <lastmod>2017-02-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/rig-exploit-kit-via-eitest-delivers-buggy-cryptoshield-ransomware-feb-3rd-2017</loc>
                <lastmod>2017-02-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/simple-tips-for-network-sanity</loc>
                <lastmod>2017-01-30T19:48:09.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cisco-webex-url-remote-command-execution-vulnerability-jan-24-2017</loc>
                <lastmod>2017-01-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/critical-vulnerabilities-reported-on-samsung-smartcam-jan-27-2017</loc>
                <lastmod>2017-01-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/artemis-a-new-infostealer-in-the-wild-january-26-2017</loc>
                <lastmod>2017-01-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-flash-player-memory-corruption-vulnerability-cve-2017-2930-jan-20-2017</loc>
                <lastmod>2017-01-20T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/fake-super-mario-runs-to-android-with-malware-january-17-2017</loc>
                <lastmod>2017-01-17T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-jan-10-2017</loc>
                <lastmod>2017-01-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/this-ransomware-is-still-in-the-christmas-spirit-jan-10-2017</loc>
                <lastmod>2017-01-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/bleedgreen-firecrypt-ransomware-kit-fails-at-ddos-jan-6th-2017</loc>
                <lastmod>2017-01-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-jan-12-2016</loc>
                <lastmod>2017-01-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/vim-modelines-remote-command-execution-dec-23-2016</loc>
                <lastmod>2016-12-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/playing-media-files-can-lead-to-remote-code-execution-in-linux</loc>
                <lastmod>2016-12-20T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/floki-bot-a-zeus-based-banking-trojan-actively-spreading-in-the-wild-dec-15-2016</loc>
                <lastmod>2016-12-15T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-dec-13-2016</loc>
                <lastmod>2016-12-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/memcached-integer-overflow-cve-2016-8704-dec-9-2016</loc>
                <lastmod>2016-12-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/persian-lockscreen-android-malware-borrows-heavily-from-online-tutorials-december-8-2016</loc>
                <lastmod>2016-12-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/network-time-protocol-daemon-ntpd-dos-vulnerability-dec-2-2016</loc>
                <lastmod>2016-12-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/huge-wave-of-locky-ransomware-spread-via-javascript-spam-feb-19th-2016</loc>
                <lastmod>2016-12-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ransomware-attack-resulted-to-free-train-rides-over-the-holiday-weekend-nov-30-2016</loc>
                <lastmod>2016-11-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/critical-business-threats-ransomware-and-employee-online-shopping</loc>
                <lastmod>2016-11-29T19:02:20.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cerber-ransom-payment-doubles-nov-23-2016</loc>
                <lastmod>2016-11-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spam-campaign-roundup-the-thanksgiving-day-edition-nov-23-2016</loc>
                <lastmod>2016-11-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/thanksgiving-holiday-and-shopping-season-are-coming-nov-21-2016</loc>
                <lastmod>2016-11-21T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cryptoluck-ransomware-infects-victims-using-signed-google-update-nov-18-2016</loc>
                <lastmod>2016-11-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/mirai-and-the-iot-ddos-attacks-a-new-threat-in-old-form</loc>
                <lastmod>2016-11-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-nov-8-2016</loc>
                <lastmod>2016-11-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-0-day-vulnerability-leads-to-remote-code-execution-oct-31-2016</loc>
                <lastmod>2016-10-31T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/imagemagick-mogrify-buffer-overflow-vulnerability-oct-21-2016</loc>
                <lastmod>2016-10-21T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/dresscode-android-malware-equipped-to-infiltrate-corporate-networks-october-21-2016</loc>
                <lastmod>2016-10-21T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/killerlocker-ransomware-oct-13-2016</loc>
                <lastmod>2016-10-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-oct-11-2016</loc>
                <lastmod>2016-10-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/export-grade-ciphers-are-still-in-use-oct-7-2016</loc>
                <lastmod>2016-10-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/shade-ransomware-oct-7th-2016</loc>
                <lastmod>2016-10-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/hpe-network-automation-rce-vulnerability-sept-30-2016</loc>
                <lastmod>2016-09-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/vulnerability-on-adobe-flash-player-exploit-in-the-wild-sep-23-2016</loc>
                <lastmod>2016-09-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/bosnian-ransomware-spreading-in-the-wild-september-23-2016</loc>
                <lastmod>2016-09-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-sept-13-2016</loc>
                <lastmod>2016-09-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/unlock92-ransomware-v2-0-seen-in-the-wild-sep-9-2016</loc>
                <lastmod>2016-09-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/command-injection-vulnerabilities-in-freepbx-framework</loc>
                <lastmod>2016-09-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ranserkd-ransomware-uses-imgur-to-store-infection-data-sept-2nd-2016</loc>
                <lastmod>2016-09-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/wordpress-admin-api-directory-traversal</loc>
                <lastmod>2016-09-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cve-2016-0189-exploits-spotted-in-the-wild-aug-26-2016</loc>
                <lastmod>2016-08-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-variant-of-cerber-ransomware-spotted-in-the-wild-aug-26-2016</loc>
                <lastmod>2016-08-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-cryptohost-ransomware-spotted-in-the-wild-aug-23-2016</loc>
                <lastmod>2016-08-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-word-2016-memory-corruption-vulnerability-analysis-cve-2016-3316</loc>
                <lastmod>2016-08-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ryzerlo-ransomware-poses-as-pokemon-game-august-19-2016</loc>
                <lastmod>2016-08-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-aug-9-2016</loc>
                <lastmod>2016-08-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/quadrooter-the-flaw-that-can-affect-millions-of-android-devices-august-9-2016</loc>
                <lastmod>2016-08-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/old-browsers-are-running-behind-your-firewall-aug-5-2016</loc>
                <lastmod>2016-08-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/drupal-cms-modules-vulnerabilities-leads-to-remote-code-execution</loc>
                <lastmod>2016-08-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/fake-pokemon-go-apps-tuck-away-dangerous-malware-august-1-2016</loc>
                <lastmod>2016-08-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/foxit-pdf-reader-gotor-action-stack-buffer-overflow</loc>
                <lastmod>2016-07-29T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-locky-ransomware-uses-jscript-files-to-avoid-detection-in-the-wild-jul-272016</loc>
