<?xml version="1.0" encoding="UTF-8"?>
<!--generator='jetpack-15.8'-->
<!--Jetpack_Sitemap_Buffer_News_XMLWriter-->
<?xml-stylesheet type="text/xsl" href="//minutodaseguranca.blog.br/news-sitemap.xsl"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
 <url>
  <loc>https://minutodaseguranca.blog.br/cursos-gratuitos-de-ia-cloud-e-ciberseguranca/</loc>
  <lastmod>2026-05-21T20:03:14Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Cursos gratuitos de IA, Cloud e Cibersegurança</news:title>
   <news:publication_date>2026-05-21T20:03:14Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://minutodaseguranca.blog.br/o-ransomware-wanttocry-criptografa-arquivos-remotamente/</loc>
  <lastmod>2026-05-21T19:44:07Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>O ransomware WantToCry criptografa arquivos remotamente</news:title>
   <news:publication_date>2026-05-21T19:44:07Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://minutodaseguranca.blog.br/invadir-o-celular-do-parceiro-pode-virar-caso-de-justica/</loc>
  <lastmod>2026-05-21T19:34:42Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Invadir o celular do parceiro pode virar caso de Justiça</news:title>
   <news:publication_date>2026-05-21T19:34:42Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://minutodaseguranca.blog.br/deepfakes-e-golpes-com-ia-ampliam-disputas-sobre-responsabilidade/</loc>
  <lastmod>2026-05-21T19:29:19Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Deepfakes e golpes com IA ampliam disputas sobre responsabilidade</news:title>
   <news:publication_date>2026-05-21T19:29:19Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://minutodaseguranca.blog.br/erro-na-aplicacao-de-correcao-da-sonicwall-permite-burlar-mfa-em-vpns/</loc>
  <lastmod>2026-05-21T19:25:49Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Erro na aplicação de correção da SonicWall permite burlar MFA em VPNs </news:title>
   <news:publication_date>2026-05-21T19:25:49Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://minutodaseguranca.blog.br/o-novo-phishing-click/</loc>
  <lastmod>2026-05-21T19:16:20Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>O Novo Phishing Click</news:title>
   <news:publication_date>2026-05-21T19:16:20Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://minutodaseguranca.blog.br/ciberataques-a-redes-ot-acende-alerta-vermelho-na-industria/</loc>
  <lastmod>2026-05-21T19:05:53Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Ciberataques a redes OT acende alerta vermelho na indústria</news:title>
   <news:publication_date>2026-05-21T19:05:53Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://minutodaseguranca.blog.br/golpes-de-clonagem-de-voz-e-videos-com-ia/</loc>
  <lastmod>2026-05-21T19:01:56Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Golpes de Clonagem de Voz e Vídeos com IA</news:title>
   <news:publication_date>2026-05-21T19:01:56Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
 <url>
  <loc>https://minutodaseguranca.blog.br/apps-falsos-prometem-acesso-ao-historico-de-chamadas-de-qualquer-numero/</loc>
  <lastmod>2026-05-21T18:55:10Z</lastmod>
  <news:news>
   <news:publication>
    <news:name>Minuto da Segurança da Informação</news:name>
    <news:language>en</news:language>
   </news:publication>
   <news:title>Apps falsos prometem acesso ao histórico de chamadas de qualquer número</news:title>
   <news:publication_date>2026-05-21T18:55:10Z</news:publication_date>
   <news:genres>Blog</news:genres>
  </news:news>
 </url>
</urlset>
