<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet type="text/xsl" href="/sitemap_generator/default/sitemap.xsl"?>
<!--Generated by the Simple XML Sitemap Drupal module: https://drupal.org/project/simple_sitemap.-->
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1">
 <url>
  <loc>https://www.cyber.gov.au/</loc>
  <lastmod>2026-04-02T10:56:26+11:00</lastmod>
  <changefreq>daily</changefreq>
  <priority>1.0</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories</loc>
  <lastmod>2026-01-06T11:55:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/report</loc>
  <lastmod>2025-10-31T10:18:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content</loc>
  <lastmod>2025-02-13T10:26:56+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/advice-guidance-publications</loc>
  <lastmod>2025-02-14T10:08:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/programs</loc>
  <lastmod>2025-02-13T09:18:06+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/publications</loc>
  <lastmod>2026-03-16T08:16:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics</loc>
  <lastmod>2025-02-13T10:19:28+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/exercise-in-a-box</loc>
  <lastmod>2025-09-09T07:02:52+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/so-you-think-you-have-been-hacked</loc>
  <lastmod>2025-05-13T14:01:03+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news</loc>
  <lastmod>2025-02-13T08:57:02+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/page-not-found</loc>
  <lastmod>2024-06-17T10:00:23+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us</loc>
  <lastmod>2026-03-30T12:08:58+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-basics</loc>
  <lastmod>2025-10-30T10:04:10+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself</loc>
  <lastmod>2026-03-16T12:52:35+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover</loc>
  <lastmod>2026-03-16T08:30:18+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government</loc>
  <lastmod>2026-03-25T09:06:45+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats</loc>
  <lastmod>2025-07-18T16:12:45+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-basics/view-resources/resources-library</loc>
  <lastmod>2026-04-01T10:48:23+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/archive</loc>
  <lastmod>2025-04-15T12:11:58+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/archive</loc>
  <lastmod>2025-02-19T13:03:59+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight</loc>
  <lastmod>2026-03-12T15:47:53+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism</loc>
  <lastmod>2026-03-17T10:46:31+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/register</loc>
  <lastmod>2025-09-17T09:51:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines</loc>
  <lastmod>2026-03-17T10:17:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/cloud-computing</loc>
  <lastmod>2025-10-20T11:46:44+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/supplier-cyber-risk-management/managing-cyber-supply-chains</loc>
  <lastmod>2026-02-06T12:03:40+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/email-hardening</loc>
  <lastmod>2025-10-31T08:27:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/cross-domain-solutions</loc>
  <lastmod>2025-09-09T06:32:01+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-business-leaders/cyber-security-for-business-leaders</loc>
  <lastmod>2026-03-12T10:51:59+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/remote-working-secure-mobility/remote-working</loc>
  <lastmod>2025-09-09T07:02:27+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/remote-working-secure-mobility/secure-mobility</loc>
  <lastmod>2025-09-09T07:05:08+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/system-administration</loc>
  <lastmod>2025-09-09T07:12:06+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/system-hardening</loc>
  <lastmod>2025-10-31T08:14:05+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/event-logging</loc>
  <lastmod>2026-04-02T16:04:32+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/web-hardening</loc>
  <lastmod>2025-09-09T06:51:33+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/operational-technology-environments</loc>
  <lastmod>2026-01-15T09:55:21+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/ism-oscal-releases</loc>
  <lastmod>2025-11-14T08:34:48+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-secure-your-devices</loc>
  <lastmod>2026-03-16T12:40:57+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/staying-secure-online/connecting-others-online</loc>
  <lastmod>2024-08-12T10:33:34+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-accounts/passphrases</loc>
  <lastmod>2025-05-29T11:57:52+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-email/email-security</loc>
  <lastmod>2024-09-23T14:04:36+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/remote-working-secure-mobility</loc>
  <lastmod>2025-09-09T07:00:15+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/mitigating-cyber-security-incidents</loc>
  <lastmod>2026-03-13T15:21:06+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub</loc>
  <lastmod>2026-01-07T14:37:10+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides</loc>
  <lastmod>2026-03-16T09:58:42+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/supplier-cyber-risk-management/managed-service-providers</loc>
  <lastmod>2025-09-09T06:37:52+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/network-hardening</loc>
  <lastmod>2025-11-21T12:34:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications</loc>
  <lastmod>2026-03-13T11:21:26+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/scams</loc>
  <lastmod>2026-01-06T10:59:08+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design</loc>
  <lastmod>2026-03-16T09:25:19+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/resources-protect-yourself/personal-cyber-security-guides</loc>
  <lastmod>2025-06-20T13:38:13+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated</loc>
  <lastmod>2026-01-30T15:22:41+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/legacy-technology-management</loc>
  <lastmod>2026-03-18T10:33:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/cyber-security-incident-response</loc>
  <lastmod>2026-02-24T13:46:19+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/artificial-intelligence</loc>
  <lastmod>2026-03-11T15:09:14+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/critical-infrastructure</loc>
  <lastmod>2026-03-11T16:20:50+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/network-hardening/securing-edge-devices</loc>
  <lastmod>2025-09-17T09:30:40+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/secure-your-accounts/passkeys</loc>
  <lastmod>2025-06-20T15:21:06+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs</loc>
  <lastmod>2026-03-16T11:51:37+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/mobility-hardening</loc>
  <lastmod>2025-09-17T09:49:23+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/vulnerability-planning</loc>
  <lastmod>2025-09-17T09:36:23+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/quantum</loc>
  <lastmod>2026-03-18T09:48:39+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-basics/explore-basics/recognise-and-report-scams</loc>
  <lastmod>2024-08-20T13:46:32+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-basics/explore-basics/update-your-devices</loc>
  <lastmod>2025-07-31T13:51:16+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-basics/explore-basics/passphrases</loc>
  <lastmod>2026-03-16T09:55:49+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-basics/explore-basics/mfa</loc>
  <lastmod>2025-07-31T13:15:47+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-basics/explore-basics/set-and-perform-regular-backups</loc>
  <lastmod>2026-03-16T12:49:52+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-basics/explore-basics/threats</loc>
  <lastmod>2026-03-16T10:41:09+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-the-basics/explore-the-basics/small-business</loc>
  <lastmod>2026-02-26T15:47:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-the-basics/explore-the-basics/seniors</loc>
  <lastmod>2026-03-16T09:54:04+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/abc-radio-interview-head-acsc</loc>
  <lastmod>2023-03-13T16:29:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/asdacsc-and-international-partners-encourage-action-mitigate-risks-log4j-vulnerability</loc>
  <lastmod>2026-03-11T15:18:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/asdacsc-and-partners-alert-organisations-top-2021-malware-strains</loc>
  <lastmod>2023-10-05T16:13:55+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/asdacsc-annual-cyber-threat-report-2020-21</loc>
  <lastmod>2023-09-12T16:04:05+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/asdacsc-cyber-security-challenge</loc>
  <lastmod>2023-09-26T18:34:39+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/asdacsc-has-launched-new-campaign-business-email-compromise</loc>
  <lastmod>2023-09-18T10:17:46+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/acsc-participation-asia-pacific-computer-emergency-response-team-apcert-drill</loc>
  <lastmod>2023-10-05T16:42:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/asdacsc-participation-in-asia-pacific-computer-emergency-response-team-apcert-drill</loc>
  <lastmod>2023-09-07T14:35:32+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/asdacscncsc-collaboration-strengthen-cyber-security-posture</loc>
  <lastmod>2025-01-09T09:37:24+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/act-now-defend-against-vicious-cybercriminals</loc>
  <lastmod>2023-09-26T18:42:45+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/advice-malicious-cyber-activity-iran</loc>
  <lastmod>2023-09-07T15:13:18+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/introduction-securing-smart-places</loc>
  <lastmod>2023-10-05T16:50:13+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/asd-women-recognised-their-contribution-security-industry</loc>
  <lastmod>2023-03-13T16:28:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/australia-fighting-back-against-ransomware</loc>
  <lastmod>2023-09-26T19:17:46+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/australia-joins-us-and-uk-warn-2021-ransomware-trends</loc>
  <lastmod>2026-02-19T15:51:54+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/australian-signals-directorate-unveils-new-facility</loc>
  <lastmod>2023-09-07T15:57:11+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/australians-urged-act-cyber-alert</loc>
  <lastmod>2026-03-16T12:24:00+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/back-school-cyber-secure-devices</loc>
  <lastmod>2023-09-26T19:24:05+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/back-data-defend-against-cybercrime</loc>
  <lastmod>2023-09-26T19:25:08+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/be-ready-auda-domain-name-changes</loc>
  <lastmod>2023-09-08T09:58:12+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/boost-your-cyber-defences-backups</loc>
  <lastmod>2026-03-16T12:36:21+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/cisa-fbi-nsa-and-international-partners-issue-advisory-demonstrated-threats-and-capabilities-russian-state-sponsored-and-cyber-criminal-actors</loc>
  <lastmod>2023-09-26T19:36:13+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/cyber-incident-management-arrangements-australian-governments</loc>
  <lastmod>2023-03-13T16:30:00+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/cyber-resources-small-businesses</loc>
  <lastmod>2023-10-05T19:05:16+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/cyber-security-awareness-month-2021</loc>
  <lastmod>2023-09-26T20:28:02+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/cyber-security-awareness-month-2022</loc>
  <lastmod>2023-10-05T19:06:49+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/cybercriminals-scanning-australian-entities-serious-cyber-vulnerability</loc>
  <lastmod>2023-09-07T14:24:36+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/delivering-goods-cyber-security-resilience-transport-and-logistics-sector</loc>
  <lastmod>2023-09-07T14:32:04+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/essential-eight-assessment-guidance-package</loc>
  <lastmod>2023-08-28T10:10:52+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/exercise-box-here</loc>
  <lastmod>2023-09-12T17:08:17+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/gateway-security-guidance-package</loc>
  <lastmod>2025-12-18T09:16:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/gateway-security-guidance.png</image:loc>
   <image:caption>Gateway security guidance</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/head-acsc-address-aisa-cyber-conference-2021</loc>
  <lastmod>2026-03-13T11:24:53+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/head-acsc-talks-cyber-security-natarsha-belling-podcast-special</loc>
  <lastmod>2023-09-27T10:48:39+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/health-sector-snapshot</loc>
  <lastmod>2023-09-28T10:53:14+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/information-security-registered-assessor-program-irap</loc>
  <lastmod>2023-09-27T11:22:10+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/irap-training-partnership</loc>
  <lastmod>2023-09-12T22:27:40+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/jcsc-virtual-presentations-log4j2-vulnerability-friday-17-december</loc>
  <lastmod>2026-02-19T16:13:59+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/joint-advisory-top-cyber-vulnerabilities</loc>
  <lastmod>2026-02-19T15:35:42+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/joint-advisory-released-managed-service-providers-and-customers-mitigate-cybersecurity-risks</loc>
  <lastmod>2026-02-19T15:50:41+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/joint-cybersecurity-advisory-released-2021s-top-routinely-exploited-vulnerabilities</loc>
  <lastmod>2026-02-19T15:47:18+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/joint-statement-attribution-russia-malicious-cyber-activity-against-european-networks</loc>
  <lastmod>2026-02-19T15:49:57+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/launch-annual-threat-report</loc>
  <lastmod>2023-03-13T16:29:57+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/mandatory-incident-reporting</loc>
