<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
  <url>
    <loc>https://blog.newskysecurity.com/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/2015/08/critical-stagefright-flaw-millions-affected/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/2015/08/smart-devices-as-bitcoin-mining-slaves/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/2015/09/mobile-devices-bundled-with-malware/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/2015/12/case-study-hacking-smart-lock-security/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/2016/02/popular-anonymous-sns-app-leaking-user-id/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/2016/02/rediscovery-of-netusb-vulnerability-in-broadband-routers/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/2016/04/sonorousness-ransomware-unmasked/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/2016/09/brute-force-vulnerability-netgear-arlo/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/2016/09/factory_reset_vuln_in_netgear_arlo/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/a-huge-wave-of-iot-zombies-are-coming-42d61d6cada0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/agile-122bf2f4e2f3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/brute-force-vulnerability-in-netgear-arlo-f561c3bc1f3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/case-study-hacking-smart-lock-security-ef3278e3e3de</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/cve-2018-10561-dasan-gpon-exploit-weaponized-in-omni-and-muhstik-botnets-ad7b1f89cff3</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/does-using-a-vpn-help-with-ping/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/doubledoor-iot-botnet-bypasses-firewall-as-well-as-modem-security-using-two-backdoor-exploits-88457627306d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/factory-reset-vulnerability-in-netgear-arlo-414c68b17cb6</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/fake-adobe-website-delivers-betabot-4114d1775a18</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/fake-adobe-website-delivers-betabot-4114d1775a18/</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/forgotdoor-routers-in-singapore-accidentally-give-complete-access-to-potential-iot-attackers-ed60895c5042</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/hacker-fail-iot-botnet-command-and-control-server-accessible-via-default-credentials-2ea7cab36f72</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/huawei-router-exploit-involved-in-satori-and-brickerbot-given-away-for-free-on-christmas-by-ac52fe5e4516</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/information-disclosure-vulnerability-cve-2018-7900-makes-it-easy-for-attackers-to-find-huawei-3e7039b6f44f</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/iot-hackers-shift-to-the-dark-side-cd3d0005a5e0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/iot-thermostat-bug-allows-hackers-to-turn-up-the-heat-948e554e5e8b</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/malvertising-getting-more-than-you-pay-for-3e895a075472</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/masuta-satori-creators-second-botnet-weaponizes-a-new-router-exploit-2ddc51cc52a7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/mobile-devices-bundled-with-malware-e50e3207913d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/nbotloader-netgear-bug-weaponized-as-a-dangerous-exploit-ea7869217e89</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/newsky-security-llc-partners-with-people-power-5371281ef123</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/newsky-security-presenting-iot-security-research-at-avar-2017-1703d85fbff7</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/raising-the-bar-in-mobile-security-fd0d9171f47d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/rediscovery-of-netusb-vulnerability-in-broadband-routers-e943c9ea8634</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/script-kiddie-nightmare-iot-attack-code-embedded-with-backdoor-39ebcb92a4bb</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/smart-devices-as-bitcoin-mining-slaves-745bdad1fe09</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/tagged/cybersecurity</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/tagged/iot-security-industry</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/tagged/news</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/tagged/wireless-router</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/the-wannacry-ransomware-iot-zombies-19a08b9f1826</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/tracking-the-people-behind-botnets-a-list-of-top-20-iot-blackhat-hackers-3a67d7bd3be0</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/understanding-the-iot-hacker-a-conversation-with-owari-sora-iot-botnet-author-117feff56863</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/up-for-grabs-us-government-lexmark-printers-and-thousands-of-others-exposed-on-internet-with-no-3b860e2969d1</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/up-for-grabs-us-government-lexmark-printers-and-thousands-of-others-exposed-on-internet-with-no-4b198e040a3d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/us-government-site-unwittingly-hosting-malware-f1f4f11b6a1d</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://blog.newskysecurity.com/your-device-is-my-miner-how-hackers-steal-your-cryptocurrency-6fd273f6d4a</loc>
    <lastmod>2026-04-03</lastmod>
    <changefreq>never</changefreq>
    <priority>0.5</priority>
  </url>
</urlset>