<?xml version="1.0" encoding="UTF-8"?>
<urlset
      xmlns="http://www.sitemaps.org/schemas/sitemap/0.9"
      xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
      xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9
            http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd">
<!-- created with Free Online Sitemap Generator www.xml-sitemaps.com -->


<url>
  <loc>https://www.north-networks.com/</loc>
  <lastmod>2025-09-29T08:51:53+00:00</lastmod>
  <priority>1.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fortinet/</loc>
  <lastmod>2025-09-29T08:47:54+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/acunetix/</loc>
  <lastmod>2025-09-29T08:47:56+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/burp-suite/</loc>
  <lastmod>2025-09-29T08:47:58+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/invicti/</loc>
  <lastmod>2025-09-29T08:48:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/tenable-web-app-dast-scanning/</loc>
  <lastmod>2025-09-29T08:48:03+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/veracode/</loc>
  <lastmod>2025-09-29T08:48:06+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fortra/</loc>
  <lastmod>2025-09-29T08:48:08+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/nagios-network-analyzer/</loc>
  <lastmod>2025-09-29T08:28:58+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/nagios-xi/</loc>
  <lastmod>2025-09-29T08:48:11+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/nagios-log-server/</loc>
  <lastmod>2025-09-29T08:48:15+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/nessus-tenable/</loc>
  <lastmod>2025-09-29T08:48:18+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/burp-suite-professional/</loc>
  <lastmod>2025-09-29T08:48:20+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/burp-suite-dast/</loc>
  <lastmod>2025-09-29T08:48:23+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/core-security/</loc>
  <lastmod>2025-09-29T08:48:28+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/cobalt-strike/</loc>
  <lastmod>2025-09-29T08:48:30+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/core-impact/</loc>
  <lastmod>2025-09-29T08:48:33+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/outflank-red-team-tools/</loc>
  <lastmod>2025-09-29T08:48:36+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/digital-defense/</loc>
  <lastmod>2025-09-29T08:48:40+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/frontline-vulnerability-manager/</loc>
  <lastmod>2025-09-29T08:48:44+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/frontline-web-application-scanning/</loc>
  <lastmod>2025-09-29T08:48:48+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/frontline-active-threat-sweep/</loc>
  <lastmod>2025-09-29T08:48:51+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/frontline-pentest/</loc>
  <lastmod>2025-09-29T08:48:53+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/beyond-security/</loc>
  <lastmod>2025-09-29T08:48:58+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/beyond-security-bestorm-dast/</loc>
  <lastmod>2025-09-29T08:49:04+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/beyond-security-besecure/</loc>
  <lastmod>2025-09-29T08:49:07+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/manageengine/</loc>
  <lastmod>2025-09-29T08:49:12+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/nagios/</loc>
  <lastmod>2025-09-29T08:49:16+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/nagios-fusion/</loc>
  <lastmod>2025-09-29T08:49:30+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/nessus-professional/</loc>
  <lastmod>2025-09-29T08:49:39+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/nessus-expert/</loc>
  <lastmod>2025-09-29T08:49:48+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/veracode-dast/</loc>
  <lastmod>2025-09-29T08:49:59+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/veracode-sca/</loc>
  <lastmod>2025-09-29T08:50:10+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/veracode-discovery/</loc>
  <lastmod>2025-09-29T08:50:14+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/veracode-analysis-center/</loc>
  <lastmod>2025-09-29T08:50:16+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/soporte/</loc>
  <lastmod>2025-09-29T08:50:20+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/solicitar-demo/</loc>
  <lastmod>2025-09-29T08:50:24+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/comprar-licencias/</loc>
  <lastmod>2025-09-29T08:50:29+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/contacto/</loc>
  <lastmod>2025-09-29T08:50:42+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/fortinet-lanza-una-mayor-disponibilidad-de-soluciones-en-aws-marketplace/</loc>
  <lastmod>2025-09-29T08:50:45+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/nagios-xi-con-funciones-premium/</loc>
  <lastmod>2025-09-29T08:50:47+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/nagios-xi-y-la-ciberseguridad-cuatro-cosas-que-debe-saber/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/las-fallas-de-perfektblue-bluetooth-afectan-a-los-autos-mercedes-volkswagen-y-skoda/</loc>
  <lastmod>2025-09-29T08:50:52+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/fortinet-insta-a-usuarios-de-fortiswitch-a-actualizarse/</loc>
  <lastmod>2025-09-29T08:50:56+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/caos-de-zero-day-en-firewalls-fortigate-como-los-hackers-estan-tomando-el-control-de-firewalls/</loc>
  <lastmod>2025-09-29T08:51:01+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-api-testing/</loc>
  <lastmod>2025-09-29T08:51:04+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/dast-vs-pruebas-de-penetracion/</loc>
  <lastmod>2025-09-29T08:51:07+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-nagios/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.80</priority>
</url>
<url>
  <loc>https://www.north-networks.com/comprar-fortinet/</loc>
  <lastmod>2025-09-29T08:51:21+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/comprar-acunetix/</loc>
  <lastmod>2025-09-29T08:51:24+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-acunetix/</loc>
  <lastmod>2025-09-29T08:51:28+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/comprar-burp-suite/</loc>
  <lastmod>2025-09-29T08:51:31+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/comprar-invicti/</loc>
  <lastmod>2025-09-29T08:51:36+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/comprar-nessus-tenable/</loc>
  <lastmod>2025-09-29T08:51:38+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/comprar-veracode/</loc>
  <lastmod>2025-09-29T08:51:40+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/veracode-pentest/</loc>
  <lastmod>2025-09-29T08:51:42+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/comprar-fortra/</loc>
  <lastmod>2025-09-29T08:51:44+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/quien-es-fortra/</loc>
  <lastmod>2025-09-29T08:51:48+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/comprar-nagios/</loc>
  <lastmod>2025-09-29T08:51:52+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/demo-nagios-network-analyzer/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/demo-nagios-xi/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/nagios-xi-standard-vs-enterprise/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/brochures/Nagios/nagiosxi/Nagios-XI-Hardware-Requirements.pdf</loc>
  <lastmod>2018-09-05T05:18:24+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/demo-nagios-log-server/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/cotizar-manageengine/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/demo-nagios-fusion/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/integracion-de-invicti-enterprise-con-mend/</loc>