  <lastmod>2023-09-07T14:33:12+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/microsoft-introduces-exchange-emergency-mitigation-service</loc>
  <lastmod>2023-09-27T12:24:43+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/multi-factor-authentication-stronger-cyber-protection</loc>
  <lastmod>2023-03-13T16:31:10+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/national-cyber-security-exercises-australias-electricity-industry</loc>
  <lastmod>2023-09-07T15:01:15+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/new-asds-acsc-guidance-released-help-australians-avoid-risks-related-social-media-and-messaging-applications</loc>
  <lastmod>2023-09-27T16:22:29+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/new-information-security-manual-format-now-available</loc>
  <lastmod>2023-10-03T16:16:09+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/online-shoppers-target-christmas-cyber-grinches</loc>
  <lastmod>2023-03-13T16:26:44+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/safer-internet-day-2021</loc>
  <lastmod>2023-09-27T15:32:55+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/small-business-cloud-security-guides</loc>
  <lastmod>2023-09-18T10:57:04+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/staying-secure-online-during-back-school-shopping</loc>
  <lastmod>2023-11-03T16:21:19+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/asdsacsc-asks-have-you-been-hacked</loc>
  <lastmod>2024-06-17T09:26:39+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/asdacsc-call-247</loc>
  <lastmod>2023-09-07T15:55:51+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/update-your-devices-keep-cybercriminals-out</loc>
  <lastmod>2023-03-13T16:31:30+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/vulnerability-disclosure-program</loc>
  <lastmod>2023-09-27T17:01:47+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/media-releases/joint-statement-digital-transformation-agency-and-australian-signals-directorate-secure-internet-gateways-update</loc>
  <lastmod>2026-02-19T15:51:25+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/media-releases/us-uk-and-australia-issue-joint-cybersecurity-advisory</loc>
  <lastmod>2026-02-19T15:46:39+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/2020-health-sector-snapshot</loc>
  <lastmod>2024-04-03T13:08:39+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/asdacsc-annual-cyber-threat-report-july-2019-june-2020</loc>
  <lastmod>2026-02-19T16:31:28+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/asdacsc-annual-cyber-threat-report-july-2020-june-2021</loc>
  <lastmod>2025-05-15T10:12:44+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/acsc-annual-cyber-threat-report-july-2021-june-2022</loc>
  <lastmod>2026-03-11T14:52:02+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/asdacsc-threat-report-2015</loc>
  <lastmod>2024-04-03T13:08:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/acsc-threat-report-2016</loc>
  <lastmod>2024-04-03T13:09:02+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/asdacsc-threat-report-2017</loc>
  <lastmod>2024-04-03T13:10:05+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/joint-report-publicly-available-hacking-tools</loc>
  <lastmod>2026-02-19T15:48:44+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/manic-menagerie-investigation-report</loc>
  <lastmod>2024-04-03T13:10:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/msp-investigation-report</loc>
  <lastmod>2024-04-03T13:07:47+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/commonwealth-cyber-security-posture-2020</loc>
  <lastmod>2026-03-16T10:27:06+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/commonwealth-cyber-security-posture-2022</loc>
  <lastmod>2026-03-11T13:52:03+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/2020-002-critical-vulnerabilities-microsoft-windows</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/2020-003-mailto-ransomware-incidents</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/active-exploitation-critical-vulnerability-citrix-application-delivery-controller-and-citrix-gateway</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/active-exploitation-vulnerability-microsoft-internet-information-services</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/active-exploitation-vulnerable-mobileiron-products</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/mobileiron-720x420.jpg</image:loc>
   <image:caption>Two men looking at a computer screen</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/active-exploitation-vulnerable-sitecore-experience-platform-content-management-systems</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/advanced-persistent-threat-apt-actors-targeting-australian-health-sector-organisations-and-covid-19-essential-services</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/apt-exploitation-fortinet-vulnerabilities</loc>
  <lastmod>2026-03-23T14:20:26+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/are-you-ready-australian-domain-name-changes</loc>
  <lastmod>2023-09-26T19:16:47+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/australian-organisations-encouraged-urgently-adopt-enhanced-cyber-security-posture</loc>
  <lastmod>2023-03-13T16:43:38+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/avaddon-ransomware</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/conti-ransomware-incidents-australia</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/copy-paste-compromises</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/copy-paste-alert-720x420.jpg</image:loc>
   <image:caption>Illuminated circuit board</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/covid-19-malicious-cyber-activity</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/critical-remote-code-execution-vulnerability-found-log4j2-library</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/critical-severity-vulnerability-fortinet-fortios-ssl-vpn</loc>
  <lastmod>2023-10-05T18:55:52+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/critical-vulnerabilities-citrix-gateway-and-application-delivery-controller-adc-devices</loc>
  <lastmod>2023-09-08T10:35:57+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/critical-vulnerabilities-present-certain-versions-apple-ios-macos-and-safari</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/critical-vulnerability-discovered-httpsys-microsoft-windows</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/critical-vulnerability-identified-apple-ios-and-macos</loc>
  <lastmod>2023-09-26T20:14:15+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/critical-vulnerability-certain-hikvision-products-ip-cameras</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/critical-vulnerability-certain-versions-apache-http-server</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/critical-vulnerability-manageengine-adselfservice-plus-exploited-cyber-actors</loc>
  <lastmod>2025-06-20T14:08:05+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/critical-vulnerability-present-certain-versions-apple-ios-and-ipados</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/critical-vulnerability-present-certain-versions-microsoft-excel</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/critical-vulnerability-present-sap-internet-communication-manager</loc>
  <lastmod>2023-10-05T19:03:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/cybercriminals-targeting-construction-companies-conduct-email-scams</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/ddos-threats-being-made-against-australian-organisations</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/exchange-server-critical-vulnerabilities</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/High%20Alert%20Advisory%20720x420.jpg</image:loc>
   <image:caption>High Alert Advisory</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/exploitation-microsoft-office-vulnerability-follina</loc>
  <lastmod>2023-10-05T19:11:56+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/forgerock-open-am-critical-vulnerability</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/google-releases-security-updates-chrome-browser</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/high-severity-vulnerability-present-openssl-version-3x</loc>
  <lastmod>2023-09-27T10:58:25+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/increased-global-ransomware-threats</loc>
  <lastmod>2023-09-07T12:06:56+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/increasing-reports-mygov-related-sms-and-email-scams-targeting-australians</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/iranian-government-sponsored-apt-cyber-actors</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/kaseya-vsa-supply-chain-ransomware-attack</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/lockbit-20-ransomware-incidents-australia</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/malicious-actors-deploying-gootkit-loader-australian-networks</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/malware-targeting-centreon-software</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/medibank-private-cyber-security-incident</loc>
  <lastmod>2023-10-05T17:29:09+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/microsoft-exchange-proxyshell-targeting-australia</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/microsoft-releases-security-updates-microsoft-edge-browser</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/multiple-high-severity-vulnerabilities-discovered-exim-mail-server</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/multiple-key-vulnerabilities-identified-microsoft-products</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/multiple-vulnerabilities-vmware-vrealize-hyperic-monitoring-and-performance-management-product</loc>
  <lastmod>2023-09-27T16:02:12+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/multiple-vulnerabilities-present-f5-products</loc>
  <lastmod>2023-09-27T16:06:24+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/multiple-vulnerabilities-present-spring-framework-java</loc>
  <lastmod>2023-09-27T16:17:13+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/multiple-vulnerabilities-present-vmware-products</loc>
  <lastmod>2025-01-22T13:30:19+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/netlogon-elevation-privilege-vulnerability-cve-2020-1472</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/netlogon-vulnerability-720x420.jpg</image:loc>
   <image:caption>Worried man staring at laptop</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/new-domain-name-changes-could-leave-your-business-or-organisation-risk</loc>
  <lastmod>2023-09-07T12:15:25+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/optus-data-breach</loc>
  <lastmod>2025-12-17T16:21:49+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/phone-and-email-scammers-impersonating-asdacsc</loc>
  <lastmod>2023-09-26T17:38:03+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/phone-scams-impersonating-australian-businesses-and-government-agencies</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/potential-accellion-file-transfer-appliance-compromise</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/potential-solarwinds-orion-compromise</loc>
  <lastmod>2025-12-17T16:22:57+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/processors-can-be-exploited-meltdown-and-spectre-vulnerabilities</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/property-related-business-email-compromise-scams-rising-australia</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/ransomware-targeting-australian-aged-care-and-healthcare-sectors</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/remote-code-execution-vulnerability-present-atlassian-confluence-server-and-data-center</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/remote-code-execution-vulnerability-present-certain-versions-atlassian-confluence</loc>
  <lastmod>2023-10-05T19:24:36+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/remote-code-execution-vulnerability-present-certain-versions-palo-alto-firewalls-utilising-globalprotect-vpn-component</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/remote-code-execution-vulnerability-present-fortinet-devices</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/remote-code-execution-vulnerability-present-mshtml-component-microsoft-windows</loc>
  <lastmod>2023-09-27T14:01:03+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/remote-code-execution-vulnerability-present-open-management-infrastructure-affects-certain-microsoft-azure-services</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/remote-code-execution-vulnerability-present-samba-versions-prior-41317</loc>
  <lastmod>2023-09-27T14:42:32+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/remote-code-execution-vulnerability-present-sonicwall-sma-100-series-appliances</loc>
  <lastmod>2023-09-27T14:44:17+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/remote-code-execution-vulnerability-present-sophos-firewall</loc>
  <lastmod>2023-10-05T19:25:45+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/remote-code-execution-vulnerability-present-vm2-sandbox</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/remote-code-execution-vulnerability-present-windows-scripting-engine-microsoft-windows</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/remote-code-execution-vulnerability-windows-dns-cve-2020-1350</loc>
  <lastmod>2023-09-27T14:56:05+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/sdbbot-targeting-health-sector</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/sextortion-email-campaign-impacting-australians</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/sonicwall-breach</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/sonicwall-devices-targeted-ransomware-utilising-stolen-credentials</loc>
  <lastmod>2025-12-17T16:22:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/summary-tradecraft-trends-2019-20</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/suspected-user-credentials-stolen-fortinet-devices-leaked-online</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/sustained-targeting-health-sector</loc>
  <lastmod>2025-12-17T16:22:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/tmui-remote-code-execution-vulnerability-cve-2020-5902</loc>