                <lastmod>2016-07-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/legitimate-software-website-was-seen-distributing-malware-jul-22-2016</loc>
                <lastmod>2016-07-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/http_proxy-traffic-redirection</loc>
                <lastmod>2016-07-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/fakeransom-deletes-files-then-demands-payment-for-nothing-jul-15th-2016</loc>
                <lastmod>2016-07-15T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-july-12-2016</loc>
                <lastmod>2016-07-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/php-tar-file-parsing-uninitialized-reference-cve-2016-4343</loc>
                <lastmod>2016-07-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/bart-ransomware-spotted-in-the-wild-july-1-2016</loc>
                <lastmod>2016-07-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/you-might-not-know-you-are-still-using-sslv2-0-july-1-2016</loc>
                <lastmod>2016-07-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ntp-crypto-nak-dos</loc>
                <lastmod>2016-06-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-android-lockscreen-campaign-spotted-in-the-wild-may-12-2016</loc>
                <lastmod>2016-06-16T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/unpatched-critical-flash-vulnerability-being-exploited-in-the-wild-cve-2016-4171</loc>
                <lastmod>2016-06-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-june-14-2016</loc>
                <lastmod>2016-06-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/antidetect-b-malware-found-with-valid-digital-certificate-jun-82016</loc>
                <lastmod>2016-06-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/apache-struts-dynamic-method-invocation-remote-code-execution-cve-2016-3081</loc>
                <lastmod>2016-06-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/dma-locker-4-0-yet-another-ransomware-june-2nd-2016</loc>
                <lastmod>2016-06-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/badblock-ransomware-is-on-the-block-may-25-2016</loc>
                <lastmod>2016-05-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/recent-flash-zero-day-cve-2016-4117-attacks-spotted-in-the-wild-may-242016</loc>
                <lastmod>2016-05-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/gd-library-buffer-overflow-may-19-2016</loc>
                <lastmod>2016-05-20T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-russian-rasomware-spotted-in-the-wild-may-20-2016</loc>
                <lastmod>2016-05-20T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/6-cybersecurity-tips-business-can-learn-pci-dss</loc>
                <lastmod>2016-05-18T14:26:38.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoftcve-2016-0189-and-adobecve-2016-4117-zero-day-may-12-2016</loc>
                <lastmod>2016-05-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/redosdru-v-malware-that-hides-in-encrypted-dll-files-to-avoid-detection-by-firewalls-may-112016</loc>
                <lastmod>2016-05-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-may-10-2016</loc>
                <lastmod>2016-05-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/imagetragick-owning-a-web-server-via-simple-upload-may-9-2016</loc>
                <lastmod>2016-05-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/squid-proxy-esi-component-buffer-overflow-may-62016</loc>
                <lastmod>2016-05-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/edge-vs-internet-explorer-11-may-1-2016</loc>
                <lastmod>2016-05-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/click-fraud-trojan-deletes-files-and-impairs-systems-april-29th-2016</loc>
                <lastmod>2016-04-29T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/apple-quicktime-memory-corruption-vulnerability-apr-21-2016</loc>
                <lastmod>2016-04-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/jigsaw-ransomware-spotted-in-the-wild-april-22-2016</loc>
                <lastmod>2016-04-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/metasploit-enhanced-android-malware-spotted-in-the-wild-april-15-2016</loc>
                <lastmod>2016-04-15T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-apr-12-2016</loc>
                <lastmod>2016-04-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/badlock-windows-sam-and-lsad-downgrade-vulnerability</loc>
                <lastmod>2016-04-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/guatambu-new-multi-component-infostealer-drops-kartoxa-pos-malware-apr-08-2016</loc>
                <lastmod>2016-04-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-type-confusion-vulnerability-cve-2016-1019-exploited-in-the-wild</loc>
                <lastmod>2016-04-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/isc-bind-dns-dos</loc>
                <lastmod>2016-04-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/petya-ransomware-encrypts-the-mbr-mar-30-2016</loc>
                <lastmod>2016-03-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-windows-media-arbitrary-code-execution-cve-2016-0101</loc>
                <lastmod>2016-03-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/runouce-trojan-with-irc-bot-spreads-via-eml-files-march-24-2016</loc>
                <lastmod>2016-03-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-silverlight-remote-code-execution-vulnerability-cve-2016-0034-mar-182016</loc>
                <lastmod>2016-03-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/data-stealing-trojan-posing-as-a-configuration-file-march-18-2016</loc>
                <lastmod>2016-03-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/rig-exploit-kit-march-9th-2016</loc>
                <lastmod>2016-03-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/frameworkpos-acc-new-variant-of-frameworkpos-uses-dns-requests-to-deliver-stolen-card-data-to-the-attackers-mar-12016</loc>
                <lastmod>2016-03-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-mar-8-2016</loc>
                <lastmod>2016-03-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/preventing-drown-attack-march-2-2016</loc>
                <lastmod>2016-03-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/secure-mobile-access-models-200-400-2</loc>
                <lastmod>2016-03-01T13:43:26.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/oracle-application-testing-suite-directory-traversal-vulnerability-feb-26-2016</loc>
                <lastmod>2016-02-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/yet-another-linux-malware-spotted-in-the-wild-feb-26-2016</loc>
                <lastmod>2016-02-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/buffer-overflow-vulnerability-in-glibc-library-cve-2015-7547</loc>
                <lastmod>2016-02-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/sonicwall-security-helping-csos-turn-no-yes</loc>
                <lastmod>2016-02-23T12:39:30.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-nps-radius-dos</loc>
                <lastmod>2016-02-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/sonicwall-guards-glibc-vulnerability</loc>
                <lastmod>2016-02-18T15:45:36.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cybersecurity-next-steps-defend-cyber-attacks</loc>
                <lastmod>2016-02-17T14:36:55.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-french-ransomware-spotted-in-the-wild-february-12-2016</loc>
                <lastmod>2016-02-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-feb-9-2016</loc>
                <lastmod>2016-02-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/dell-sonicwall-and-financial-sector-cig</loc>
                <lastmod>2016-02-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/fakeav-dbg-a-malware-uses-windows-sysinternals-name-to-avoid-detection-feb-2-2016</loc>
                <lastmod>2016-02-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/three-core-network-security-tips-k-12-expert</loc>