  <lastmod>2025-09-29T08:50:50+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/la-guia-de-comparacion-definitiva-nagios-xi-vs-nagios-core/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/nagios-core-vs-nagios-xi-4-diferencias-clave/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/desbloquee-el-escaneo-api-mejorado-con-burp-suite/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/fortra-lanza-una-plataforma-unificada-de-ciberseguridad/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/un-mes-de-burp-suite-en-la-nube-como-lo-utilizan-los-equipos-de-appsec/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/tres-razones-por-las-que-dast-es-la-mejor-manera-de-encontrar-vulnerabilidades-web/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackeo-del-active-directory-descubre-como-la-falla-ldapnightmare-detiene-los-servicios-de-ad/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/citrix-ofrece-medidas-para-mitigar-los-ataques-continuos-de-rociado-de-contrasenas-en-netscaler/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/los-ataques-contra-celulares-crecen-un-70-lo-que-marca-un-record-en-america-latina/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/herramientas-osint-para-la-busqueda-de-personas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/cisco-advierte-sobre-dia-cero-criticos-de-rce-en-telefonos-ip-al-final-de-su-vida-util/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/los-10-principales-hallazgos-criticos-del-pentest-2024-lo-que-necesita-saber/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/malware-eterno-los-rootkits-que-persisten-aun-y-con-actualizaciones-y-restablecimientos-de-los-firewalls-de-palo-alto/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/como-eludir-los-waf-con-la-cookie-fantasma-version/</loc>
  <lastmod>2025-09-29T08:51:10+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-dangling-markup-injection/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-son-las-vulnerabilidades-de-logica-empresarial/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-el-ataque-glbp-y-hsrp/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-ofuscacion-de-codigo/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-ataque-de-inyeccion-nosql/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-ataque-keytrap-dos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/postura-de-acunetix-sobre-el-hack-de-solarwinds/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/nagiosxi/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/kaspersky-hybrid-cloud-security-protegiendo-entornos-de-desarrollo-de-software/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/10-razones-las-no-deberias-instalar-pandorafms-empresa/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/estafadores-generan-ganancias-aprovechando-dominios-gratuitos-tk/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-vpn/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-backdoor/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.64</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/multiples-vulnerabilidades-en-termostatos-y-aprietatuercas-inteligentes-de-bosch/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-reflected-xss/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/toyota-datos-de-ubicacion-de-automoviles-de-2-millones-de-clientes-expuestos-durante-diez-anos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/alerta-para-desarrolladores-paquetes-npm-para-node-js-que-ocultan-el-peligroso-malware-turkorat/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/implementar-el-principio-de-privilegio-minimo-seguridad-en-la-nube-en-la-nube-de-aws-azure-y-gcp/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/exploit-lanzado-para-error-de-maxima-gravedad-en-fortinet-rce-parche-ahora/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/putty-ssh-es-vulnerable-a-un-ataque-de-recuperacion-de-claves/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/dominios-maliciosos-usan-el-nombre-de-chatgpt-para-robar-api-keys/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackear-radios-policiales-y-militares-encriptados-explotando-5-vulnerabilidades/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackers-comienzan-a-usar-virus-bootkit/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/fortinet-adquiere-panopta-un-innovador-en-monitoreo-y-remediacion-de-redes/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/telegram-estabiliza-su-servicio-tras-sufrir-ciberataque-ddos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-iast/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-aes/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ivanti-advierte-sobre-ataques-de-dia-cero-de-connect-secure/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nueva-amenaza-de-puerta-trasera-llamada-spectralblur-para-macos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-rootkit/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-un-ataque-de-diccionario/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/las-principales-amenazas-ciberneticas-en-mexico-en-2023-fueron-ransomware-y-fraude/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/lastpass-ahora-requiere-contrasenas-de-12-caracteres-para-mayor-seguridad/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-wep-wpa-wpa2-y-wpa3/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/el-cifrado-scarf-ofrece-un-rendimiento-excepcional-y-una-seguridad-mejorada/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/tres-acciones-de-ciberseguridad-que-las-empresas-deben-tener-en-cuenta/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-ransomware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/empresa-rusa-de-ingenieria-de-misiles-es-victima-de-hackers-norcoreanos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.51</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-el-ataque-http-host-header/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/integracion-de-nagios-xi-y-dynatrace-sin-morir-en-el-intento/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/peligro-estafa-de-la-falsa-oferta-de-empleo-de-medio-tiempo/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackear-servidores-debian-ubuntu-redhat-y-fedora-usando-una-vulnerabilidad-de-2024/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/cuentas-de-sams-club-hackeadas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/xg-firewall-v18-mr4-ya-esta-disponible/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ciberataques-cuestan-107-millones/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-el-ataque-server-side-request-forgery-ssrf/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-network-dlp/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-oast/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-xml-external-entity-xxe-injection/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-pentest/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-la-vulnerabilidad-file-upload/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-es-la-tecnologia-sandbox/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/terrapin-podria-permitir-a-los-atacantes-degradar-la-seguridad-del-protocolo-ssh/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ciberdelincuentes-usan-google-amp-para-ataques-de-phishing/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ia-podria-vulnerar-la-seguridad-de-usuarios-en-pagos-y-criptomonedas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/microsoft-quiere-usar-whatsapp-para-mejorar-la-autenticacion/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/aplicaciones-de-google-play-cargan-anuncios-cuando-la-pantalla-esta-apagada/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.41</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/cuidado-con-los-dominios-zip-y-mov/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nueva-forma-de-hackear-a-millones-de-usuarios-usando-el-software-de-impresora-papercut/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/troyano-spynote-tiene-como-objetivo-a-clientes-de-bancos-europeos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/malware-plc-una-nueva-tecnica-para-hackerar-sistemas-de-control-industrial/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/como-y-por-que-china-esta-hackeando-al-papa-y-al-vaticano/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/burp-suite-professional-evolucionando-el-futuro-de-las-pruebas-de-seguridad-web/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/los-empleados-que-roban-datos-confidenciales-aumentan-un-25/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-ataque-clickjacking/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-ataque-web-llm/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-falsificacion-de-solicitud-entre-sitios-csrf/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-stored-xss/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-la-inyeccion-sql/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ticket-dorado-asi-lo-denominan-los-ciberdelincuentes-2/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/android-14-tendra-seguridad-celular-mas-fuerte/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/las-redes-sociales-hacen-mas-facil-los-ciberfraudes/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.33</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/presentamos-fortinet-advisor-el-asistente-de-seguridad-de-ia-generativa/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/malware-para-linux-refuerza-vinculos-entre-lazarus-y-el-ataque-a-la-cadena-de-suministro-de-3cx/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/como-hackear-clusteres-y-nodos-de-kubernetes-a-travez-de-etcd/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/roban-dinero-a-trabajadores-y-pensionados-nueva-estafa-del-imss/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/teramind-presenta-el-panel-de-inteligencia-empresarial/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/temas-y-plugins-de-wordpress-podrian-contener-malware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackers-encuentran-un-backdoor-en-fortinet-vpn-ssl/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-el-ataque-blind-ssrf/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/como-la-ia-esta-revolucionando-el-fraude-de-identidad/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-cross-site-scripting-xss/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/como-evitar-posibles-estafas-al-compartir-tu-dni-por-internet/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/la-asociacion-de-criminal-ip-y-polyswarm-busca-fortalecer-la-deteccion-de-amenazas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.26</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-ataques-basados-en-dom/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackean-a-la-conagua-esta-madrugada-se-realizo-un-ataque-a-su-red-interna/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/warner-music-es-hackeada-se-filtran-datos-personales-y-financieros/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/home-office-empleados-latinos-piden-flexibilidad-compensaciones-y-soporte-tecnico/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/vulnerabilidad-critica-en-los-timbres-de-la-firma-ring/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/brechas-de-datos-afectan-a-mas-de-28-millones-de-ciudadanos-canadienses/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/joker-el-malware-que-hackea-mensajes-sms/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-monitoreo-de-redes-e-infraestructura-ti/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/tendencias-de-ciberseguridad-que-llegaran-para-2024/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-ddos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.21</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-server-side-template-injection/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/el-hacker-mas-buscado-de-espana-es-atrapado-y-puesto-bajo-custodia-policial/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/empresa-de-ciberseguridad-es-infectada-con-ransomware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/presupuesto-en-ciberseguridad-aumenta-en-empresas-pese-a-recortes-por-covid-19/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/archivos-de-musica-en-internet-podrian-contener-malware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/mas-de-60-mil-cibercriminales-y-hackers-arrestados/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/400-mil-dolares-a-hackers-por-ataque-ransomware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-ataque-prototype-pollution/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ataque-de-ransomware-afecto-a-la-loteria-de-ohio/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/cajeros-automaticos-expuestos-por-fallas-encontradas-en-el-software-scrutisweb/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.17</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-oauth/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/una-vulnerabilidad-de-wordpress-elementor-pro-es-explotada-por-ciberdelincuentes/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/troyano-bancario-se-hace-pasar-por-la-agencia-tributaria-de-espana/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/primer-malware-disenado-para-el-chip-apple-m1/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/dispositivos-mac-afectados-por-malware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/brecha-de-datos-en-hsbc-latinoamerica/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-sast/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/carbanak-malware-bancario-resurge-con-nuevas-tacticas-de-ransomware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/secuestran-cuentas-de-usuarios-de-la-plataforma-linkedin/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.13</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-sca-y-por-que-lo-necesita-con-acunetix/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.11</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ciberdelincuentes-explotan-vulnerabilidad-en-ibm-aspera-faspex-rce/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.11</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/cualquiera-puede-hackear-una-cuenta-de-whatsapp/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.11</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/dast-vs-sast-un-caso-para-las-pruebas-de-seguridad-de-aplicaciones-dinamicas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.11</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nueva-tecnica-de-ataque-usada-por-los-hackers/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.11</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-software-composition-analysis-sca/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.11</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/cual-sera-el-futuro-de-la-tecnologia-inalambrica-para-2024/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