  <lastmod>2025-12-17T16:22:18+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/use-log4j-vulnerabilities-ransomware-activity</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/vmware-vcenter-server-plugin-remote-code-execution-vulnerability-cve-2021-21972</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/vulnerability-affecting-blackberry-qnx-rtos</loc>
  <lastmod>2025-12-17T16:22:09+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/vulnerability-alert-2-new-vulnerabilities-associated-microsoft-exchange</loc>
  <lastmod>2025-12-17T16:21:59+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/zoho-manageengine-servicedesk-plus-desktop-central-remote-code-execution-vulnerabilities</loc>
  <lastmod>2025-04-16T11:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2023-01-asdacsc-ransomware-profile-royal</loc>
  <lastmod>2023-09-07T17:45:25+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/vulnerability-affecting-blackberry-qnx-rtos</loc>
  <lastmod>2025-12-17T15:51:56+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/threat-update-covid-19-malicious-cyber-activity-27-march-2020</loc>
  <lastmod>2023-10-12T08:38:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/threat-update-covid-19-malicious-cyber-activity-20-april-2020</loc>
  <lastmod>2023-10-05T19:28:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/summary-tactics-techniques-and-procedures-used-target-australian-networks</loc>
  <lastmod>2025-12-17T15:52:08+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/sextortion-campaign-what-do-if-you-receive-email</loc>
  <lastmod>2025-12-17T15:52:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/russian-state-sponsored-and-criminal-cyber-threats-critical-infrastructure</loc>
  <lastmod>2026-02-19T15:13:51+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/revised-patch-released-disable-mitigation-against-spectre-variant-2</loc>
  <lastmod>2025-12-17T15:52:33+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/recommendations-mitigate-ddos-threats-being-made-against-australian-organisations</loc>
  <lastmod>2025-12-17T15:52:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/protecting-against-cyber-threats-managed-service-providers-and-their-customers</loc>
  <lastmod>2026-02-19T16:27:42+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/protect-yourself-remote-access-scams</loc>
  <lastmod>2026-01-13T16:06:37+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/protect-yourself-and-others-mygov-related-scams</loc>
  <lastmod>2025-12-17T15:53:32+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/mitigating-log4shell-and-other-log4j-related-vulnerabilities</loc>
  <lastmod>2026-02-19T16:24:30+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/meltdown-and-spectre-patches-unsuitable-some-security-products</loc>
  <lastmod>2023-09-27T12:19:53+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/joint-advisory-technical-approaches-uncovering-and-remediating-malicious-activity</loc>
  <lastmod>2026-02-19T15:07:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/iranian-islamic-revolutionary-guard-corps-affiliated-cyber-actors-exploiting-vulnerabilities-data-extortion-and-disk-encryption-ransom-operations</loc>
  <lastmod>2026-02-19T16:27:08+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/iranian-government-sponsored-apt-cyber-actors-exploiting-microsoft-exchange-and-fortinet-vulnerabilities-furtherance-malicious-activities</loc>
  <lastmod>2026-03-23T14:17:05+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/cyber-security-essential-when-preparing-covid-19</loc>
  <lastmod>2023-09-08T09:56:44+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/covid-19-themed-malicious-cyber-activity</loc>
  <lastmod>2023-10-12T08:27:09+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/covid-19-scam-messages</loc>
  <lastmod>2023-10-12T08:25:24+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/covid-19-malicious-scams-threat-awareness-and-guidance</loc>
  <lastmod>2023-10-05T17:26:54+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/advisory-2021-004-active-exploitation-forgerock-access-manager-openam-servers</loc>
  <lastmod>2023-10-05T16:47:50+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/advisory-2021-002-active-exploitation-vulnerable-microsoft-exchange-servers</loc>
  <lastmod>2023-10-05T16:46:43+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/advisory-2020-017-resumption-emotet-malware-campaign</loc>
  <lastmod>2023-03-13T16:40:39+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/advisory-2020-016-zerologon-netlogon-elevation-privilege-vulnerability-cve-2020-1472</loc>
  <lastmod>2023-03-13T16:38:45+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/advisory-2020-009-recommendations-mitigate-apt-actors-targeting-health-sector-and-covid-19-essential-services</loc>
  <lastmod>2023-03-13T16:38:42+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/advisory-2020-008-copy-paste-compromises-tactics-techniques-and-procedures-used-target-multiple-australian-networks</loc>
  <lastmod>2023-10-05T16:45:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/advisory-2020-004-remote-code-execution-vulnerability-being-actively-exploited-vulnerable-versions-telerik-ui-sophisticated-actors</loc>
  <lastmod>2023-03-13T16:37:55+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/asdacsc-advisory-2020-012-critical-remote-code-execution-vulnerability-windows-dns-server-cve-2020-1350</loc>
  <lastmod>2023-10-05T16:13:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2022-02-australian-organisations-should-urgently-adopt-enhanced-cyber-security-posture</loc>
  <lastmod>2026-03-23T13:41:24+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2022-004-asdacsc-ransomware-profile-alphv-aka-blackcat</loc>
  <lastmod>2023-09-07T15:51:22+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2021-010-asdacsc-ransomware-profile-conti</loc>
  <lastmod>2023-09-07T17:04:07+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2021-009-malicious-actors-deploying-gootkit-loader-australian-networks</loc>
  <lastmod>2023-09-26T18:12:54+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2021-007-log4j-vulnerability-advice-and-mitigations</loc>
  <lastmod>2023-09-11T16:10:39+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2021-006-asdacsc-ransomware-profile-lockbit-20</loc>
  <lastmod>2023-10-05T16:11:43+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2021-trends-show-increased-globalized-threat-ransomware</loc>
  <lastmod>2026-02-19T16:18:04+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2021-top-routinely-exploited-vulnerabilities</loc>
  <lastmod>2026-03-23T13:40:48+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2021-top-malware-strains</loc>
  <lastmod>2026-02-19T16:19:30+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2020-013-ransomware-targeting-australian-aged-care-and-healthcare-sectors</loc>
  <lastmod>2023-09-08T09:40:48+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2020-011-critical-vulnerability-sap-netweaver-application-server-cve-2020-6287</loc>
  <lastmod>2023-09-26T18:03:51+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2020-006-detecting-and-mitigating-exploitation-vulnerability-microsoft-internet-information-services</loc>
  <lastmod>2023-09-26T18:01:51+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2020-002-critical-vulnerabilities-microsoft-windows-patch-urgently</loc>
  <lastmod>2023-03-13T16:40:25+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2020-001-4-remediation-critical-vulnerability-citrix-application-delivery-controller-and-citrix-gateway</loc>
  <lastmod>2023-09-26T17:55:27+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/gootkit-loader-continues-be-used-multiple-australian-networks</loc>
  <lastmod>2023-09-28T10:34:15+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/acsc/view-all-content/advisories/2021-003-ongoing-campaign-using-avaddon-ransomware</loc>
  <lastmod>2025-12-17T15:53:50+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/resources-business-and-government/maintaining-devices-and-systems/critical-infrastructure/remote-access-operational-technology-environments</loc>
  <lastmod>2026-03-16T11:34:28+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-cryptography</loc>
  <lastmod>2026-03-17T10:18:42+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-networking</loc>
  <lastmod>2025-12-04T12:06:41+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-software-development</loc>
  <lastmod>2026-03-17T10:19:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-system-hardening</loc>
  <lastmod>2026-03-17T10:19:18+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-evaluated-products</loc>
  <lastmod>2025-12-04T12:07:59+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-communications-systems</loc>
  <lastmod>2025-12-04T12:05:44+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-physical-security</loc>
  <lastmod>2025-12-04T12:02:55+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-procurement-and-outsourcing</loc>
  <lastmod>2026-03-17T10:20:00+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-terminology</loc>
  <lastmod>2026-03-17T10:18:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/using-the-information-security-manual</loc>
  <lastmod>2026-03-17T10:20:47+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-system-monitoring</loc>
  <lastmod>2025-12-04T12:15:37+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-system-management</loc>
  <lastmod>2025-12-04T12:13:42+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-cyber-security-documentation</loc>
  <lastmod>2025-12-04T12:02:02+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-personnel-security</loc>
  <lastmod>2025-12-04T12:03:57+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-media</loc>
  <lastmod>2025-12-04T12:11:22+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-information-technology-equipment</loc>
  <lastmod>2025-12-04T12:10:11+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-gateways</loc>
  <lastmod>2025-12-04T12:02:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-enterprise-mobility</loc>
  <lastmod>2026-03-24T16:00:50+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-email</loc>
  <lastmod>2025-12-04T12:07:55+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-database-systems</loc>
  <lastmod>2025-12-04T12:12:53+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-data-transfers</loc>
  <lastmod>2025-12-04T12:01:02+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-cyber-security-roles</loc>
  <lastmod>2026-03-17T10:20:24+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-cyber-security-incidents</loc>
  <lastmod>2026-03-17T10:20:14+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-guidelines/guidelines-for-communications-infrastructure</loc>
  <lastmod>2026-03-17T10:19:44+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/cyber-security-principles</loc>
  <lastmod>2026-03-17T10:20:36+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/australian-information-security-evaluation-program</loc>
  <lastmod>2026-03-16T12:14:47+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/critical-infrastructure-uplift-program</loc>
  <lastmod>2026-03-11T16:22:51+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/ci-up-logo.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/emanation-security-industry-program</loc>
  <lastmod>2025-10-29T09:42:25+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/partnershipprogram</loc>
  <lastmod>2026-04-01T11:02:48+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/high-assurance-evaluation-program</loc>
  <lastmod>2025-09-09T07:24:03+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/irap</loc>
  <lastmod>2026-01-30T11:34:50+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Securing-your-accounts-landing-button.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Essential-cyber-security-landing-button_0.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Assessment-and-evaluation-programs-landing-button.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/irap.png</image:loc>
   <image:caption>IRAP</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-threats/malware</loc>
  <lastmod>2025-08-14T08:28:57+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-threats/identity-theft</loc>
  <lastmod>2025-07-21T16:23:11+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-threats/hacking</loc>
  <lastmod>2025-04-28T09:56:27+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-threats/data-breaches</loc>
  <lastmod>2026-01-07T14:34:53+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/in-no-time-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-secure-your-devices/secure-your-mobile-phone</loc>
  <lastmod>2024-12-02T12:56:24+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/messages-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/resources-protect-yourself/personal-cyber-security-guides/protect-yourself-updates</loc>
  <lastmod>2025-07-31T12:34:13+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/messages-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/resources-protect-yourself/personal-cyber-security-guides/protect-yourself-multi-factor-authentication</loc>
  <lastmod>2025-12-05T16:05:52+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/messages-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/resources-protect-yourself/personal-cyber-security-guides/personal-cyber-security-next-steps</loc>
  <lastmod>2026-03-13T16:06:08+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/messages-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/resources-protect-yourself/personal-cyber-security-guides/personal-cyber-security-first-steps</loc>
  <lastmod>2025-06-20T13:27:28+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/messages-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/resources-protect-yourself/personal-cyber-security-guides/personal-cyber-security-advanced-steps</loc>
  <lastmod>2026-03-13T16:03:55+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/messages-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/resources-protect-yourself/personal-cyber-security-guides/seniors-guide</loc>
  <lastmod>2026-01-29T12:10:43+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/messages-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/staying-secure-online/shopping-and-banking-online/online-shopping/while-you-are-shopping</loc>