                <lastmod>2016-02-01T15:37:47.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/sonicalert-microsoft-windows-os-http-user-agents-1-29-2016</loc>
                <lastmod>2016-01-29T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-word-remote-code-execution-vulnerability-cve-2015-0097-nov-252015</loc>
                <lastmod>2016-01-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/a-wave-of-malicious-vbscript-may-lead-to-financial-fraud-jan-22-2016</loc>
                <lastmod>2016-01-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/windows-media-center-information-disclosure-vulnerability-cve-2015-6127-jan-22-2016</loc>
                <lastmod>2016-01-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/document-with-vba-macro-drops-a-variety-of-malware-jan-15th-2016</loc>
                <lastmod>2016-01-15T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/recognized-channel-sales-expert-steve-pataky-joins-dell-security</loc>
                <lastmod>2016-01-12T15:21:39.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/serbbu-rac-a-malware-opens-remote-access-service-on-target-system</loc>
                <lastmod>2016-01-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cve-2015-8446-exploits-in-the-wild-jan-8-2016</loc>
                <lastmod>2016-01-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/data-stealing-trojan-described-as-a-jpg-file-december-31-2015</loc>
                <lastmod>2015-12-31T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/knock-knock-ck-exploit-kit-is-back-dec-31st-2015</loc>
                <lastmod>2015-12-31T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/out-of-band-adobe-security-update-dec-29-2015</loc>
                <lastmod>2015-12-29T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/trojan-distributed-as-8-ball-pool-game-hack-dec-18-2015</loc>
                <lastmod>2015-12-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/jenkins-ci-server-commons-collections-library-insecure-deserialization</loc>
                <lastmod>2015-12-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/dridex-module-leaks-system-info-and-potentially-more-dec-11th-2015</loc>
                <lastmod>2015-12-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/control-network-holiday-shopping-season</loc>
                <lastmod>2015-12-08T16:17:43.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-december-8-2015</loc>
                <lastmod>2015-12-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/holiday-shopping-season-increased-online-shopping-and-increased-malicious-email-threats-dec-4-2015</loc>
                <lastmod>2015-12-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/data-stealing-trojan-posing-as-a-text-document-december-4-2015</loc>
                <lastmod>2015-12-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spam-campaign-roundup-the-thanksgiving-day-edition-nov-25-2015</loc>
                <lastmod>2015-11-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/abaddon-pos-malware-targets-pos-terminals</loc>
                <lastmod>2015-11-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ntp-daemon-vulnerabilities-nov-19-2015</loc>
                <lastmod>2015-11-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-november-10-2015</loc>
                <lastmod>2015-11-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/active-android-malware-campaign-steals-credit-card-and-banking-related-information-from-infected-devices-november-5-2015</loc>
                <lastmod>2015-11-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/squid-ssl-dos</loc>
                <lastmod>2015-11-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cryptowall-4-0-emerges-with-new-features-nov-6-2015</loc>
                <lastmod>2015-11-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-type-confusion-vulnerability-cve-2015-7645-exploits-in-the-wild</loc>
                <lastmod>2015-10-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/heur-cfg-a-malware-uses-encryption-to-hide-its-intentions</loc>
                <lastmod>2015-10-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/chimera-ransomware-uses-bitmessage-over-tor-oct-23-2015</loc>
                <lastmod>2015-10-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/more-adobe-flash-swf-exploits-discovered-in-the-wild-for-cve-2015-5119</loc>
                <lastmod>2015-10-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/info-stealer-module-leaks-process-information-oct-16th-2015</loc>
                <lastmod>2015-10-16T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-october-13-2015</loc>
                <lastmod>2015-10-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/a-double-free-vulnerability-in-gnutls</loc>
                <lastmod>2015-10-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/the-dell-sonicwall-threats-research-team-observed-reports-of-a-new-malware-family-named-gav-venik-rkt-actively-spreading-in-the-wild</loc>
                <lastmod>2015-10-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/exploits-for-cve-2015-2331-spotted-in-the-wild-oct-02-2015</loc>
                <lastmod>2015-10-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-office-macros-are-back-with-dridex-trojan-october-2-2015</loc>
                <lastmod>2015-10-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-porndroid-ransomware-with-updated-features-september-25-2015</loc>
                <lastmod>2015-09-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/linux-based-ircbot-spotted-in-the-wild-sep-18-2015</loc>
                <lastmod>2015-09-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/multiple-exploits-for-cve-2015-5119-observed-in-the-wild-sept-18-2015</loc>
                <lastmod>2015-09-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spartan-exploit-kit-sep-11th-2015</loc>
                <lastmod>2015-09-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-september-08-2015</loc>
                <lastmod>2015-09-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/angler-ek-is-exploiting-adobe-flash-vulnerability-cve-2015-5560</loc>
                <lastmod>2015-09-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/parite-bkr-a-backdoor-uses-image-file-to-avoid-detection</loc>
                <lastmod>2015-09-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/sonicwall-partners-fight-malware-economy-innovation</loc>
                <lastmod>2015-09-01T10:20:11.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/openssl-x509_cmp_time-dos</loc>
                <lastmod>2015-08-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/unravelled-vbe-script-drops-banking-trojan-aug-28th-2015</loc>
                <lastmod>2015-08-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/antidetect-ab-a-malware-uses-microsoft-register-server-to-avoid-detection-by-anti-virus-programs</loc>
                <lastmod>2015-08-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-internet-explorer-memory-corruption-vulnerability-aug-18-2015</loc>
                <lastmod>2015-08-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/data-stealing-trojan-found-in-the-wild-august-14-2015</loc>
                <lastmod>2015-08-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-malware-programmed-to-send-massive-amounts-of-messages-august-7-2015</loc>
                <lastmod>2015-08-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-august-11-2015</loc>
                <lastmod>2015-08-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-malware-with-hidden-message-for-security-analysts-june-19-2015</loc>
                <lastmod>2015-08-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/wireless-firewall-solutions-small-offices-distributed-enterprises</loc>
                <lastmod>2015-08-04T10:48:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/atmfd-dll-memory-corruption-vulnerability-attacks-spotted-in-the-wild-aug-4-2015</loc>