.11</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/toma-en-cuenta-esto-para-usar-la-nube-en-tu-dispositivo/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.11</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/se-publica-un-exploit-para-un-error-de-autenticacion-via-bypass-de-fortra-goanywhere-mft/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.09</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/steam-ya-no-sera-compatible-con-windows-7-y-8-en-2024/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.09</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/recibiste-un-correo-del-ift-asegurate-de-que-no-sea-phishing/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.09</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/bug-en-navegador-brave-expone-historial-de-navegacion-en-tor/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.09</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/detectan-nuevo-malware-para-mac/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.09</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-dast/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.09</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-pharming/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.09</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-spyware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.09</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-ataque-jwt/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.07</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/fundador-de-breachforums-es-acusado-de-cometer-fraude-con-dispositivos-de-acceso/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.07</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/por-que-china-trata-de-hackear-al-papa-y-al-vaticano/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.07</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/el-apagon-de-la-reserva-federal-a-nivel-nacional-afecta-el-sistema-bancario-de-e-u/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.07</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/tres-vulnerabilidades-criticas-en-samba/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.07</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/presentamos-comprobaciones-de-escaneo-personalizadas-en-burp-suite-enterprise-edition/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.07</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-el-ataque-http-request-smuggling/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.07</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/discord-io-es-atacado-y-roban-toda-su-base-de-datos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.07</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-el-ataque-directory-traversal/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.05</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/extension-de-google-direcciona-a-pagina-fake-de-chatgpt-y-esto-provoca/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.05</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/prometen-que-fitbit-no-usara-nuestros-datos-para-publicidad/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.05</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/los-piratas-informaticos-ocultan-la-carga-util-de-obliquerat-en-imagenes-para-evadir-deteccion/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.05</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/vulnerabilidad-en-sharepoint-permite-hackeo-de-datos-de-la-onu/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.05</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/alerta-de-quishing-precaucion-antes-de-escanear-codigos-qr/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.05</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/la-inteligencia-artificial-generativa-esta-siendo-impulsada-para-su-uso-etico/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.05</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/aumentan-cada-vez-mas-los-apk-maliciosos-de-android/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.05</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-el-ataque-xss-basado-en-dom/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/filtracion-de-datos-de-empleados-despues-de-un-ataque-a-la-empresa-dole/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/como-se-clonan-las-tarjetas-con-chip/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/cambiando-el-juego-dast-con-netsparker-iast/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/compania-de-seguros-contra-ataque-ransomware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-pivoting/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-csp-content-security-policy/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/vulnerabilidad-en-winrar-puede-permitir-tomar-el-control-de-su-pc/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-blackbox-fuzzing/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nuevo-malware-llamado-dotrunpex-presente-a-traves-de-anuncios-maliciosos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/anonymous-hackea-condusef-datos-filtrados/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/comercializan-datos-de-500-millones-de-usuarios-de-linkedin/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/productos-cisco-facilmente-hackeables/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ataque-de-phishing-roba-codigos-de-respaldo-de-instagram-para-evitar-2fa/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-botnet/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.04</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/el-camino-de-la-ciberseguridad-esta-cambiando-por-chatgpt/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.03</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/banxico-confirma-intento-de-hackeo-a-su-sitio-web/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.03</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/cs-go-los-juegos-de-valve-source-son-vulnerables-mediante-invitaciones-de-steam/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.03</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/posible-hackeo-de-la-plataforma-de-pensiones-del-issste/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.03</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ransomware-blackcat-fue-eliminado-por-el-fbi-y-lanza-una-herramienta-de-descifrado-gratuita/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.03</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/malware-llamado-hiatusrat-vuelve-a-atacar-despues-de-estar-un-tiempo-inactivo/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.03</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/reciente-error-de-adobe-coldfusion-es-explotado-como-zero-day/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.02</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/estudiantes-lanzan-ataques-ddos-contra-sitios-web-escolares/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.02</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/fallo-en-whatsapp-permite-a-cualquiera-bloquear-tu-cuenta/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.02</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/malware-se-propaga-a-traves-de-las-redes-wifi/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.02</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-un-monedero-de-hardware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.02</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/operacion-manipulated-caiman-esto-sabemos-del-fraude-en-el-que-robaron-55-mdd-en-mexico/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.02</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/fallas-del-software-de-escritorio-remoto-permite-implementar-el-malware-plugx/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.02</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/twitter-filtra-datos-personales-de-cuentas-empresariales/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.02</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/google-lanza-actualizacion-que-repara-nueva-zero%e2%80%91day-en-chrome/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.02</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/el-fbi-recibe-mas-de-1300-denuncias-por-cibercrimenes-al-dia/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.02</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/se-corrigen-cuatro-vulnerabilidades-criticas-de-atlassian-2/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.02</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/el-tener-y-usar-un-celular-se-vuelve-cada-vez-mas-peligroso-en-estos-tiempos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.02</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/aumentan-las-vulnerabilidades-api-y-son-explotadas-por-atacantes-ciberneticos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/por-estas-razones-debes-dejar-el-bluetooth-desactivado/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackers-rusos-cambian-de-objetivo-despues-de-las-advertencias-de-ee-uu/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/dispositivos-medicos-estan-expuestos-a-ataques-de-ransomware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/los-retos-que-vienen-para-la-inteligencia-artificial-y-su-seguridad/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/exploit-liberado-para-una-vulnerabilidad-critica-de-omision-de-autenticacion-de-ivanti-sentry/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nueva-actualizacion-de-android-corrige-dos-fallas-criticas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/fallas-de-mcafee-ponen-en-riesgo-la-seguridad-de-su-red/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/mas-del-25-de-los-nodos-de-salida-tor-espiaron-a-sus-usuarios/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/pins-que-no-debes-utilizar-para-proteger-tu-smartphone/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/multiples-entidades-financieras-reportan-incidentes-y-ataques-ciberneticos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackers-de-lapsus-son-acusados-por-hackear-empresas-tecnologicas-de-alto-perfil/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nuevo-malware-llamado-fixs-se-dirige-a-cajeros-automaticos-en-mexico/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/virus-en-cupon-de-mcdonalds-puede-infectar-tu-dispositivo/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/chrome-ahora-corrige-automaticamente-las-contrasenas-violadas-en-android/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/vulnerabilidad-en-line-permite-a-los-hackers-controlar-chats/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/sophos-respalda-la-solucion-rce-despues-de-ataques-a-firewalls-no-compatibles/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-zero-day/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/transfer-sh-se-hace-cada-vez-mas-popular-para-alojar-codigo-malicioso/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/empresa-de-ciberseguridad-filtra-5-mil-millones-de-registros/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/roban-el-codigo-fuente-de-fifa-21-tras-ataque-a-electronic-arts/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nueva-variante-de-ransomware-creada-para-colapsar-hospitales/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-un-plugin/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/lazarus-group-explota-vulnerabilidad-de-manageengine-para-atacar/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/descifrador-de-ransomware-recupera-sus-datos-de-forma-gratuita/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ransomware-puede-hacer-millonario-a-cualquiera/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/implementacion-simplificada-en-la-nube-para-burp-suite-enterprise-edition/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/nagios-mexico/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/banco-de-costa-rica-es-hackeado-por-grupo-cibercriminal-maze/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/investigadores-desenmascaran-el-vinculo-oculto-de-sandman-apt-con-keyplug/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/malware-kmsdbot-se-dirige-a-dispositivos-iot-con-capacidades-mejoradas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.01</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/como-usar-la-ia-en-la-ciberseguridad-para-la-innovacion-de-tu-empresa/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackers-atacan-a-los-estafadores-para-destruir-sus-redes/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/peru-brasil-y-mexico-top3-paises-latinoamericanos-en-deteccion-de-objetos-maliciosos-en-equipos-industriales/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/evasion-de-antivirus-utilizada-por-el-malware-de-youtube/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/institutos-de-investigacion-de-corea-del-sur-son-atacados-por-backdoor/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-pentesting/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/twitter-empezara-a-cobrar-para-usar-la-opcion-2fa-basada-en-sms/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hacker-que-robo-15-millones-de-tarjetas-finalmente-arrestado/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/bizarro-troyano-bancario-brasilero-ataca-bancos-europeos-y-latinoamericanos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/multiples-empresas-empiezan-a-tener-compromiso-en-ciberseguridad/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/universidad-de-michigan-cierra-red-tras-ciberataque/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/fortinet-lanza-parches-para-multiples-fallas-que-afectan-varias-de-sus-herramientas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/dia-de-la-independencia-revil-utiliza-el-exploit-de-la-cadena-de-suministro-para-atacar-a-miles-de-empresas-que-usan-kaseya/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/se-corrigen-cuatro-vulnerabilidades-criticas-de-atlassian/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/carding-estafa-que-roba-todos-los-datos-de-tus-tarjetas-bancarias/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/filtros-de-correo-electronico-fallan-en-microsoft-outlook/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/6-preguntas-de-ciberseguridad-que-debe-responder-antes-de-abrir-puertos-al-publico/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/malware-llamado-spyloan-se-descargo-millones-de-veces-en-google-play/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/se-debe-tener-cuidado-con-las-nuevas-estafas-que-implican-al-futbol/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/apple-corrige-vulnerabilidad-zero-day-que-se-presentaba-en-ios-y-macos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/las-victimas-de-revil-se-niegan-a-pagar-despues-de-un-ataque-defectuoso-de-ransomware-a-kaseya/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nueva-variante-mips-dirigida-a-enrutadores-y-dispositivos-iot/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/los-ataques-troyanos-en-mexico-cada-dia-aumentan-mas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/gran-numero-de-sitios-de-wordpress-son-infectados-por-campana-masiva-de-fraude/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/lo-que-significa-la-orden-ejecutiva-de-biden-sobre-ciberseguridad-para-las-aplicaciones-web/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-esteganografia/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-adware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/quedan-expuestos-datos-personales-tras-ataque-malware-a-pepsi/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/kaspersky-lanzara-este-ano-un-telefono-imposible-de-hackear/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/zyxel-lanza-parches-para-corregir-multiples-fallas-en-diferentes-dispositivos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/malware-para-android-llamado-infame-chisel-apunta-al-ejercito-ucraniano/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/quedan-expuestos-datos-internos-tras-ataque-phishing-a-reddit/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/fortipentest-exploit-engine-un-nuevo-arsenal-de-seguridad-para-la-evaluacion-de-su-aplicacion-de-red/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-payload/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-bash-bug/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/gran-porcentaje-de-las-tiendas-en-linea-exponen-datos-privados/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/facebook-suspende-cuentas-de-hackers-iranies-utilizadas-para-atacar-a-milicia-estadounidense/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/los-ciberataques-lideran-la-gestion-de-riesgos-empresariales-en-2023/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/x-twitter-podra-recopilar-datos-biometricos-para-atacar-la-suplantacion-de-identidad/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/openssh-crea-nuevo-parche-para-vulnerabilidad-de-autenticacion/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/google-play-protect-falla-las-pruebas-de-seguridad-de-android-una-vez-mas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/chrome-tiene-un-nuevo-fallo-y-tu-seguridad-esta-en-peligro/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/contrasenas-en-peligro-por-extensiones-de-chrome-maliciosas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/una-amenaza-cibernetica-puede-venir-desde-dentro-de-la-empresa/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/robo-de-cuenta-en-el-nuevo-amazon-kindle/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nuevo-ataque-bluffs-permite-a-ciberdelincientes-secuestrar-conexiones-bluetooth/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/estafas-que-se-hacen-mediante-whatspp-y-como-evitarlas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackeo-al-sitio-de-buro-de-credito-y-robo-de-datos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/microsoft-alerta-a-miles-de-clientes-en-la-nube-de-bases-de-datos-expuestas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-ssh/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackers-robaron-la-clave-de-firma-de-microsoft-del-volcado-de-memoria-de-windows/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/conoce-la-vulnerabilidad-de-f5-big-ip-que-facilita-a-un-ransomware-cifrar-dispositivos-de-redes/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/esta-nueva-familia-de-malware-utiliza-archivos-de-registro-clfs-para-evitar-la-deteccion/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/descubren-un-metodo-pasivo-para-extraer-claves-rsa-privadas-de-conexiones-ssh/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-pup/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nueva-herramienta-creada-por-openai-para-detectar-texto-escrito-por-ia/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/una-nueva-ola-de-ataques-malware-dirigidos-a-organizaciones-en-america-del-sur/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-nft/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/apple-corrige-las-fallas-de-dia-cero-explotadas-por-el-software-espia-pegasus-en-iphones/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nuevos-parches-de-seguridad-para-las-vulnerabilidades-de-bind-dns/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/el-administrador-de-la-botnet-wirex-ddos-acusado-de-atacar-una-cadena-hotelera/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nuevas-reglas-emitidas-por-banxico-sobre-ciberseguridad-para-spei-y-spid/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-golden-ticket/</loc>
  <lastmod>2025-09-29T09:06:53+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/riot-games-fue-hackeado-y-piden-10-millones-de-dolares-para-no-filtrar-codigo-fuente/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/huawei-cloud-atacado-por-malware-de-mineria-de-criptomonedas-actualizado/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ciberdelincuentes-usan-bots-ya-preparados-para-realizar-ataques-rapidos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackers-iranies-implementan-backdoor-a-34-organizaciones-de-distintos-paises/</loc>
  <lastmod>2025-09-29T09:06:57+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/microsoft-encuentra-una-solucion-para-el-error-que-persistia-en-el-menu-de-inicio-en-windows/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/los-inversores-en-criptomonedas-pierden-500000-en-google-ads-que-empuja-billeteras-falsas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/filtracion-de-datos-de-welltok-expone-a-millones-de-pacientes-estadounidenses/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/es-mejor-apagar-tu-vpn-en-estos-casos/</loc>
  <lastmod>2025-09-29T09:06:41+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/netsparker-ahora-es-invicti-una-nueva-era-para-la-seguridad-de-las-aplicaciones-modernas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackear-la-cuenta-de-whatsapp-de-tu-amigo/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nuevo-grupo-de-ransomware-llamado-hunters-international-usa-el-codigo-fuente-de-hive-2/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/afirman-que-china-amenaza-la-ciberseguridad-y-el-medio-ambiente-de-sudamerica/</loc>
  <lastmod>2025-09-29T09:06:37+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/fallas-de-seguridad-en-la-aplicacion-galaxy-store-de-samsung-podrian-ser-vulneradas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/ahora-es-mas-facil-que-nunca-escanear-a-escala-con-burp-suite-enterprise-edition/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-phishing/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/fallas-de-ciberseguridad-en-la-caja-popular-mexicana/</loc>
  <lastmod>2025-09-29T09:06:34+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/anuncios-de-google-pueden-ser-una-amenaza-por-contener-malware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/como-hackear-facilmente-un-dispositivo-android-en-menos-de-dos-minutos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-la-seguridad-en-endpoints-y-como-funciona/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/microsoft-teams-impulsa-el-malware-darkgate-a-traves-de-ataques-phishing/</loc>
  <lastmod>2025-09-29T09:06:49+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ciudadano-estafo-a-miles-de-personas-usando-tarjetas-de-credito-vendidas-en-la-dark-web/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/como-hackear-cuentas-de-instagram/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nuevas-reglas-para-proteger-a-los-clientes-contra-ataques-de-intercambio-de-sim/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-troyano/</loc>