  <lastmod>2025-12-18T09:16:05+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/recover-from/ransomware/protect-yourself-from-ransomware</loc>
  <lastmod>2025-12-18T09:15:56+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-email/email-security/preventing-business-email-compromise</loc>
  <lastmod>2026-03-13T16:13:17+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/staying-secure-online/shopping-and-banking-online/online-shopping/if-things-go-wrong</loc>
  <lastmod>2025-12-18T09:15:39+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/staying-secure-online/shopping-and-banking-online/online-shopping/after-youve-made-purchase</loc>
  <lastmod>2025-12-18T09:15:32+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-basics/view-resources/quiz-library</loc>
  <lastmod>2025-12-18T09:15:24+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/reading-graphic.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/Passphrases.png</image:loc>
   <image:caption>Passphrases</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/Backup%20drive.png</image:loc>
   <image:caption>Backup drive</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/MFA.png</image:loc>
   <image:caption>MFA</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/Update%20phone.png</image:loc>
   <image:caption>Update phone</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/quiz-library-Icon-non-reuse.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/hindi</loc>
  <lastmod>2025-12-18T09:15:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/croatian</loc>
  <lastmod>2025-12-18T09:15:06+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/indonesian</loc>
  <lastmod>2025-12-18T09:14:58+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/macedonian</loc>
  <lastmod>2025-12-18T09:14:49+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/maltese</loc>
  <lastmod>2025-12-18T09:14:31+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/chinesesimplified</loc>
  <lastmod>2025-12-18T09:14:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/vietnamese</loc>
  <lastmod>2025-12-18T09:14:12+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/italian</loc>
  <lastmod>2025-12-18T09:14:04+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/korean</loc>
  <lastmod>2025-12-18T09:13:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/spanish</loc>
  <lastmod>2025-12-18T09:13:56+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/chinesetraditional</loc>
  <lastmod>2025-12-18T09:13:49+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/arabic</loc>
  <lastmod>2025-12-18T09:13:40+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/greek</loc>
  <lastmod>2025-12-18T09:13:32+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/punjabi</loc>
  <lastmod>2025-12-18T09:13:23+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/become-asd-partner</loc>
  <lastmod>2026-03-25T15:38:19+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/resources-business-and-government/alerts</loc>
  <lastmod>2023-02-16T15:59:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/protecting-your-staff</loc>
  <lastmod>2026-03-16T08:14:50+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-secure-your-device/how-dispose-your-device-securely</loc>
  <lastmod>2025-12-18T09:12:57+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/messages-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-email/email-security/secure-your-email</loc>
  <lastmod>2026-03-16T09:32:33+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-04/hybh_icon.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-10/NASC_Scamwatch_logo_0.png</image:loc>
   <image:caption>National Anti-Scam Centre - Scamwatch</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/operational-technology-environments/an-introduction-to-securing-smart-places</loc>
  <lastmod>2025-11-04T14:12:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/cloud-computing/cloud-assessment-and-authorisation</loc>
  <lastmod>2025-12-24T11:11:10+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-business-leaders/cyber-security-for-business-leaders/cyber-skills-framework</loc>
  <lastmod>2025-09-09T06:47:53+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/system-administration/patching-applications-and-operating-systems</loc>
  <lastmod>2026-03-13T15:56:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/remote-working-secure-mobility/secure-mobility/bring-your-own-device-for-executives</loc>
  <lastmod>2026-03-11T15:37:57+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/cloud-computing/cloud-assessment-and-authorisation-faq</loc>
  <lastmod>2026-03-11T16:07:17+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/cloud-computing/cloud-computing-security-for-cloud-service-providers</loc>
  <lastmod>2025-12-24T10:52:43+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/cloud-computing/cloud-computing-security-for-tenants</loc>
  <lastmod>2026-03-11T16:15:14+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-accounts/passphrases/creating-strong-passphrases</loc>
  <lastmod>2025-06-20T13:16:01+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/cyber-security-incident-response/cyber-incident-management-arrangements-for-australian-governments</loc>
  <lastmod>2025-11-12T11:32:03+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-09/cima-appendix-diagram-2023.png</image:loc>
   <image:caption>A National Cyber Indecent Management Arrangements for Australian Governments</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/cyber-security-incident-response/cyber-security-incident-response-planning-practitioner-guidance</loc>
  <lastmod>2026-03-27T13:33:47+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/cyber-security-research-report</loc>
  <lastmod>2025-07-31T12:00:23+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/supplier-cyber-risk-management/managing-cyber-supply-chains/cyber-supply-chain-risk-management</loc>
  <lastmod>2026-03-12T11:00:36+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/network-hardening/defending-against-the-malicious-use-of-the-tor-network</loc>
  <lastmod>2026-03-12T12:11:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/email-hardening/detecting-socially-engineered-messages</loc>
  <lastmod>2026-03-12T12:16:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/network-hardening/domain-name-system-security-for-domain-owners</loc>
  <lastmod>2026-03-12T12:18:30+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/network-hardening/domain-name-system-security-for-domain-resolvers</loc>
  <lastmod>2026-03-12T14:24:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/easy-steps-secure-yourself-online</loc>
  <lastmod>2025-05-01T12:14:21+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/legacy-technology-management/end-of-support-for-microsoft-windows-and-microsoft-windows-server</loc>
  <lastmod>2026-03-18T10:26:38+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-assessment-process-guide</loc>
  <lastmod>2026-03-16T12:09:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model</loc>
  <lastmod>2026-03-12T16:07:06+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model-faq</loc>
  <lastmod>2026-03-12T16:17:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model-and-ism-mapping</loc>
  <lastmod>2026-03-12T16:11:34+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/cross-domain-solutions/fundamentals-of-cross-domain-solutions</loc>
  <lastmod>2026-03-12T16:26:49+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/gateway-security-guidance-package/gateway-security-guidance-package-executive-guidance</loc>
  <lastmod>2025-11-12T13:55:12+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/gateway-security-guidance-package/gateway-security-guidance-package-gateway-operations-management</loc>
  <lastmod>2026-03-13T09:41:11+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/gateway-security-guidance-package/gateway-security-guidance-package-gateway-security-principles</loc>
  <lastmod>2025-11-12T13:56:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/gateway-security-guidance-package/gateway-security-guidance-package-gateway-technology-guides</loc>
  <lastmod>2025-11-12T13:59:09+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/system-hardening/hardening-linux-workstations-and-servers</loc>
  <lastmod>2026-03-17T08:33:40+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/system-hardening/hardening-microsoft-365-office-2021-office-2019-and-office-2016</loc>
  <lastmod>2026-03-13T11:17:38+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/system-hardening/hardening-microsoft-windows-11-workstations</loc>
  <lastmod>2026-03-13T11:20:21+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/email-hardening/how-to-combat-fake-emails</loc>
  <lastmod>2026-03-13T11:47:56+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/supplier-cyber-risk-management/managed-service-providers/how-to-manage-your-security-when-engaging-a-managed-service-provider</loc>
  <lastmod>2026-03-13T11:50:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/supplier-cyber-risk-management/managing-cyber-supply-chains/identifying-cyber-supply-chain-risks</loc>
  <lastmod>2026-03-13T14:25:44+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/system-hardening/implementing-application-control</loc>
  <lastmod>2026-03-13T14:27:13+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/web-hardening/implementing-certificates-tls-https-and-opportunistic-tls</loc>
  <lastmod>2026-03-13T14:28:18+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/system-hardening/implementing-multi-factor-authentication</loc>
  <lastmod>2026-03-13T14:30:45+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/network-hardening/implementing-network-segmentation-and-segregation</loc>
  <lastmod>2026-03-13T14:32:21+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/operational-technology-environments/industrial-control-systems-remote-access-protocol</loc>
  <lastmod>2026-03-13T14:35:47+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/cross-domain-solutions/introduction-to-cross-domain-solutions</loc>
  <lastmod>2026-03-13T14:47:44+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/iot-secure-by-design-guidance-for-manufacturers</loc>
  <lastmod>2026-03-13T14:54:43+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/log4j-what-boards-and-directors-need-know</loc>
  <lastmod>2026-01-06T12:17:51+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/email-hardening/malicious-email-mitigation-strategies</loc>
  <lastmod>2026-03-13T14:59:45+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/supplier-cyber-risk-management/managed-service-providers/managed-service-providers-how-to-manage-risk-to-customer-networks</loc>
  <lastmod>2026-03-13T15:05:08+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/email-hardening/marketing-and-filtering-email-service-providers</loc>
  <lastmod>2026-03-13T15:15:53+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-business-leaders/cyber-security-for-business-leaders/mergers-acquisitions-and-machinery-of-government-changes</loc>
  <lastmod>2026-03-13T15:18:33+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/system-hardening/restricting-microsoft-office-macros</loc>
  <lastmod>2026-03-16T08:43:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/cyber-security-incident-response/cyber-security-incident-response-planning-executive-guidance</loc>
  <lastmod>2026-03-20T09:47:06+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/cyber-security-incident-response/preparing-for-and-responding-to-denial-of-service-attacks</loc>
  <lastmod>2026-03-27T13:24:27+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/graphic-upload.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/email-hardening/protecting-against-business-email-compromise</loc>
  <lastmod>2026-03-16T08:06:03+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/operational-technology-environments/protecting-industrial-control-systems</loc>
  <lastmod>2026-03-16T10:59:08+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/supplier-cyber-risk-management/managed-service-providers/questions-to-ask-managed-service-providers</loc>
  <lastmod>2026-03-13T15:02:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-update-your-device-and-software/end-support</loc>
  <lastmod>2026-03-25T09:57:36+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-accounts/password-managers</loc>
  <lastmod>2025-05-14T14:59:32+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/web-hardening/secure-your-website</loc>
  <lastmod>2026-03-16T09:34:26+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/system-administration/restricting-administrative-privileges</loc>
  <lastmod>2026-03-16T08:41:22+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/remote-working-secure-mobility/secure-mobility/risk-management-of-enterprise-mobility-including-bring-your-own-device</loc>
  <lastmod>2026-03-16T09:18:34+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/system-administration/secure-administration</loc>
  <lastmod>2026-03-16T09:22:24+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/system-administration/securing-powershell-in-the-enterprise</loc>
  <lastmod>2026-03-16T09:36:10+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/mobility-hardening/security-configuration-guide-apple-ios-14-devices</loc>
  <lastmod>2026-03-16T09:38:17+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/mobility-hardening/security-configuration-guide-samsung-galaxy-s10-s20-and-note-20-devices</loc>
  <lastmod>2026-03-16T09:41:36+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/mobility-hardening/security-configuration-guide-viasat-mobile-dynamic-defense</loc>
  <lastmod>2026-03-16T09:43:04+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/staying-secure-online/connecting-others-online/security-tips-online-gaming</loc>
  <lastmod>2026-03-16T09:45:10+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-business-leaders/security-tips-for-social-media-and-messaging-apps</loc>
  <lastmod>2026-03-16T09:48:33+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides/small-business-cloud-security-guides-executive-overview</loc>
  <lastmod>2026-03-16T10:02:50+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides-introduction</loc>
  <lastmod>2026-03-16T10:05:13+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/small-business-cyber-security-guide</loc>