                <lastmod>2015-08-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/openssl-alternative-chains-certificate-forgery-aug-3-2015</loc>
                <lastmod>2015-08-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/plugx-trojan-was-seen-making-the-rounds-july-30-2015</loc>
                <lastmod>2015-07-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/stagefright-one-of-the-most-threatening-android-exploit-ever-discovered-july-30-2015</loc>
                <lastmod>2015-07-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-gamapos-malware-targets-us-companies</loc>
                <lastmod>2015-07-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-font-driver-oob-rce-vulnerability-july-20-2015</loc>
                <lastmod>2015-07-20T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/magic-malware-targets-uk-businesses-july-17th-2015</loc>
                <lastmod>2015-07-17T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cve-2015-5119recent-adobe-flash-0-day-exploit-in-the-wild</loc>
                <lastmod>2015-07-16T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-july-14-2015</loc>
                <lastmod>2015-07-16T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/two-more-flash-0-days-as-a-result-of-hackingteam-data-leak</loc>
                <lastmod>2015-07-15T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/upatre-smj-a-malware-hides-in-encrypted-png-image</loc>
                <lastmod>2015-07-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cross-site-scripting-in-apple-cups-web-interface</loc>
                <lastmod>2015-07-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/0-day-flash-exploit-from-hacking-team-data-leak-july-7-2015</loc>
                <lastmod>2015-07-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/recjs-a-multi-component-malware-hides-behind-javascript</loc>
                <lastmod>2015-06-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-flash-player-heap-zero-day-vulnerability-cve-2015-3113-jun-25-2015</loc>
                <lastmod>2015-06-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/buffer-overflow-vulnerability-in-php-june-192015</loc>
                <lastmod>2015-06-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/oracle-micros-pos-customers-targeted-by-malumpos-malware</loc>
                <lastmod>2015-06-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-jun-9-2015</loc>
                <lastmod>2015-06-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/data-stealing-trojan-posing-as-a-pdf-document-june-5-2015</loc>
                <lastmod>2015-06-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/data-stealing-trojan-was-found-using-windows-powershell-remoting-may-28-2015</loc>
                <lastmod>2015-05-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/another-tls-vulnerability-logjam-found-last-week-may-28-2015</loc>
                <lastmod>2015-05-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spam-campaign-roundup-the-memorial-day-edition-may-22-2015</loc>
                <lastmod>2015-05-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/teslacrypt-ransomware-joins-the-fee-for-file-recovery-trend-may-22nd-2015</loc>
                <lastmod>2015-05-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/proftpd-unauthenticated-remote-file-copying-may-22-2015</loc>
                <lastmod>2015-05-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/runnerx-chm-a-microsoft-help-file-malware-targets-jpmorgan-chase-customers</loc>
                <lastmod>2015-05-20T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-may-12-2015</loc>
                <lastmod>2015-05-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/uc-browser-web-browsing-incognito-dell-sonicwall-application-control</loc>
                <lastmod>2015-05-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/angler-ek1-a-drive-by-download-exploit-kit-targets-adobe-flash-player</loc>
                <lastmod>2015-05-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/punkey-new-pos-malware</loc>
                <lastmod>2015-05-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/windows-privilege-escalation-0-day-vulnerability-apr-22-2015</loc>
                <lastmod>2015-04-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/wordpress-stored-xss-zero-day-april-27-2015</loc>
                <lastmod>2015-04-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/dropperxsw-a-registry-only-malware-april-23rd-2015</loc>
                <lastmod>2015-04-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-april-14-2015</loc>
                <lastmod>2015-04-21T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/dyre-l-a-malware-tries-to-register-itself-as-google-update-service-to-avoid-detection</loc>
                <lastmod>2015-04-15T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/apache-qpid-denial-of-service-vulnerability-april-10-2015</loc>
                <lastmod>2015-04-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/newposthings-c-a-64-bit-variant-of-pos-malware-released-in-the-wild</loc>
                <lastmod>2015-04-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-malware-hides-malicious-code-in-a-library-file-april-8-2015</loc>
                <lastmod>2015-04-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/laziok-malware-targets-energy-companies</loc>
                <lastmod>2015-04-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ncaa-march-madness-2014-dell-sonicwall-application-control</loc>
                <lastmod>2015-04-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/poseidon-a-new-malware-program-targets-point-of-sale-systems</loc>
                <lastmod>2015-03-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/data-stealing-trojan-leaves-no-trace-behind-mar-27-2015</loc>
                <lastmod>2015-03-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/oracle-data-integrator-type-confusion-vulnerability-mar-24-2015</loc>
                <lastmod>2015-03-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-to-phase-out-internet-explorer-mar-20-2015</loc>
                <lastmod>2015-03-20T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/upatre-used-for-political-spam-campaign-mar-19-2015</loc>
                <lastmod>2015-03-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cryptowall-3-0-ransomware-returns-with-i2p-network</loc>
                <lastmod>2015-03-17T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-mar-10-2015</loc>
                <lastmod>2015-03-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/parite-cbr-a-polymorphic-virus-which-infects-all-portable-exe-files</loc>
                <lastmod>2015-03-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/malicious-trojan-poses-as-jp-morgan-secure-message-march-6-2015</loc>
                <lastmod>2015-03-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/freak-attacking-export-rsa-keys-march-4-2015</loc>
                <lastmod>2015-03-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/komodia-certificate-compromise-affects-superfish-and-other-software-feb-232015</loc>
                <lastmod>2015-03-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/manageengine-desktop-central-directory-traversal-vulnerability-feb-202015</loc>
                <lastmod>2015-03-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/bifrose-fpb-a-new-variant-of-info-stealer-bifrose-actively-spreading-in-the-wild</loc>
                <lastmod>2015-02-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spam-campaign-roundup-the-valentines-day-edition-feb-13-2015</loc>
                <lastmod>2015-02-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adware-campaign-spreads-on-android-app-stores-feb-12-2015</loc>
                <lastmod>2015-02-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-feb-10-2015</loc>
                <lastmod>2015-02-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/one-more-avatar-of-nuclear-exploit-kit-feb-6th-2015</loc>