  <lastmod>2025-09-29T09:06:45+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/instaladores-de-vpn-son-usados-para-difundir-malware-de-vigilancia-eyespy/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/nessus-v10-0-ahora-en-raspberry-pi/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/la-policia-alerta-sobre-una-nueva-estafa-por-llamada-telefonica/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-una-red/</loc>
  <lastmod>2025-09-29T09:06:17+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/falla-de-fortios-es-aprovechada-para-comprometer-objetivos-gubernamentales/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/godaddy-es-hackeada-otra-vez-fuga-de-datos-afecta-a-1-2-millones-de-clientes/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/bambdas-el-proximo-gran-avance-en-personalizacion/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/retool-sufrio-ataques-phishing-basado-en-sms-y-afecto-a-27-clientes/</loc>
  <lastmod>2025-09-29T09:06:21+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/royal-mail-fue-victima-de-ciberataque-que-provoco-fallos-en-sus-servicios-de-envio/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/como-hackear-una-cuenta-de-facebook-en-sigilo/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/por-esta-razon-debes-tener-cuidado-si-usas-la-ia-de-google/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/gran-numero-de-dispositivos-juniper-son-vulnerables-a-fallas-rce/</loc>
  <lastmod>2025-09-29T09:06:13+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/vulnerabilidades-api-descubiertas-en-multiples-marcas-de-automoviles/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/3-vulnerabilidades-sin-parches-en-las-maquinas-philips-mri-1-5t-y-3t/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/dp-world-sufre-ciberataque-que-bloquea-miles-de-contenedores-en-los-puertos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/5-aspectos-que-debes-tener-en-cuenta-si-recibes-un-correo-phishing/</loc>
  <lastmod>2025-09-29T09:06:09+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/importante-empresa-minera-cierra-planta-tras-sufrir-ataque-ransomware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/la-seguridad-del-codigo-sast-no-es-suficiente/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-ssid/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/transacciones-digitales-mas-seguras-telecom-lanzo-en-argentina-sim-swap/</loc>
  <lastmod>2025-09-29T09:06:04+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/riesgos-de-tener-contrasenas-por-defecto-en-camaras-ip/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/4-campanas-de-troyanos-bancarios-android-dirigidas-a-mas-de-300-000-dispositivos-en-2021/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nuevo-grupo-de-ransomware-llamado-hunters-international-usa-el-codigo-fuente-de-hive/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-snmp/</loc>
  <lastmod>2025-09-29T09:06:00+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/multiples-vulnerabilidades-en-passwordstate-enterprise-password-manager/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/tienes-un-fortigate-usted-probablemente-ya-tiene-ztna/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-sql/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/las-pymes-deberian-prepararse-mas-en-la-materia-de-ciberseguridad/</loc>
  <lastmod>2025-09-29T09:05:56+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/la-mayoria-de-los-ataques-ahora-usan-canales-encriptados/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/la-serie-sophos-switch-ya-esta-disponible/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/el-banco-chino-icbc-sufre-ataque-ransomware-que-afecto-sus-servicios-financieros/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-linux/</loc>
  <lastmod>2025-09-29T09:05:53+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/servidores-de-minecraft-son-atacados-por-botnet-ddos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/vulnerabilidad-critica-en-la-biblioteca-apache-log4j/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/crece-la-compra-y-venta-de-cuentas-robadas-de-chatgpt-premium/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/campana-de-phishing-en-manuales-de-drones-es-dirigida-al-ejercito-ucraniano/</loc>
  <lastmod>2025-09-29T09:05:47+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/gran-porcentaje-de-las-aplicaciones-tecnologicas-tienen-fallas-de-seguridad-de-alto-riesgo/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/telarana-de-especulacion-estafadores-lanzan-sus-trampas-aprovechando-la-anticipada-pelicula-de-superheroes/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/surge-error-en-una-de-las-plataformas-mas-populares-de-correo-electronico/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/en-enero-de-2024-google-retirara-su-vista-html-basica-de-gmail/</loc>
  <lastmod>2025-09-29T09:05:40+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nueva-filtracion-de-datos-por-parte-de-uber-tras-sufrir-ataque/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/apple-ios-vulnerable-al-error-de-denegacion-de-servicio-de-homekit-doorlock/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-spf-y-como-funciona/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/google-acaba-de-corregir-un-fallo-de-seguridad-en-chrome/</loc>
  <lastmod>2025-09-29T09:05:33+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/google-chrome-corrige-vulnerabilidad-zero%e2%80%91day-con-una-nueva-actualizacion/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/la-modernizacion-de-ti-como-un-factor-clave-para-el-desarrollo-de-las-empresas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/los-complementos-de-chatgpt-no-seran-eliminados-por-ahora-confirmo-openai/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-iot/</loc>
  <lastmod>2025-09-29T09:05:37+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/los-atacantes-de-ransomware-de-vice-society-se-dirigieron-a-multiples-escuelas-en-este-ano/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/que-es-el-monitoreo-de-red/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-codigo-abierto/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/bing-chat-presenta-anuncios-maliciosos-es-sus-respuestas/</loc>
  <lastmod>2025-09-29T09:05:29+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/malware-llamado-crywiper-dirigido-a-las-agencias-gubernamentales-rusas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/mantente-a-salvo-de-los-malware-movil-pegasus-chrysaor-y-otras-apt/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/boeing-sufre-un-ciberataque-por-la-banda-ransomware-lockbit/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-ia/</loc>
  <lastmod>2025-09-29T09:05:20+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/multiples-vulnerabilidades-afectan-a-los-plc-de-mitsubishi-electric/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/como-detectar-ataques-e-inundaciones-arp-con-colasoft/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/vulnerabilidades-de-f5-que-estan-siendo-aprovechadas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/silent-skimmer-una-campana-web-dirigida-a-empresas-de-pagos-en-linea/</loc>
  <lastmod>2025-09-29T09:05:25+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackers-de-corea-del-norte-ocupan-backdoor-para-espiar-objetivos-de-corea-del-sur/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/vulnerabilidades-criticas-de-denegacion-de-servicio-dos-afectan-a-los-dispositivos-plc-de-siemens-utilizados-en-miles-de-plantas-industriales/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackers-pro-hamas-utilizan-nuevo-malware-llamado-wiper-para-atacar-israel/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/aparece-una-nueva-vulnerabilidad-de-linux-conocida-como-looney-tunables/</loc>