  <lastmod>2026-03-16T10:07:00+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/secure-login-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/mitigating-cyber-security-incidents/strategies-to-mitigate-cybersecurity-incidents</loc>
  <lastmod>2026-03-11T13:26:30+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/mitigating-cyber-security-incidents/strategies-to-mitigate-cyber-security-incidents-mitigation-details</loc>
  <lastmod>2026-03-11T13:29:04+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides/technical-example-application-control</loc>
  <lastmod>2025-09-09T06:17:50+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides/technical-example-configure-macro-settings</loc>
  <lastmod>2026-03-16T10:19:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides/technical-example-multi-factor-authentication</loc>
  <lastmod>2026-03-16T10:21:27+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides/technical-example-patch-applications</loc>
  <lastmod>2025-09-09T06:15:39+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides/technical-example-patch-operating-systems</loc>
  <lastmod>2025-09-09T06:14:40+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides/technical-example-regular-backups</loc>
  <lastmod>2026-03-16T10:23:30+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides/technical-example-restrict-administrative-privileges</loc>
  <lastmod>2025-09-09T06:13:02+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides/technical-example-user-application-hardening</loc>
  <lastmod>2026-03-16T10:24:23+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/remote-working-secure-mobility/secure-mobility/travelling-with-mobile-devices</loc>
  <lastmod>2026-03-16T10:33:30+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/remote-working-secure-mobility/remote-working/using-remote-desktop-clients</loc>
  <lastmod>2026-03-16T10:36:53+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/vulnerability-planning/vulnerability-disclosure-programs-explained</loc>
  <lastmod>2026-03-16T10:38:41+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/remote-working-secure-mobility/remote-working/web-conferencing-security</loc>
  <lastmod>2026-03-16T10:42:33+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/event-logging/windows-event-logging-and-forwarding</loc>
  <lastmod>2026-03-16T10:44:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-basics/view-resources/glossary</loc>
  <lastmod>2023-06-30T10:06:17+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/about-asd-acsc/who-we-are</loc>
  <lastmod>2024-09-06T08:46:34+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/accessibility</loc>
  <lastmod>2026-01-13T11:57:00+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/disclaimer</loc>
  <lastmod>2026-01-13T12:05:26+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/privacy</loc>
  <lastmod>2026-01-13T12:04:02+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/where-get-help</loc>
  <lastmod>2026-03-12T12:03:06+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/emergency_numbers.png</image:loc>
   <image:caption>Call Triple Zero (000) for emergencies or life threatening situations, Police Assistance Line (131 444) for non-emergencies, or Crimestoppers (1800 333 000) to provide crime information. </image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/terms-of-use</loc>
  <lastmod>2026-01-13T13:02:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/node/2027</loc>
  <lastmod>2026-04-02T10:56:26+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-11/handshake-icon.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/Multiple%20devices.png</image:loc>
   <image:caption>Multiple devices</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/Referral%20organisations.png</image:loc>
   <image:caption>Referral organisations</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/How%20to.png</image:loc>
   <image:caption>How to</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/about-asd-acsc/contact-us</loc>
  <lastmod>2025-07-09T11:38:41+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-10/NASC_Scamwatch_logo.png</image:loc>
   <image:caption>National Anti-Scam Centre - Scamwatch </image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/resources-library-Icon-non-reuse.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/IT%20professional.png</image:loc>
   <image:caption>IT Professional</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/ism-feedback-form</loc>
  <lastmod>2025-09-23T16:48:37+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/ism/archived-ism-releases</loc>
  <lastmod>2026-03-17T10:17:49+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Icon.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Icon.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Icon.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Icon.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Icon.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Icon.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Icon.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Icon.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Icon.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/irap/irap-assessment-feedback-form</loc>
  <lastmod>2025-11-05T11:01:55+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/irap/irap-community-feedback-form</loc>
  <lastmod>2025-11-05T08:31:19+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-secure-your-devices/internet-things-devices</loc>
  <lastmod>2026-03-27T15:51:52+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/graphic-upload.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/irap/cloud-services</loc>
  <lastmod>2025-09-09T05:38:44+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/irap/application-form</loc>
  <lastmod>2025-09-09T05:39:21+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/irap/irap-assessors-list</loc>
  <lastmod>2025-09-09T05:34:44+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/irap/resources</loc>
  <lastmod>2026-01-21T11:10:21+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/irap/who-are-asd-irap-assessors</loc>
  <lastmod>2026-02-16T08:11:17+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/irap/irap-consumer-guide</loc>
  <lastmod>2025-09-09T05:33:38+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/recover-from/hacking</loc>
  <lastmod>2026-03-16T08:34:55+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/hacking.png</image:loc>
   <image:caption>Hacking</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-threats/cryptomining</loc>
  <lastmod>2025-06-20T15:54:24+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-threats/malicious-insiders</loc>
  <lastmod>2025-06-20T14:23:25+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/recover-from/identity-theft</loc>
  <lastmod>2025-01-30T14:58:47+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2024-10/australian-digital-ID-system-logo_0.png</image:loc>
   <image:caption>Australian Government | Australia's Digital ID System</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/recover-from/malware</loc>
  <lastmod>2026-03-16T08:39:08+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/recover-from/scams</loc>
  <lastmod>2025-12-18T09:12:17+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/report/report-a-cyber-security-incident</loc>
  <lastmod>2026-04-01T10:33:42+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/report/report-a-vulnerability</loc>
  <lastmod>2023-09-27T14:55:18+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/staying-secure-online/secure-your-wifi-and-router</loc>
  <lastmod>2025-12-18T09:12:10+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-threats/business-email-compromise</loc>
  <lastmod>2024-09-23T13:59:52+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-threats/ransomware</loc>
  <lastmod>2025-06-20T14:01:31+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/Screenshot%202023-06-05%20at%2011.54.12.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/Screenshot%202023-06-05%20at%2016.54.27.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/Screenshot%202023-06-05%20at%2016.55.56.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/recover-from/business-email-compromise/review-your-email-account-security</loc>
  <lastmod>2025-12-18T09:12:03+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/copyright</loc>
  <lastmod>2026-01-13T11:59:18+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/staying-secure-online/shopping-and-banking-online/online-shopping</loc>
  <lastmod>2024-09-10T10:36:19+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/spotting-scams</loc>
  <lastmod>2026-03-16T10:17:27+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/first-nations-business-resources</loc>
  <lastmod>2025-12-18T09:11:30+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/Screenshot%202023-06-05%20at%2017.14.46.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/Screenshot%202023-06-05%20at%2017.16.15.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/Screenshot%202023-06-05%20at%2017.16.15_0.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/Screenshot%202023-06-05%20at%2017.18.39.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/Screenshot%202023-06-05%20at%2017.20.09.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/Screenshot%202023-06-05%20at%2017.21.30.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/Screenshot%202023-06-05%20at%2017.22.54.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/Screenshot%202023-06-05%20at%2017.24.20.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/yangku-painting-jasmine-miikika-craciun.jpg</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-basics/watch-out-threats/types-scams</loc>
  <lastmod>2024-09-23T13:23:22+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-threats/phishing</loc>
  <lastmod>2025-09-12T13:58:03+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/2023-03-asdacsc-ransomware-profile-lockbit-3.0</loc>
  <lastmod>2023-09-06T15:28:40+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/about-asdacsc/who-we-are/ACSC-social-media-community</loc>
  <lastmod>2026-03-26T12:44:28+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/assessment-evaluation-programs/national-exercise-program</loc>
  <lastmod>2025-12-18T09:17:32+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/high-severity-vulnerability-present-in-microsoft-outlook-for-windows</loc>
  <lastmod>2026-01-06T12:01:25+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1.0</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/supply-chain-compromise-of-3cx-desktopapp</loc>
  <lastmod>2026-01-06T12:00:02+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>1.0</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/Improve-cyber-security-with-quad-cyber-challenge</loc>
  <lastmod>2025-12-18T09:03:04+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/shifting-the-balance-of-cybersecurity-risk</loc>
  <lastmod>2026-03-24T08:20:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/senior-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/quantum/planning-for-post-quantum-cryptography</loc>
  <lastmod>2026-03-27T13:19:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/joint-cybersecurity-secure-by-design-guide</loc>
  <lastmod>2026-02-19T15:49:21+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/operational-technology-environments/cyber-security-best-practices-for-smart-cities</loc>
  <lastmod>2026-02-20T10:47:42+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/joint-guide-cybersecurity-best-practices-smart-cities</loc>
  <lastmod>2026-02-19T15:48:05+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-threats/scams</loc>
  <lastmod>2025-12-05T13:46:27+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/privacy-awareness-week-2023</loc>
  <lastmod>2025-12-18T09:02:28+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/ditch-password-for-passphrases</loc>
  <lastmod>2025-12-18T09:02:17+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/widespread-exposure-vulnerability-cPanel</loc>
  <lastmod>2025-12-17T16:21:11+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/hunting-russian-intelligence-snake-malware-joint-advisory</loc>
  <lastmod>2026-02-19T15:43:53+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/hunting-russian-intelligence-snake-malware</loc>
  <lastmod>2026-03-24T10:30:13+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/important-vulnerabilities-in-microsofts-may-2023-security-update</loc>
  <lastmod>2023-09-06T14:47:06+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/stopransomware-bianlian-ransomware-group</loc>
  <lastmod>2026-02-19T16:30:24+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/prc-state-sponsored-cyber-actor-living-off-the-land-to-evade-detection</loc>
  <lastmod>2026-02-19T15:16:18+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/prc-state-sponsored-cyber-actor-living-off-the-land-to-evade-detection</loc>
  <lastmod>2026-02-19T15:51:00+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/prc-state-sponsored-cyber-actor-living-off-the-land-to-evade-detection</loc>
  <lastmod>2025-12-17T16:21:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-explained</loc>
  <lastmod>2025-09-09T05:53:36+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/thank-you</loc>
  <lastmod>2023-05-31T10:13:20+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/about-acsc/engagement-request</loc>
  <lastmod>2025-08-05T08:20:47+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/protecting-your-business-and-employees.png</image:loc>
   <image:caption>Protecting your business and employees</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/cyber-safety-and-security-in-sport</loc>
  <lastmod>2025-12-18T09:01:49+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-severity-vulnerability-fortinet-fortigate-ssl-vpn-devices</loc>
  <lastmod>2025-12-17T16:20:52+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/advisories/understanding-ransomware-threat-actors-lockbit</loc>
  <lastmod>2026-02-19T16:22:14+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/important-vulnerabilities-microsofts-june-2023-security-update</loc>
  <lastmod>2025-12-17T16:20:42+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-basics/explore-basics/small-business/educational-pack</loc>