                <lastmod>2015-02-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/dyre-e-new-variant-of-dyre-trojan-spreads-upatre-malware</loc>
                <lastmod>2015-02-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-internet-explorer-same-origin-policy-bypass-cve-2015-0072-feb-4-2015</loc>
                <lastmod>2015-02-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-flash-zero-day-cve-2015-0313-feb-3-2015</loc>
                <lastmod>2015-02-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/downloader-trojan-that-can-drop-multiple-malware-jan-30th-2015</loc>
                <lastmod>2015-01-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ghost-vulnerability-cve-2015-0235-jan-28-2015</loc>
                <lastmod>2015-01-29T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-flash-zero-day-cve-2015-0311-jan-26-2015</loc>
                <lastmod>2015-01-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-flash-player-integer-overflow-jan-22-2015</loc>
                <lastmod>2015-01-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/latest-adobe-flash-zero-day-cve-2015-0310-jan-22-2015</loc>
                <lastmod>2015-01-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-jan-13-2015</loc>
                <lastmod>2015-01-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/malicious-microsoft-office-macros-downloading-dridex-trojan-january-12-2015</loc>
                <lastmod>2015-01-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/manageengine-desktop-central-policy-bypass-vulnerability-jan-9-2015</loc>
                <lastmod>2015-01-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/asterisk-res_pjsip_pubsub-denial-of-service-jan-2-2015</loc>
                <lastmod>2015-01-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cloudatlas-campaign-makes-its-way-to-mobile-platforms-december-25-2014</loc>
                <lastmod>2014-12-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cloudatlas-an-advanced-persistent-threat-spreading-in-the-wild</loc>
                <lastmod>2014-12-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/windows-ole-cve-2014-6332-exploit-spotted-in-the-wild-dec-172014</loc>
                <lastmod>2014-12-17T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ransomware-purports-to-be-from-national-security-bureau-dec-12-2014</loc>
                <lastmod>2014-12-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-internet-explorer-displayrun-in-use-after-free-vulnerability-december-112014</loc>
                <lastmod>2014-12-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-december-09-2014</loc>
                <lastmod>2014-12-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/bmc-track-it-net-remoting-vulnerability-dec-5-2014</loc>
                <lastmod>2014-12-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/sony-pictures-appeared-to-have-been-targeted-by-a-destructive-trojan-dec-3-2014</loc>
                <lastmod>2014-12-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/poweliks-a-file-less-malware-hides-in-windows-registry</loc>
                <lastmod>2014-12-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spam-campaign-roundup-the-thanksgiving-day-edition-nov-26-2014</loc>
                <lastmod>2014-11-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/mitigating-doubledirect-attacks-nov-26-2014</loc>
                <lastmod>2014-11-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/usbstealer-usb-info-stealer-targeting-various-organizations-systems</loc>
                <lastmod>2014-11-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-elevation-of-privilege-vulnerability-ms14-068-november-18-2014</loc>
                <lastmod>2014-11-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/magnitude-exploit-kit-using-htm5-canvas-element-to-hide-iframe-nov-17-2014</loc>
                <lastmod>2014-11-17T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-november-12-2014</loc>
                <lastmod>2014-11-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/holiday-shopping-season-phishing-emails</loc>
                <lastmod>2014-11-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/the-first-malicious-xposed-framework-module-november-7-2014</loc>
                <lastmod>2014-11-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/rango-antivirus-fakeav-makes-a-surge-oct-31-2014</loc>
                <lastmod>2014-10-31T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/hp-sprinter-remote-code-execution-vulnerabilities-oct-31-2014</loc>
                <lastmod>2014-10-31T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/orcakiller-a-rat-using-windows-crypto-api-functions</loc>
                <lastmod>2014-10-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/drupal-core-sql-injection-vulnerability-cve-2014-3704-oct-24-2014</loc>
                <lastmod>2014-10-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/flash-game-silently-installs-a-keylogger-oct-24-2014</loc>
                <lastmod>2014-10-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-ole-remote-code-execution-cve-2014-6352-october-22-2014</loc>
                <lastmod>2014-10-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/sandworm-a-windows-vulnerability-being-actively-exploited-in-the-wild</loc>
                <lastmod>2014-10-16T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ssl-3-0-poodle-attack-oct-15-2014</loc>
                <lastmod>2014-10-15T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-october-14-2014</loc>
                <lastmod>2014-10-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adware-taking-cues-from-apt</loc>
                <lastmod>2014-10-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/tyupkin-malware-which-is-designed-for-atm-infrastructure</loc>
                <lastmod>2014-10-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-browser-information-disclosure-oct-10-2014</loc>
                <lastmod>2014-10-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-windseeker-with-injection-and-hooking-mechanisms-oct-3-2014</loc>
                <lastmod>2014-10-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/signed-cryptowall-distributed-via-drive-by-download-advertising-campaign</loc>
                <lastmod>2014-10-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/openssl-heartbleed-3-months-later-july-3-2014</loc>
                <lastmod>2014-10-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/miras-backdoor-trojan-september-12-2014</loc>
                <lastmod>2014-10-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/metasploit-modules-used-by-malicious-exploit-kit-in-the-wild-sep-12-2014</loc>
                <lastmod>2014-10-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/sql-injection-attacks-up-to-date-summary-sept-19-2014</loc>
                <lastmod>2014-10-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/blackpos-targets-point-of-sale-malware-version-2</loc>
                <lastmod>2014-10-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/trojan-uses-an-old-compression-format-to-thwart-detection-sep-19-2014</loc>
                <lastmod>2014-10-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/linux-trojan-dropped-via-cve-2014-6271-vulnerability-sep-26-2014</loc>
                <lastmod>2014-10-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/gnu-bash-code-injection-vulnerability-cve-2014-6271-sept-25-2014</loc>
                <lastmod>2014-10-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/bash-code-injection-vulnerabilities-update-oct-3-2014</loc>
                <lastmod>2014-10-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/miniduke-multi-component-info-stealer-spreads-via-social-engineering</loc>
                <lastmod>2014-09-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-september-09-2014</loc>
                <lastmod>2014-09-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-ie-vulnerability-cve-2014-1815-attacks-spotted-in-the-wild-september-05-2014</loc>