  <lastmod>2025-09-29T09:05:17+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/meta-multada-con-265-millones-de-euros-por-no-proteger-los-datos-de-los-usuarios-de-facebook/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/las-apps-de-prestamos-mas-peligrosas-en-mexico/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/microsoft-elimina-este-protocolo-historico-para-mejorar-la-seguridad/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nuevo-esquema-de-fraude-en-whatsapp-llamado-montalikes/</loc>
  <lastmod>2025-09-29T09:05:13+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/interpol-incauto-130-millones-en-activos-virtuales-con-la-operacion-haechi-iii/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/mercado-libre-ha-sido-hackeado-roban-datos-de-300-000-usuarios-y-codigo-fuente-2/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-html/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-una-maquina-virtual/</loc>
  <lastmod>2025-09-29T09:05:04+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/estafan-con-figuras-en-marketplace-utilizando-informacion-de-comercios-legitimos/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ubisoft-confirma-un-ciberataque-y-podria-ser-obra-del-grupo-lapsus/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/las-aplicaciones-de-adware-en-google-play-tienen-millones-de-descargas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nuevos-ataques-de-los-ciberdelincuentes-a-traves-de-codigos-qr/</loc>
  <lastmod>2025-09-29T09:05:09+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/google-gana-demanda-contra-ciudadanos-rusos-vinculados-a-botnet-llamada-glupteba/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/grupos-de-piratas-informaticos-aprovechan-el-conflicto-de-ucrania-para-distribuir-malware/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/los-equipos-soc-necesitan-mejorar-estos-puntos-debiles/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-un-servidor/</loc>
  <lastmod>2025-09-29T09:04:51+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/se-informa-que-meta-despide-a-docenas-de-empleados-por-secuestrar-las-cuentas-de-facebook-e-instagram-de-los-usuarios/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/principales-contrasenas-utilizadas-en-ataques-de-fuerza-bruta-rdp/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/microsoft-insta-a-los-desarrolladores-a-migrar-de-net-core-3-1-lo-antes-posible/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/google-pagara-391-millones-para-resolver-la-demanda-de-seguimiento-de-ubicacion-de-android/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/microsoft-lanzo-parche-para-proxynotshell-la-zero%e2%80%91day-en-microsoft-exchange/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/vmware-corrige-tres-errores-criticos-de-omision-de-autenticacion-en-la-herramienta-de-acceso-remoto/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/droppers-maliciosos-en-google-play-entregan-malware-bancario-a-las-victimas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/medibank-no-pagara-el-rescate-por-los-datos-robados-en-violacion/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/vulnerabilidad-dia-cero-de-escalada-de-privilegios-en-smartphones-samsung-galaxy-s21/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/malware-rat-aprovecha-la-carga-lateral-de-dll-para-pasar-desapercibido/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/botnet-llamado-peachpit-es-impulsado-por-millones-de-ios-y-android-pirateados/</loc>
  <lastmod>2025-09-29T09:04:54+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/lodarat-malware-resurge-con-nuevas-variantes-que-emplean-funcionalidades-actualizadas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/piratas-informaticos-chinos-utilizan-42000-dominios-falsos-en-una-campana-de-ataques-phishing/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/descubren-cientos-de-instancias-de-amazon-rds-que-filtran-datos-personales-de-los-usuarios/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/mas-de-15000-sitios-de-wordpress-comprometidos-en-una-campana-de-seo-maliciosa/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/vulnerabilidad-afecta-la-tecnologia-de-red-utilizada-por-naves-espaciales-y-aeronaves/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/descubren-paquete-pypi-que-oculta-codigo-malicioso-detras-del-archivo-de-imagen/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/apt29-aprovecho-una-caracteristica-de-windows-para-comprometer-la-red-de-entidades-diplomaticas-europeas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/ee-uu-incauta-mas-de-50-000-bitcoins-por-valor-de-3-300-millones-de-dolares-vinculados-a-la-red-oscura-de-silk-road/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/servicio-de-phishing-de-robin-banks-para-ciberdelincuentes-regresa-con-un-servidor-ruso/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/malware-apunta-a-aws-lambda-sin-servidor-con-criptomineros/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-un-nodo-de-red/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/nuevo-esquema-de-fraude-en-whatsapp-llamado-montalikes-2/</loc>
  <lastmod>2025-09-29T09:04:46+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/fbi-los-ataques-ddos-de-hacktivistas-tuvieron-un-impacto-menor-en-las-organizaciones-criticas/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/credenciales-internas-de-aws-disponibles-al-explotar-una-vulnerabilidad/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/que-es/que-es-threat-hunting/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/cnbv-hace-llamado-a-fintech-para-atender-riesgos-digitales/</loc>
  <lastmod>2025-09-29T09:04:42+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/el-ransomware-lockbit-afirma-haber-atacado-al-gigante-automotriz-de-continental/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/fabricantes/burp-suite-enterprise-edition-ahora-en-kubernetes/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/sat-informo-sobre-correos-electronicos-y-sitios-web-falsos-con-el-ojetivo-de-estafar/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/herramienta-de-windows-llamada-msrt-es-muy-util-para-detectar-malware/</loc>
  <lastmod>2025-09-29T09:04:34+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/investigadores-encuentran-enlaces-entre-black-basta-ransomware-y-fin7-hackers/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/openssh-9-0-se-integra-en-la-criptografia-poscuantica-a-prueba-de-futuros-ataques/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/como-preparar-a-las-nuevas-generaciones-para-un-futuro-con-la-ciberseguridad/</loc>
  <lastmod>2025-09-29T09:04:17+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/hackers-aprovechan-la-vulnerabilidad-de-winrar-en-una-nueva-campana/</loc>
  <lastmod>2025-09-29T09:04:30+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/por-el-hackeo-sufrido-la-secretaria-de-infraestructura-comunicaciones-y-transportes-sict-frena-todos-sus-tramites-hasta-fin-de-ano/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>
<url>
  <loc>https://www.north-networks.com/noticias/haskers-gang-regala-malware-zingostealer-a-otros-ciberdelincuentes-de-forma-gratuita/</loc>
  <lastmod>2025-09-29T09:14:18+00:00</lastmod>
  <priority>0.00</priority>
</url>


</urlset>