  <lastmod>2026-03-12T15:41:05+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/small-business-guide-graphic.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/first-nations-graphic_0.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/exercise-in-a-box-graphic_0.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/essential-eight-graphic_0.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/revamped-guide-to-protect-australian-businesses-against-cyber-threats</loc>
  <lastmod>2025-12-18T09:01:39+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/learn-basics/explore-basics/seniors/educational-pack</loc>
  <lastmod>2026-03-12T14:27:28+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/Seniors%20guide%20-%20Graphic.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/question-graphic.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/laptop-lock-graphic_0.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/access-denied-graphic.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/proud-coder-graphic.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/mobile-pay-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/essential-eight-assessment-course</loc>
  <lastmod>2025-12-18T09:01:27+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-assessment-course</loc>
  <lastmod>2026-03-12T15:49:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/alerts/important-vulnerabilities-microsofts-july-2023-security-update</loc>
  <lastmod>2025-12-17T16:20:33+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/recover-from/business-email-compromise</loc>
  <lastmod>2026-03-16T08:33:17+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/email-compromise.png</image:loc>
   <image:caption>Email compromise</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/recover-from/data-breaches</loc>
  <lastmod>2025-12-18T09:10:51+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/recover-from/ransomware</loc>
  <lastmod>2026-03-16T08:37:27+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/Ransomware.png</image:loc>
   <image:caption>Ransomware</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/asdacsc-urges-victims-to-report-cybercrimes</loc>
  <lastmod>2025-12-18T09:01:18+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/citrix-products-netscaler-adc-and-netscaler-gateway-zero-day-vulnerability</loc>
  <lastmod>2025-12-17T16:20:22+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/vulnerability-ivanti-endpoint-manager-mobile-epmm</loc>
  <lastmod>2026-02-19T16:07:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/preventing-web-application-access-control-abuse</loc>
  <lastmod>2026-02-19T16:16:41+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/bislama</loc>
  <lastmod>2025-12-18T09:10:44+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/thai</loc>
  <lastmod>2025-12-18T09:10:36+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/newguineapidgin</loc>
  <lastmod>2025-12-18T09:10:28+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/french</loc>
  <lastmod>2025-12-18T09:10:18+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/gilbertese</loc>
  <lastmod>2025-12-18T09:10:11+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/malay</loc>
  <lastmod>2025-12-18T09:10:02+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/samoan</loc>
  <lastmod>2025-12-18T09:09:53+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/filipino</loc>
  <lastmod>2025-12-18T09:09:44+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/tetum</loc>
  <lastmod>2025-12-18T09:09:34+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/tongan</loc>
  <lastmod>2025-12-18T09:09:18+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/2022-top-routinely-exploited-vulnerabilities</loc>
  <lastmod>2026-03-23T16:17:06+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/lao</loc>
  <lastmod>2025-12-18T09:09:09+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/burmese</loc>
  <lastmod>2025-12-18T09:09:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/khmer</loc>
  <lastmod>2025-12-18T09:08:54+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/important-vulnerabilities-microsofts-august-2023-security-update</loc>
  <lastmod>2025-12-17T16:20:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/gateway-security-guidance-package/gateway-security-guidance-package-overview</loc>
  <lastmod>2025-12-18T08:21:39+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/ivanti-sentry-authentication-bypass-vulnerability</loc>
  <lastmod>2023-10-20T07:58:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/infamous-chisel</loc>
  <lastmod>2026-03-13T14:42:09+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/barracuda-email-security-gateway-esg-malicious-activity-additional-indicators-compromise-released</loc>
  <lastmod>2025-12-17T16:19:47+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/how-we-help-during-a-cyber-security-incident/supporting-australian-organisations-through-cyber-security-incident</loc>
  <lastmod>2025-12-18T09:08:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/how-the-acsc-can-help-during-a-cyber-security-incident</loc>
  <lastmod>2025-12-18T09:01:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-of-threats/account-compromise</loc>
  <lastmod>2025-12-17T15:57:14+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/recover-from/account-compromise</loc>
  <lastmod>2026-03-16T08:31:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/Business%20email%20compromise.png</image:loc>
   <image:caption>Business email compromise</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/shopping-and-banking-online.png</image:loc>
   <image:caption>Shopping and banking online</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/web-hardening.png</image:loc>
   <image:caption>Web hardening</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/recover-from/account-compromise/email</loc>
  <lastmod>2025-12-18T09:08:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/web-hardening.png</image:loc>
   <image:caption>Web hardening</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/shopping-and-banking-online.png</image:loc>
   <image:caption>Shopping and banking online</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/recover-from/account-compromise/bank</loc>
  <lastmod>2025-12-18T09:08:22+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/Business%20email%20compromise.png</image:loc>
   <image:caption>Business email compromise</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/web-hardening.png</image:loc>
   <image:caption>Web hardening</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/recover-from/account-compromise/other</loc>
  <lastmod>2025-12-18T09:08:14+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/shopping-and-banking-online.png</image:loc>
   <image:caption>Shopping and banking online</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/Business%20email%20compromise.png</image:loc>
   <image:caption>Business email compromise</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-protect-yourself-malware</loc>
  <lastmod>2026-03-13T11:56:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/secure-by-design-foundations</loc>
  <lastmod>2026-03-16T09:30:09+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/Cyber-Security-Awareness-Month-2023</loc>
  <lastmod>2025-12-18T09:00:58+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/important-vulnerabilities-microsoft-october-2023-security-update</loc>
  <lastmod>2025-12-17T16:19:37+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/cisco-ios-xe-software-web-ui-zero-day-vulnerability</loc>
  <lastmod>2025-12-17T16:19:27+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/asd-cyber-threat-report-july-2022-june-2023</loc>
  <lastmod>2026-03-11T15:16:25+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/news/microsofts-investment-in-australias-cyber-security</loc>
  <lastmod>2025-12-18T09:00:50+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-threats/quishing</loc>
  <lastmod>2026-03-16T11:32:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/multiple-vulnerabilities-atlassian-confluence-data-center-and-server</loc>
  <lastmod>2025-12-17T16:19:18+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/seeking-industry-feedback-on-new-asd-foundations-for-secure-by-design</loc>
  <lastmod>2025-12-18T09:00:39+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-translated-cyber-security-guides</loc>
  <lastmod>2025-12-18T09:00:28+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/shop-online-securely-this-holiday-season</loc>
  <lastmod>2025-12-18T09:00:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/business-continuity-in-a-box</loc>
  <lastmod>2026-03-11T15:44:05+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/business-continuity-in-a-box</loc>
  <lastmod>2025-12-18T09:00:09+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/commonwealth-cyber-security-posture-2023</loc>
  <lastmod>2026-03-16T10:31:04+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/2023-ASD-cyber-threat-report</loc>
  <lastmod>2025-12-18T08:59:56+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/securing-customer-personal-data</loc>
  <lastmod>2026-02-02T12:04:02+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/small-business-cyber-security/securing-customer-personal-data</loc>
  <lastmod>2025-12-18T08:59:40+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/stopransomware-lockbit-3.0-ransomware-affiliates-exploit-cve-2023-4966-citrix-bleed-vulnerability</loc>
  <lastmod>2026-02-19T15:12:49+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/artificial-intelligence/an-introduction-to-artificial-intelligence</loc>
  <lastmod>2026-03-16T11:14:23+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/an-introduction-to-artificial-intelligence</loc>
  <lastmod>2025-12-18T08:59:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/asds-cyber-security-frameworks/essential-eight/essential-eight-maturity-model-changes</loc>
  <lastmod>2026-03-12T16:13:27+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/november-2023-essential-eight-maturity-model-update</loc>
  <lastmod>2025-12-18T08:59:14+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/artificial-intelligence/guidelines-for-secure-ai-system-development</loc>
  <lastmod>2026-03-27T13:13:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/senior-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerabilities-owncloud-file-share</loc>
  <lastmod>2025-12-17T16:19:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/exploitation-unitronics-programmable-logic-controllers-plcs</loc>
  <lastmod>2026-01-06T11:44:52+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/the-case-for-memory-safe-roadmaps</loc>
  <lastmod>2026-03-24T08:15:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/case-for-memory-safe-roadmaps</loc>
  <lastmod>2026-02-19T15:44:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/serious-vulnerabilities-in-atlassian-products-including-confluence-jira-and-bitbucket</loc>
  <lastmod>2025-12-17T16:18:44+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/russian-fsb-cyber-actor-star-blizzard-continues-worldwide-spear-phishing-campaigns</loc>
  <lastmod>2026-02-20T10:27:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/vulnerability-planning/planning-for-critical-vulnerabilities-what-the-board-of-directors-needs-to-know</loc>
  <lastmod>2026-03-13T16:09:08+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerability-in-popular-java-framework-apache-struts-2</loc>
  <lastmod>2025-12-17T16:18:33+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/stopransomware-play-ransomware</loc>
  <lastmod>2026-02-19T16:18:54+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerabilities-ivanti-connect-secure-ics-and-ivanti-policy-secure-ips</loc>
  <lastmod>2025-12-17T16:18:24+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerabilities-in-gitlab-products</loc>
  <lastmod>2025-12-17T16:18:14+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-business-leaders/cyber-security-for-business-leaders/practical-cyber-security-tips-for-business-leaders</loc>
  <lastmod>2026-03-16T12:39:21+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/practical-cyber-security-tips-business-leaders</loc>
  <lastmod>2025-12-18T08:58:28+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/remote-code-execution-vulnerability-confluence-data-center-and-confluence-server</loc>
  <lastmod>2025-12-17T16:18:05+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/vulnerabilities-citrix-netscaler-adc-and-netscaler-gateway-products</loc>
  <lastmod>2025-12-17T16:17:53+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/cloud-computing/cloud-computing-security-for-executives</loc>
  <lastmod>2025-12-24T10:55:58+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-guidance-engaging-artificial-intelligence</loc>
  <lastmod>2025-12-18T08:58:02+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/artificial-intelligence/engaging-with-artificial-intelligence</loc>
  <lastmod>2026-03-23T14:35:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/cyber-sanction-imposed-russian-cybercriminal-2022-medibank-private-compromise</loc>
  <lastmod>2025-12-18T08:58:16+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/remote-code-execution-vulnerability-cisco-unified-communications-products</loc>
  <lastmod>2025-12-17T16:17:39+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/multiple-vulnerabilities-jenkins-products</loc>
  <lastmod>2025-12-17T16:17:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/prc-state-sponsored-actors-compromise-and-maintain-persistent-access-us-critical-infrastructure</loc>
  <lastmod>2026-03-23T14:27:50+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/identifying-and-mitigating-living-off-the-land-techniques</loc>
  <lastmod>2026-02-19T16:25:35+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerability-fortios</loc>
  <lastmod>2025-12-17T16:17:18+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/microsoft-office-outlook-remote-code-execution-vulnerability</loc>
  <lastmod>2025-12-17T16:17:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/cloud-computing/blueprint-for-secure-cloud</loc>
  <lastmod>2025-12-18T08:20:23+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/vulnerability-in-progress-kemp-products</loc>
  <lastmod>2025-12-17T16:16:57+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerability-connectwises-screenconnect</loc>
