<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.7'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//minutodaseguranca.blog.br/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://minutodaseguranca.blog.br/vulnerabiliade-no-cups-linux-permite-obter-acesso-root/</loc>
  <lastmod>2026-04-07T19:12:02Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Vulnerabiliade no CUPS Linux permite obter acesso root</news:title>
   <news:publication_date>2026-04-10T12:30:28Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://minutodaseguranca.blog.br/fancy-bear-continua-atacando-roteadores-para-impulsionar-sites-falsos/</loc>
  <lastmod>2026-04-07T19:05:36Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Fancy Bear continua atacando roteadores para impulsionar sites falsos</news:title>
   <news:publication_date>2026-04-10T12:25:53Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://minutodaseguranca.blog.br/atacantes-exploraram-vulnerabilidade-critica-zero-day-do-forticlient-ems/</loc>
  <lastmod>2026-04-07T19:02:10Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Atacantes exploraram vulnerabilidade crítica zero-day do FortiClient EMS </news:title>
   <news:publication_date>2026-04-09T06:31:11Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://minutodaseguranca.blog.br/phishing-com-codigo-de-dispositivo-habilitado-por-ia-explora-o-fluxo-oauth/</loc>
  <lastmod>2026-04-07T18:33:57Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Phishing com código de dispositivo habilitado por IA explora o fluxo OAuth</news:title>
   <news:publication_date>2026-04-09T06:25:40Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://minutodaseguranca.blog.br/russia-invadiu-roteadores-para-roubar-tokens-do-microsoft-office/</loc>
  <lastmod>2026-04-07T18:28:36Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Rússia invadiu roteadores para roubar tokens do Microsoft Office.</news:title>
   <news:publication_date>2026-04-08T06:30:41Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://minutodaseguranca.blog.br/ciberseguranca-na-era-do-software-instantaneo/</loc>
  <lastmod>2026-04-07T18:25:39Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Cibersegurança na Era do Software Instantâneo</news:title>
   <news:publication_date>2026-04-08T06:25:57Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>