                <lastmod>2014-09-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spam-campaign-roundup-the-labor-day-edition-aug-29-2014</loc>
                <lastmod>2014-08-29T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/source-code-leaks-for-android-rat-dendroid-aug-29-2014</loc>
                <lastmod>2014-08-29T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-openssl-vulnerabilities-aug-29-2014</loc>
                <lastmod>2014-08-29T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/samba-nmbd-unstrcpy-buffer-overflow-aug-22-2014</loc>
                <lastmod>2014-08-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/urelas-spy-trojan-drops-multiple-malware-families-aug-22nd-2014</loc>
                <lastmod>2014-08-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/trojan-masquerading-as-a-resume-seen-in-the-wild-aug-15-2014</loc>
                <lastmod>2014-08-15T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-august-12-2014</loc>
                <lastmod>2014-08-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/google-chrome-use-after-free-vulnerability-aug-82014</loc>
                <lastmod>2014-08-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/backoff-new-point-of-sale-malware-august-062014</loc>
                <lastmod>2014-08-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/servstart-backdoor-spotted-in-the-wild</loc>
                <lastmod>2014-08-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/symantec-web-gateway-sql-injection-aug-1-2014</loc>
                <lastmod>2014-08-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/browserlock-july-252014</loc>
                <lastmod>2014-07-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/zeus-gameover-v3-july-24-2014</loc>
                <lastmod>2014-07-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/another-android-trojan-targeting-korean-banks-july-18-2014</loc>
                <lastmod>2014-07-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/symantec-web-gateway-xss-jul-18-2014</loc>
                <lastmod>2014-07-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/sweetorange-exploitkit-and-qakbot-july-11-2014</loc>
                <lastmod>2014-07-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-july-8-2014</loc>
                <lastmod>2014-07-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spam-campaign-roundup-the-independence-day-edition-july-3-2014</loc>
                <lastmod>2014-07-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-banking-trojan-targets-korean-users-june-30-2014</loc>
                <lastmod>2014-06-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cryptowall-ransomware-uses-bitcoin-and-tor-exclusively-june-27-2014</loc>
                <lastmod>2014-06-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/sap-sybase-esp-vulnerabilities-jun-27-2014</loc>
                <lastmod>2014-06-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/angler-exploit-kit-drive-by-attack-june-25-2014</loc>
                <lastmod>2014-06-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ranbyus-banking-trojan-cousin-of-zbot</loc>
                <lastmod>2014-06-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cross-site-scripting-vulnerability-in-cups-web-interface-june-20-2014</loc>
                <lastmod>2014-06-20T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/fifa-world-cup-scams-abound-june-12-2014</loc>
                <lastmod>2014-06-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spam-campaign-roundup-the-fathers-day-edition-june-13-2014</loc>
                <lastmod>2014-06-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/first-tor-based-file-encrypting-android-ransomware-june-10-2014</loc>
                <lastmod>2014-06-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-june-10-2014</loc>
                <lastmod>2014-06-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/soraya-infostealer-bot-with-point-of-sale-support-june-5-2014</loc>
                <lastmod>2014-06-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/openssl-ssl-tls-mitm-vulnerability-june-6-2014</loc>
                <lastmod>2014-06-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ca-erwin-web-portal-directory-traversal-may-30-2014</loc>
                <lastmod>2014-05-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/dropper-trojan-leaks-user-data-may-30-2014</loc>
                <lastmod>2014-05-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spam-campaign-roundup-the-memorial-day-edition-may-23-2014</loc>
                <lastmod>2014-05-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/internet-explorer-vulnerability-cve-2014-1776-exploit-analysismay-23-2014</loc>
                <lastmod>2014-05-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/androidlocker-ransomware-targeting-android-phones-may-15-2014</loc>
                <lastmod>2014-05-15T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/openssl-heartbleed-vulnerability-follow-up-april-18-2014</loc>
                <lastmod>2014-05-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-may-13-2014</loc>
                <lastmod>2014-05-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/apache-struts-2-security-bypass-vulnerabilities-may-8-2014</loc>
                <lastmod>2014-05-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/eclipse-bot-emerges-with-ddos-capabilities-may-8-2014</loc>
                <lastmod>2014-05-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-out-of-band-security-advisory-for-ie-april-27-2014</loc>
                <lastmod>2014-05-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-flash-player-buffer-overflow-may-2-2014</loc>
                <lastmod>2014-05-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/bublik-cybergate-and-game-of-thrones</loc>
                <lastmod>2014-05-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-reader-mobile-app-javascript-code-execution-april-25-2014</loc>
                <lastmod>2014-04-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/infostealer-trojan-targeting-german-users-april-25-2014</loc>
                <lastmod>2014-04-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/fareit-trojan-drops-multiple-malware-families-april-18-2014</loc>
                <lastmod>2014-04-21T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/openssl-heartbleed-vulnerabilitycve-2014-0160-actively-targetedapr-9-2014</loc>
                <lastmod>2014-04-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/malware-claiming-to-be-heartbleed-test-tool-april-11-2014</loc>
                <lastmod>2014-04-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-apr-8-2014</loc>
                <lastmod>2014-04-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cutwail-spam-campaigns-lure-users-to-download-various-threats-april-04-2014</loc>
                <lastmod>2014-04-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-word-zero-daycve-2014-1761-exploit-analysis-apr-4-2014</loc>
                <lastmod>2014-04-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/onkods-social-engineering-spam-campaign-continues-mar-28-2014</loc>
                <lastmod>2014-03-29T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-advisory-coverage-march-24-2014</loc>
                <lastmod>2014-03-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/web-application-xml-external-entity-vulnerabilities-mar-212014</loc>
                <lastmod>2014-03-21T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/vondola-trojan-steals-sensitive-system-information-march-21-2014</loc>
                <lastmod>2014-03-21T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/trojan-poses-as-a-fake-microsoft-office-update-mar-13-2014</loc>
                <lastmod>2014-03-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-march-11-2014</loc>
                <lastmod>2014-03-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/iframe-injection-attacks-in-the-wild-mar-7-2014</loc>
