<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9">
  <url>
    <loc>https://segurancadigital360.com.br/post/proteger-empresa-ataques-ciberneticos</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:13:02.663Z</news:publication_date>
      <news:title>Como proteger a sua empresa de ataques cibernéticos em 2025</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/alerta-critico-vulnerabilidade-recem-descoberta-no-cpanel-e-explorada-em-ataques-sofisticados-a-governos-e-msps</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T10:42:53.155Z</news:publication_date>
      <news:title>Alerta Crítico: Vulnerabilidade Recém-Descoberta no cPanel é Explorada em Ataques Sofisticados a Governos e MSPs</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/detectar-clonagem-voz-analise-forense-golpes</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:13:04.365Z</news:publication_date>
      <news:title>Como Detectar Clonagem de Voz: Análise Forense em Golpes do CEO (Vishing)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/consentfix-v3-a-ameaca-silenciosa-que-ignora-senhas-e-mfa-no-azure</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T19:40:58.596Z</news:publication_date>
      <news:title>ConsentFix v3: A Ameaça Silenciosa que Ignora Senhas e MFA no Azure</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/vpn-guia-completo</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:13:04.557Z</news:publication_date>
      <news:title>VPN: O que é, como funciona e qual escolher</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/protocolo-forense-vitimas-deepfake-pornografico</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:13:04.084Z</news:publication_date>
      <news:title>Protocolo Forense para Vítimas de Deepfake Pornográfico (CSAM / NCII)</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/ferramentas-deepfake-guia-perito-forense</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:13:04.227Z</news:publication_date>
      <news:title>Ferramentas de Deepfake — Guia do Perito Forense Digital</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/desvendando-a-caixa-preta-da-ia-como-o-novo-kit-da-cisco-ajuda-a-rastrear-origem-de-modelos-e-proteger-empresas-brasileiras</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T01:40:45.218Z</news:publication_date>
      <news:title>Desvendando a Caixa Preta da IA: Como o Novo Kit da Cisco Ajuda a Rastrear Origem de Modelos e Proteger Empresas Brasileiras</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/golpe-pix-falso-2025</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:13:02.666Z</news:publication_date>
      <news:title>Novo golpe do Pix falso está fazendo milhares de vítimas</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/guia-senhas-seguras</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:13:01.965Z</news:publication_date>
      <news:title>Guia definitivo para criar senhas seguras em 2025</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/alerta-vermelho-para-empresas-falha-critica-no-linux-cve-2026-31431-com-exploracao-ativa-adicionada-ao-catalogo-kev-da-cisa</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-03T07:40:51.136Z</news:publication_date>
      <news:title>Alerta Vermelho para Empresas: Falha Crítica no Linux (CVE-2026-31431) com Exploração Ativa Adicionada ao Catálogo KEV da CISA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/megaeventos-no-brasil-a-revolucao-da-seguranca-com-drones-ia-e-reconhecimento-facial-em-copacabana</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T19:46:23.178Z</news:publication_date>
      <news:title>Megaeventos no Brasil: A Revolução da Segurança com Drones, IA e Reconhecimento Facial em Copacabana</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/microsoft-defender-em-crise-quando-a-protecao-confunde-certificados-digicert-com-malware-e-o-impacto-no-brasil</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T10:42:00.565Z</news:publication_date>
      <news:title>Microsoft Defender em Crise: Quando a Proteção Confunde Certificados DigiCert com Malware e o Impacto no Brasil</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/dossie-ransomware-2025</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:13:02.650Z</news:publication_date>
      <news:title>Dossiê Cibernético: Os Maiores Ataques de Ransomware em 2025</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/megaoperacao-global-desarticula-redes-de-golpes-cripto-276-presos-e-9-centros-de-fraude-desmantelados</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T07:41:15.156Z</news:publication_date>
      <news:title>Megaoperação Global Desarticula Redes de Golpes Cripto: 276 Presos e 9 Centros de Fraude Desmantelados</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/alerta-de-golpe-grupo-silver-fox-utiliza-phishing-fiscal-para-disseminar-o-malware-abcdoor-globalmente</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T13:44:31.036Z</news:publication_date>
      <news:title>Alerta de Golpe: Grupo Silver Fox Utiliza Phishing Fiscal para Disseminar o Malware ABCDoor Globalmente</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/2026-o-ano-dos-ataques-assistidos-por-ia</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T13:44:06.152Z</news:publication_date>
      <news:title>2026: O Ano dos Ataques Assistidos por IA</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/fraude-identidade-sintetica-deepfakes-kyc</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-05T00:13:03.918Z</news:publication_date>
      <news:title>Fraude de Identidade Sintética: Como Deepfakes Burlam Sistemas KYC de Bancos</news:title>
    </news:news>
  </url>
  <url>
    <loc>https://segurancadigital360.com.br/post/a-fronteira-da-seguranca-da-ia-palo-alto-networks-adquire-portkey-para-fortalecer-o-prisma-airs</loc>
    <news:news>
      <news:publication>
        <news:name>Segurança Digital 360</news:name>
        <news:language>pt</news:language>
      </news:publication>
      <news:publication_date>2026-05-04T16:44:41.763Z</news:publication_date>
      <news:title>A Fronteira da Segurança da IA: Palo Alto Networks Adquire Portkey para Fortalecer o Prisma AIRS</news:title>
    </news:news>
  </url>
</urlset>