  <lastmod>2025-12-17T16:16:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/svr-cyber-actors-adapt-tactics-initial-cloud-access</loc>
  <lastmod>2026-03-27T12:20:16+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/threat-actors-exploit-multiple-vulnerabilities-ivanti-connect-secure-and-policy-secure-gateways</loc>
  <lastmod>2026-02-19T16:25:14+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/staying-secure-online/cyber-security-for-charities-and-not-for-profits</loc>
  <lastmod>2026-02-02T12:07:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Icon.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2025-09/cyber-health-check-tool_0.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/cyber-security-charities-and-not-for-profit-organisations</loc>
  <lastmod>2025-12-18T08:57:51+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/prc-state-sponsored-cyber-activity_actions-for-critical-infrastructure-leaders</loc>
  <lastmod>2026-03-24T07:58:24+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-fact-sheet-critical-infrastructure-leaders-actions-mitigate-prc-state-sponsored-cyber-activity</loc>
  <lastmod>2026-03-13T15:52:11+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/join-the-cyber-threat-intelligence-sharing-service-through-sentinel</loc>
  <lastmod>2025-12-18T08:57:03+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerability-affecting-fortinets-forticlientems</loc>
  <lastmod>2025-12-17T16:16:35+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-secure-your-device/antivirus-software</loc>
  <lastmod>2025-12-18T09:07:30+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/legacy-technology-management/managing-the-risks-of-legacy-it-practitioner-guidance</loc>
  <lastmod>2026-03-18T10:32:33+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/legacy-technology-management/managing-the-risks-of-legacy-it-executive-guidance</loc>
  <lastmod>2026-03-18T10:31:28+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/staying-secure-online/connecting-to-public-wi-fi</loc>
  <lastmod>2025-12-18T09:07:22+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/os-command-injection-vulnerability-in-globalprotect-gateway</loc>
  <lastmod>2025-12-17T16:16:21+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/artificial-intelligence/deploying-ai-systems-securely</loc>
  <lastmod>2026-03-27T13:10:26+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-secure-your-device/secure-your-user-account</loc>
  <lastmod>2025-12-23T16:07:04+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-back-up-your-files-and-devices</loc>
  <lastmod>2026-03-16T12:00:34+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-update-your-device-and-software</loc>
  <lastmod>2025-12-18T09:06:54+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-accounts/multi-factor-authentication</loc>
  <lastmod>2026-03-11T13:43:50+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/resources-protect-yourself/protecting-your-family</loc>
  <lastmod>2026-03-16T12:16:08+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/user-education.png</image:loc>
   <image:caption>User education</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/translated-information-Icon-non-reuse.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/Report.png</image:loc>
   <image:caption>Report</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-10/NASC_Scamwatch_logo.png</image:loc>
   <image:caption>National Anti-Scam Centre - Scamwatch </image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/OAIC-logo_0.png</image:loc>
   <image:caption>Australian Government, Office of the Australian Information Commissioner</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2024-05/ThinkUKnow_logo.png</image:loc>
   <image:caption>Think U Know</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/protecting-your-family.png</image:loc>
   <image:caption>Protecting your family</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/translated/japanese</loc>
  <lastmod>2025-12-18T09:06:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/staying-secure-online/protecting-your-family/protect-yourself-online</loc>
  <lastmod>2026-03-13T16:20:31+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/Report.png</image:loc>
   <image:caption>Report</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/Mother%20and%20daughter%201.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/staying-secure-online/protecting-your-family/protect-your-children-online</loc>
  <lastmod>2026-03-13T16:21:05+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/eating-pizza-graphic_0.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/exploitation-vulnerabilities-affecting-cisco-firewall-platforms</loc>
  <lastmod>2025-12-17T16:16:12+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-cyber-security-advice-for-families</loc>
  <lastmod>2025-12-18T08:56:33+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/australias-second-ever-cyber-sanction-imposed</loc>
  <lastmod>2025-12-18T08:56:09+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/choosing-secure-and-verifiable-technologies</loc>
  <lastmod>2026-03-27T13:12:23+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-business-leaders/cyber-security-for-business-leaders/ten-things-to-know-about-data-security</loc>
  <lastmod>2026-03-11T16:33:34+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/safeguard-your-business-cyber-threats-australian-signals-directorate</loc>
  <lastmod>2025-12-18T08:56:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-secure-design-publication-released-collaboration-international-partners</loc>
  <lastmod>2025-12-18T08:32:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/CVE-2024-24919-check-point-security-gateway-information-disclosure</loc>
  <lastmod>2025-12-17T16:16:05+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/update-your-small-business-cyber-security</loc>
  <lastmod>2024-06-12T08:04:15+10:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-secure-design-publication-about-memory-safety-released</loc>
  <lastmod>2026-02-19T16:08:31+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/exploring-memory-safety-in-critical-open-source-projects</loc>
  <lastmod>2026-03-23T14:36:35+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/prc-state-sponsored-cyber-group-apt40s-expanding-tradecraft-and-tactics</loc>
  <lastmod>2026-02-19T16:22:59+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/apt40-advisory-prc-mss-tradecraft-in-action</loc>
  <lastmod>2026-03-23T14:26:19+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/graphic-upload.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/widespread-outages-relating-crowdstrike-software-update</loc>
  <lastmod>2025-12-17T16:15:57+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/resources-protect-yourself/security-tips-travelling</loc>
  <lastmod>2026-03-16T09:51:28+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-04/hybh_icon.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-06/file-analysis-graphic_0.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2024-07/smart-traveller-logo.png</image:loc>
   <image:caption>smarttraveller.gov.au</image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/staying-secure-online/security-tips-remote-working</loc>
  <lastmod>2026-03-16T12:28:10+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/staying-secure-online/connecting-others-online/secure-your-social-media</loc>
  <lastmod>2025-12-18T09:05:14+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-07/ACSC_Web%20banner_Report%20and%20Recover%20PNG.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/esafety-commossioner-logo.png</image:loc>
   <image:caption>eSafety Commissioner</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-10/NASC_Scamwatch_logo.png</image:loc>
   <image:caption>National Anti-Scam Centre - Scamwatch </image:caption>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/secure-design-foundations</loc>
  <lastmod>2025-12-18T08:31:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/best-practices-event-logging-and-threat-detection</loc>
  <lastmod>2026-03-24T08:06:00+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/event-logging/best-practices-for-event-logging-and-threat-detection</loc>
  <lastmod>2026-02-20T08:59:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/email-scammers-impersonating-asds-acsc</loc>
  <lastmod>2025-12-17T16:15:50+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/silent-heist-cybercriminals-use-information-stealer-malware-compromise-corporate-networks</loc>
  <lastmod>2026-02-24T15:18:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/graphic-upload.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/the-silent-heist-info-stealer-malware-used-to-compromise-corporate-networks</loc>
  <lastmod>2025-12-18T08:31:13+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/russian-military-cyber-actors-target-us-and-global-critical-infrastructure</loc>
  <lastmod>2026-03-23T14:29:11+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-joint-advisory-on-russian-military-cyber-tactics-released</loc>
  <lastmod>2026-03-23T14:33:52+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/ransomware-playbook</loc>
  <lastmod>2026-03-16T08:21:11+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/peoples-republic-china-linked-actors-compromise-routers-and-iot-devices-botnet-operations</loc>
  <lastmod>2026-03-23T15:17:35+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-joint-advisory-prc-botnet-operations-released</loc>
  <lastmod>2026-02-19T15:45:40+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerability-ivanti-csa-46-cloud-services-appliance</loc>
  <lastmod>2025-12-17T16:15:41+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/detecting-and-mitigating-active-directory-compromises</loc>
  <lastmod>2026-03-27T13:15:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-guidance-detecting-and-mitigating-active-directory-compromises</loc>
  <lastmod>2025-12-18T08:30:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/cyber-security-awareness-month-2024</loc>
  <lastmod>2025-12-18T08:30:36+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/operational-technology-environments/principles-of-operational-technology-cyber-security</loc>
  <lastmod>2026-03-27T13:07:37+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/cyber-security-operational-technology</loc>
  <lastmod>2025-12-18T08:30:28+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/network-hardening/securing-edge-devices/mitigation-strategies-for-edge-devices-executive-guidance</loc>
  <lastmod>2026-03-27T12:33:49+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/iranian-cyber-actors-brute-force-and-credential-access-activity-compromises-critical-infrastructure</loc>
  <lastmod>2026-02-19T16:26:21+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/iranian-based-cyber-actors-compromising-critical-infrastructure-networks</loc>
  <lastmod>2026-03-23T15:14:12+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/vulnerability-in-fortinets-fortimanager</loc>
  <lastmod>2025-12-17T16:15:33+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/safe-software-deployment-how-software-manufacturers-can-ensure-reliability-for-customers</loc>
  <lastmod>2026-03-24T08:08:55+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-guidance-software-and-service-manufacturers-deploying-system-updates</loc>
  <lastmod>2025-12-18T08:30:12+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/introduction-legislative-change-limited-use-obligation</loc>
  <lastmod>2025-12-18T08:30:04+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/annual-cyber-threat-report-2023-2024</loc>
  <lastmod>2025-12-17T16:10:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/australian-signals-directorate-releases-the-annual-cyber-threat-report-2023-24</loc>
  <lastmod>2025-12-18T08:29:56+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/small-business-cyber-security/small-business-hub/small-business-cloud-security-guides/small-business-cloud-security-guides-google-chromebook-and-chromos-security-guide</loc>
  <lastmod>2026-03-16T10:11:38+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/2023-top-routinely-exploited-vulnerabilities</loc>
  <lastmod>2026-02-19T16:32:09+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-secure-your-devices/secure-your-microsoft-windows-device</loc>
  <lastmod>2026-03-16T12:23:05+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-secure-your-devices/secure-your-apple-macos-device</loc>
  <lastmod>2026-03-16T12:21:45+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-secure-your-devices/secure-your-nas-device</loc>
  <lastmod>2026-03-16T11:04:59+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/enhanced-visibility-and-hardening-guidance-communications-infrastructure</loc>
  <lastmod>2026-03-23T16:23:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/cyber-threat-actors-compromising-networks-major-global-telecommunications-providers</loc>
  <lastmod>2025-12-18T08:29:49+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/how-we-help-during-a-cyber-security-incident/limited-use</loc>
  <lastmod>2025-12-18T09:04:11+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/commonwealth-cyber-security-posture-2024</loc>
  <lastmod>2026-03-16T10:32:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/choosing-secure-and-verifiable-technologies-executive-guidance</loc>
  <lastmod>2026-03-27T13:20:55+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/do-you-purchase-technology-your-organisation</loc>
  <lastmod>2025-12-18T08:29:39+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-security-vulnerabilities-affecting-mitel-micollab-version-98-sp1-fp2-981201-and-earlier-versions</loc>
  <lastmod>2025-12-17T16:15:26+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/limited-use-obligation-now-law</loc>
  <lastmod>2025-12-18T08:29:31+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/report-and-recover/how-we-help-during-a-cyber-security-incident/asds-role-in-cyber-security-for-legal-practitioners</loc>
  <lastmod>2025-12-18T09:04:02+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-security-vulnerability-affecting-apache-struts2-below-6-4-0</loc>
  <lastmod>2025-12-17T16:15:14+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerabilities-ivanti-connect-secure-ivanti-policy-secure-and-ivanti-neurons-zta-gateways</loc>