                <lastmod>2014-03-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/parcim-trojan-steals-sensitive-system-information-march-6-2014</loc>
                <lastmod>2014-03-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-flash-zero-daycve-2014-0502-exploit-analysis-feb-27-2014</loc>
                <lastmod>2014-03-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-flash-player-installer-packaged-with-siromost-trojan-feb-28-2014</loc>
                <lastmod>2014-02-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cve-2014-0322-malware-sakurel-feb-21-2014</loc>
                <lastmod>2014-02-21T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/internet-explorer-zero-daycve-2014-0322-exploit-analysis-feb-21-2014</loc>
                <lastmod>2014-02-21T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/another-autoit-compiled-worm-enters-the-malware-scene-february-14-2014</loc>
                <lastmod>2014-02-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/latest-internet-explorer-zero-day-cve-2014-0322-exploited-in-the-wild-feb-14-2014</loc>
                <lastmod>2014-02-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-feb-11-2014</loc>
                <lastmod>2014-02-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/analysis-of-latest-adobe-flash-vulnerability-cve-2014-0497-feb-7-2014</loc>
                <lastmod>2014-02-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/neutrino-exploit-kit-drive-by-attack-feb-7-2014</loc>
                <lastmod>2014-02-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/yet-another-attack-targeting-java-vulnerability-cve-2013-2465-feb-5-2014</loc>
                <lastmod>2014-02-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/icefog-cyber-espionage-group-targets-us-companies-jan-31-2014</loc>
                <lastmod>2014-01-31T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/emc-cmcne-directory-traversal-vulnerability-jan-30-2014</loc>
                <lastmod>2014-01-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/a-closer-look-at-xtremerats-keylogger-component-jan-24-2014</loc>
                <lastmod>2014-01-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-windows-ie-vulnerability-cve-2013-2551-attacks-spotted-in-the-wild-january-23-2014</loc>
                <lastmod>2014-01-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/noisy-spam-malware-new-cutwail-variant-jan-16-2014</loc>
                <lastmod>2014-01-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cryptolocker-ransomware-holds-files-hostage-for-cash-sep-19-2013</loc>
                <lastmod>2014-01-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-jan-14-2014</loc>
                <lastmod>2014-01-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-reader-cve-2013-3346-and-windows-cve-2013-5065-exploit-analysis-january-10-2014</loc>
                <lastmod>2014-01-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/post-holiday-season-spammers-sending-out-fake-court-notices-to-panic-recipients</loc>
                <lastmod>2014-01-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cisco-prime-dcnm-information-disclosure-jan-3-2014</loc>
                <lastmod>2014-01-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/fake-chrome-flash-player-extension-targets-facebook-users-jan-03-2014</loc>
                <lastmod>2014-01-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-tor-based-information-stealing-trojan-dec-27-2013</loc>
                <lastmod>2013-12-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/abb-microscada-vulnerability-dec-20-2013</loc>
                <lastmod>2013-12-20T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spammers-take-advantage-of-vacation-mood-this-holiday-season-december-19-2013</loc>
                <lastmod>2013-12-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-bitcoin-infostealer-trojan-spotted-in-the-wild-dec-13-2013</loc>
                <lastmod>2013-12-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-dec-10-2013</loc>
                <lastmod>2013-12-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-security-bypass-vulnerability-dec-6-2013</loc>
                <lastmod>2013-12-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-windows-privilege-escalation-vulnerability-cve-2013-5065-attacks-dec-4-2013</loc>
                <lastmod>2013-12-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spam-campaign-roundup-the-thanksgiving-day-edition-nov-27-2013</loc>
                <lastmod>2013-11-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-out-of-band-security-advisory-for-windows-kernel-nov-27-2013</loc>
                <lastmod>2013-11-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/jboss-marshalled-object-remote-code-execution-vulnerability-november-27-2013</loc>
                <lastmod>2013-11-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/infostealer-trojan-that-tracks-user-activity-november-22-2013</loc>
                <lastmod>2013-11-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-informationcardsigninhelper-class-activex-control-cve-2013-3918-exploit-spotted-in-the-wild-november-20-2013</loc>
                <lastmod>2013-11-20T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/p2p-zeus-downloader-targeting-corporate-e-mails-november-13-2013</loc>
                <lastmod>2013-11-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-nov-12-2013</loc>
                <lastmod>2013-11-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-out-of-band-security-advisory-for-graphics-component-nov-5-2013</loc>
                <lastmod>2013-11-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/increase-in-bitcoin-mining-malware-as-price-soars-nov-11-2013</loc>
                <lastmod>2013-11-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/antivirus-security-pro-fakeav-downloader-onkods-nov-8-2013</loc>
                <lastmod>2013-11-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/ibm-inotes-activex-control-vulnerability-nov-8-2013</loc>
                <lastmod>2013-11-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/fake-excel-spreadsheet-installs-a-backdoor-trojan-november-1-2013</loc>
                <lastmod>2013-11-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/oracle-java-cve-2013-2465-attacks-spotted-in-the-wild-nov-1-2013</loc>
                <lastmod>2013-11-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/malware-switches-users-bank-account-number-with-that-of-the-attacker-october-25-2013</loc>
                <lastmod>2013-10-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/hp-intelligent-bims-uploadservlet-arbitrary-file-upload-oct-25-2013</loc>
                <lastmod>2013-10-25T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/wave-of-zortob-backdoor-trojan-discovered-in-the-wild-oct-18-2013</loc>
                <lastmod>2013-10-18T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-windows-ie-vulnerabilitycve-2013-1347-attacks-spotted-in-the-wild-oct-17-2013</loc>
                <lastmod>2013-10-17T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/irc-bot-masquerading-as-popular-applications-october-11-2013</loc>
                <lastmod>2013-10-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-oct-8-2013</loc>
                <lastmod>2013-10-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletins-coverage-feb-08-2011</loc>
                <lastmod>2013-10-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-windows-ie-vulnerability-cve-2013-3897-attacks-spotted-in-the-wild-october-8-2013</loc>
                <lastmod>2013-10-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/solid-edge-st4-activex-control-vulnerability-oct-4-2013</loc>
                <lastmod>2013-10-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/gone-with-the-wings-ngrbot-dropper-oct-4-2013</loc>
                <lastmod>2013-10-04T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-sept-10-2013</loc>
                <lastmod>2013-10-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-windows-ie-memory-corruption-sept-18-2013</loc>
                <lastmod>2013-09-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/hp-loadrunner-activex-control-vulnerability-sep-27-2013</loc>
                <lastmod>2013-09-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-windows-ie-vulnerabilitycve-2013-3893-attacks-spotted-in-the-wild-september-26-2013</loc>
                <lastmod>2013-09-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/cve-2013-3893-exploit-actively-serving-malware-september-26-2013</loc>
                <lastmod>2013-09-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/fake-love-note-delivers-a-keylogger-september-13-2013</loc>
                <lastmod>2013-09-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/latest-java-vulnerabilitycve-2013-2473-exploited-in-the-wild-september-6-2013</loc>
                <lastmod>2013-09-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-zeus-dropper-being-spammed-actively-september-6-2013</loc>
                <lastmod>2013-09-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-malware-with-smtp-capabilities-september-6-2013</loc>
                <lastmod>2013-09-06T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/internet-explorer-vulnerabilityms12-043-exploited-in-the-wild-august-30-2013</loc>
                <lastmod>2013-08-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/a-new-trustezeb-variant-spammed-in-the-wild-aug-30-2013</loc>
                <lastmod>2013-08-30T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/citadel-trojan-masquerades-as-ups-invoice-download-august-23-2013</loc>
                <lastmod>2013-08-27T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/samba-read_nttrans_ea_list-function-dos-aug-22-2013</loc>
                <lastmod>2013-08-22T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/compromised-wordpress-based-websites-redirect-users-to-explicit-sites-aug-16-2013</loc>
                <lastmod>2013-08-16T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-aug-13-2013</loc>
                <lastmod>2013-08-13T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/firefox-onreadystatechange-use-after-free-vulnerability-aug-9-2013</loc>
                <lastmod>2013-08-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/blackhole-exploit-kit-serving-glupteba-trojan-in-the-wild-aug-9-2013</loc>
                <lastmod>2013-08-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/madangel-infects-executable-files-on-the-system-august-2-2013</loc>
                <lastmod>2013-08-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/trimble-sketchup-heap-buffer-overflow-aug-2-2013</loc>
                <lastmod>2013-08-02T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/adobe-flash-player-integer-overflow-vulnerability-july-26-2013</loc>
                <lastmod>2013-07-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/recslurp-trojan-steals-ftp-and-email-credentials-july-26-2013</loc>
                <lastmod>2013-07-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/chinese-online-game-password-stealing-trojan-with-proxy-server-july-19-2013</loc>
                <lastmod>2013-07-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/corel-pdf-fusion-stack-buffer-overflow-in-xps-parsing-july-19-2013</loc>
                <lastmod>2013-07-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-spambot-trojan-with-backdoor-functionality-july-12-2013</loc>
                <lastmod>2013-07-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-july-9-2013</loc>
                <lastmod>2013-07-11T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/mail-and-browser-password-stealing-malware-july-5-2013</loc>
                <lastmod>2013-07-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/apple-quicktime-m-jpeg-heap-buffer-overflow-july-5-2013</loc>
                <lastmod>2013-07-05T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spam-campaign-roundup-the-independence-day-edition-july-3-2013</loc>
                <lastmod>2013-07-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/infostealer-trojan-with-bitcoin-mining-and-ddos-features-may-30-2013</loc>
                <lastmod>2013-06-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-banker-trojan-targeting-brazilian-government-site-june-28-2013</loc>
                <lastmod>2013-06-28T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-drive-by-download-exploits-latest-java-vulnerabilities-june-7-2013</loc>
                <lastmod>2013-06-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/apple-quicktime-texml-memory-corruption-june-26-2013</loc>
                <lastmod>2013-06-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/windows-ie-use-after-free-vulnerability-ms13-047-june-21-2013</loc>
                <lastmod>2013-06-21T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/a-wave-of-c-based-ircbot-discovered-in-the-wild-june-21-2013</loc>
                <lastmod>2013-06-21T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-adware-trojan-plays-continuous-audio-ads-june-14-2013</loc>
                <lastmod>2013-06-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spam-campaign-roundup-the-fathers-day-edition-june-14-2013</loc>
                <lastmod>2013-06-14T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-june-12-2013</loc>
                <lastmod>2013-06-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/android-pincer-trojan-equipped-with-data-stealing-and-anti-analysis-modules-june-7-2013</loc>
                <lastmod>2013-06-07T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/oracle-java-font-processing-vulnerability-may-31-2013</loc>
                <lastmod>2013-05-31T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/spam-campaign-roundup-the-memorial-day-edition-may-24-2013</loc>
                <lastmod>2013-05-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/nginx-server-denial-of-service-may-24-2013</loc>
                <lastmod>2013-05-24T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/oracle-java-zero-days-found-in-2013-apr-26-2013</loc>
                <lastmod>2013-05-23T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/darkkomet-trojan-resurfaces-in-the-wild-may-17-2013</loc>
                <lastmod>2013-05-17T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-security-bulletin-coverage-may-14-2013</loc>
                <lastmod>2013-05-15T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/c-based-bot-with-ddos-and-spying-capabilities-may-10-2013</loc>
                <lastmod>2013-05-10T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/mothers-day-spam-campaign-on-the-rise-may-9-2013</loc>
                <lastmod>2013-05-09T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/microsoft-out-of-band-security-advisory-for-ie-8-may-4-2013</loc>
                <lastmod>2013-05-08T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/oracle-java-ttf-file-stack-buffer-overflow-may-3-2013</loc>
                <lastmod>2013-05-03T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/new-russian-ddos-botnet-discovered-may-1-2013</loc>
                <lastmod>2013-05-01T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/increase-in-andromeda-botnet-spam-april-26-2013</loc>
                <lastmod>2013-04-26T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/honeywell-ebi-activex-control-vulnerability-apr-19-2013</loc>
                <lastmod>2013-04-19T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/boston-bomb-blast-video-spam-redkit-april-17-2013</loc>
                <lastmod>2013-04-17T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
<url>
                <loc>https://www.solutionsgranted.com/blog/yet-another-delphi-infostealer-trojan-april-12-2013</loc>
                <lastmod>2013-04-12T06:00:00.000Z</lastmod>
                <changefreq>monthly</changefreq>
                <priority>1</priority>
                
              </url>
    </urlset>
  