  <lastmod>2025-12-17T16:15:06+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/operational-technology-environments/secure-by-demand</loc>
  <lastmod>2026-03-27T13:08:31+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-secure-by-demand-guidance-available-operational-technology-owners-and-operators</loc>
  <lastmod>2025-12-18T08:29:23+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/fortios-fortiproxy-authentication-bypass-nodejs-websocket-module-vulnerability</loc>
  <lastmod>2025-12-17T16:14:57+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/publications/bulletproof-hosting-providers</loc>
  <lastmod>2026-02-23T12:04:32+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/graphic-upload.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/bulletproof-hosting-providers-are-not-so-bulletproof</loc>
  <lastmod>2025-12-18T08:29:16+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/artificial-intelligence/content-credentials-strengthening-multimedia-integrity-in-the-generative-ai-era</loc>
  <lastmod>2026-03-24T08:54:55+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/using-content-credentials-to-help-mitigate-cyber-threats-associated-with-generative-AI</loc>
  <lastmod>2025-12-18T08:29:08+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/network-hardening/securing-edge-devices/mitigation-strategies-for-edge-devices-practitioner-guidance</loc>
  <lastmod>2026-03-27T13:37:27+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/network-hardening/securing-edge-devices/guidance-on-digital-forensics-and-protective-monitoring-specifications-for-producers-of-network-devices-and-appliances</loc>
  <lastmod>2026-03-27T13:18:16+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/network-hardening/securing-edge-devices/security-considerations-for-edge-devices</loc>
  <lastmod>2026-02-20T09:43:35+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/are-your-organisations-edge-devices-secure</loc>
  <lastmod>2025-12-18T08:28:59+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture/foundations-for-modern-defensible-architecture</loc>
  <lastmod>2026-03-12T16:23:36+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/new-zero-trust-guidance-seeking-industry-feedback</loc>
  <lastmod>2025-12-18T08:28:51+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture</loc>
  <lastmod>2025-12-18T08:16:58+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/abstract-graphic.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/working-graphic.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/logic-graphic.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/further-cyber-sanctions-in-response-to-medibank-private-cyber-attack</loc>
  <lastmod>2026-03-16T12:20:05+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/increase-in-denial-of-service-attacks-against-australian-organisations</loc>
  <lastmod>2026-01-06T10:55:55+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/updates-to-asds-blueprint-for-secure-cloud</loc>
  <lastmod>2025-12-18T08:28:35+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/nextjs-authentication-bypass-vulnerability-cve-2025-29927</loc>
  <lastmod>2025-12-17T16:14:49+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerabilities-ingress-nginx-controller-kubernetes</loc>
  <lastmod>2025-12-17T16:14:40+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/fast-flux-national-security-threat</loc>
  <lastmod>2026-02-19T16:22:36+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/are-you-protected-against-fast-flux</loc>
  <lastmod>2026-03-23T14:37:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/Pulse-Ivanti-Connect-Secure-Policy-Secure-and-Neurons-for-ZTA-gateways</loc>
  <lastmod>2025-12-17T16:14:32+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/badbazaar-and-moonshine-spyware-targeting-uyghur-taiwanese-and-tibetan-groups-and-civil-society-actors</loc>
  <lastmod>2026-03-23T15:03:48+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/graphic-upload.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/badbazaar-and-moonshine-technical-analysis-and-mitigations</loc>
  <lastmod>2026-03-23T15:05:04+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/graphic-upload.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/malicious-cyber-actors-using-spyware-to-target-individuals-personal-data</loc>
  <lastmod>2026-03-23T14:32:28+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/Exploitation-of-Existing-Fortinet-Vulnerabilities</loc>
  <lastmod>2025-12-17T16:14:26+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/multiple-vulnerabilities-in-ivanti-endpoint-manager-mobile</loc>
  <lastmod>2026-02-19T16:06:31+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/network-hardening/geo-blocking-in-context-realities-risks-and-recommendations</loc>
  <lastmod>2026-02-02T11:49:31+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/artificial-intelligence/convoluted-layers-an-artificial-intelligence-primer</loc>
  <lastmod>2026-03-11T15:07:03+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/russian-gru-targeting-western-logistics-entities-and-technology-companies</loc>
  <lastmod>2026-02-19T16:17:30+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/russian-gru-targeting-western-logistics-entities-and-technology-companies</loc>
  <lastmod>2026-02-19T16:17:08+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/artificial-intelligence/ai-data-security</loc>
  <lastmod>2026-03-24T08:22:27+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-joint-advice-on-artificial-intelligence-data-security</loc>
  <lastmod>2025-12-18T08:28:01+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-advice-on-implementing-siem-soar-platforms-in-your-organisation</loc>
  <lastmod>2025-12-18T08:27:39+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/event-logging/implementing-siem-soar-platforms/implementing-siem-and-soar-platforms-executive-guidance</loc>
  <lastmod>2026-03-13T14:33:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/event-logging/implementing-siem-soar-platforms/priority-logs-for-siem-ingestion-practitioner-guidance</loc>
  <lastmod>2025-12-18T08:13:52+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/event-logging/implementing-siem-soar-platforms/implementing-siem-and-soar-platforms-practitioner-guidance</loc>
  <lastmod>2026-03-13T14:34:24+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/event-logging/implementing-siem-and-soar-platforms</loc>
  <lastmod>2025-12-18T09:03:54+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/system-and-network-attacks.png</image:loc>
   <image:caption>System and network attacks</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/publications-icon.png</image:loc>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/system-administration.png</image:loc>
  </image:image>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-threats/social-engineering</loc>
  <lastmod>2026-03-16T10:13:08+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerabilities-citrix-netscaler-adc-and-netscaler-gateway-products</loc>
  <lastmod>2025-12-17T16:14:10+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/protect-yourself/securing-your-devices/how-secure-your-devices/introduction-to-connected-vehicles</loc>
  <lastmod>2025-12-18T09:03:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/consider-your-cyber-hygiene-light-global-events</loc>
  <lastmod>2026-03-11T16:13:05+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-guidance-small-businesses-protect-your-devices-and-accounts</loc>
  <lastmod>2025-12-18T08:27:20+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/threats/types-threats/malware/information-stealer-malware</loc>
  <lastmod>2025-10-14T15:25:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/vulnerability-microsoft-office-sharepoint-server-products</loc>
  <lastmod>2026-02-19T15:52:30+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/scattered-spider</loc>
  <lastmod>2026-02-19T15:11:43+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/joint-advisory-released-recent-activity-scattered-spider-threat-actors</loc>
  <lastmod>2026-03-23T14:31:44+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-asset-inventory-guidance-operational-technology-ot-owners-and-operators</loc>
  <lastmod>2025-12-18T08:26:25+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/operational-technology-environments/foundations-for-ot-cybersecurity-asset-inventory-guidance-for-owners-and-operators</loc>
  <lastmod>2026-03-12T16:24:38+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/managing-cryptographic-keys-and-secrets</loc>
  <lastmod>2026-03-13T15:06:00+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-protect-your-cryptographic-keys-and-secrets-from-malicious-cyber-actors</loc>
  <lastmod>2025-12-18T08:26:11+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/countering-chinese-state-sponsored-actors-compromise-of-networks-worldwide-to-feed-global-espionage-system</loc>
  <lastmod>2026-02-19T16:30:52+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/Multiple-vulnerabilities-affecting-NetScaler-ADC-and-NetScaler-Gateway-devices</loc>
  <lastmod>2025-12-17T16:13:52+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-advisory-prc-state-sponsored-actors-compromise-networks-worldwide-to-feed-global-espionage-system</loc>
  <lastmod>2026-02-20T10:58:04+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/system-hardening/hardening-microsoft-windows-10-workstations</loc>
  <lastmod>2026-03-13T11:18:48+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/supplier-cyber-risk-management/managing-cyber-supply-chains/shared-vision-of-software-bill-of-materials-for-cybersecurity</loc>
  <lastmod>2026-03-24T08:14:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-guidance-on-integrating-a-software-bill-of-materials</loc>
  <lastmod>2025-12-18T08:25:51+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/ongoing-active-exploitation-of-sonicwall-ssl-vpns-in-australia</loc>
  <lastmod>2025-12-17T16:13:44+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/ongoing-targeting-of-online-code-repositories</loc>
  <lastmod>2026-04-01T11:41:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/stay-ahead-of-the-quantum-threat-with-post-quantum-cryptography</loc>
  <lastmod>2025-12-18T08:25:43+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/multiple-vulnerabilities-affecting-cisco-asa-5500-x-series-devices</loc>
  <lastmod>2025-12-17T16:13:25+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/take-action-this-cyber-security-awareness-month</loc>
  <lastmod>2025-12-18T08:25:34+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerability-in-oracle-e-business-suite</loc>
  <lastmod>2026-04-02T11:41:31+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/annual-cyber-threat-report-2024-2025</loc>
  <lastmod>2026-01-07T14:37:04+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news-and-media/australian-signals-directorate-releases-annual-cyber-threat-report-2024-25</loc>
  <lastmod>2025-12-18T08:25:17+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/operational-technology-environments/ci-fortify</loc>
  <lastmod>2025-12-18T08:12:32+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/view-all-content/news/new-guidance-to-help-fortify-australias-critical-infrastructure</loc>
  <lastmod>2025-12-18T08:25:25+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/network-hardening/mitigations-for-network-defence</loc>
  <lastmod>2026-01-30T13:49:40+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-guidance-for-organisations-to-strengthen-their-network-infrastructure</loc>
  <lastmod>2025-12-18T08:25:08+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/artificial-intelligence/artificial-intelligence-and-machine-learning-supply-chain-risks-and-mitigations</loc>
  <lastmod>2026-03-24T08:21:13+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/artificial-intelligence-and-machine-learning-pose-new-cyber-security-risks-to-supply-chains</loc>
  <lastmod>2025-12-18T08:25:00+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/Multiple-high-severity-vulnerabilities-in-F5-products-and-incident-impacting-F5</loc>
  <lastmod>2025-12-17T16:13:00+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/cloud-computing/cloud-shared-responsibility-model-guidance-for-individuals-and-small-and-medium-businesses</loc>
  <lastmod>2025-12-18T08:11:59+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/cloud-computing/cloud-shared-responsibility-model-executive-guidance</loc>
  <lastmod>2025-12-18T08:11:51+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/you-cant-outsource-risk-advice-for-using-cloud-services</loc>
  <lastmod>2025-12-18T08:24:51+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture/modern-defensible-architecture-for-senior-decision-makers</loc>
  <lastmod>2025-12-18T08:11:41+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/secure-by-design/modern-defensible-architecture/investing-in-modern-defensible-architecture</loc>
  <lastmod>2025-12-18T08:11:21+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/understand-and-invest-in-modern-defensible-architecture-now</loc>
  <lastmod>2025-12-18T08:24:26+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerability-in-Microsoft-Windows-Server-Update-Service</loc>
  <lastmod>2025-12-17T16:12:45+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/operational-technology-environments/creating-and-maintaining-a-definitive-view-of-your-operational-technology-architecture</loc>
  <lastmod>2026-03-27T13:20:11+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-guidance-to-create-and-maintain-a-definitive-view-of-your-organisations-operational-technology-architecture</loc>
  <lastmod>2025-12-18T08:24:15+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/system-hardening/microsoft-exchange-server-security-best-practices</loc>
  <lastmod>2026-03-13T15:20:04+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-guidance-to-strengthen-microsoft-exchange-server-security</loc>
  <lastmod>2026-03-23T14:36:03+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/building-a-cyber-secure-australia-a-fireside-chat</loc>
  <lastmod>2025-12-18T08:23:57+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/building-stronger-supply-chains-through-collaboration-a-fireside-chat</loc>
  <lastmod>2025-12-18T08:23:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-business-leaders/cyber-security-for-business-leaders/cyber-security-priorities-for-boards-of-directors-2025-26</loc>
  <lastmod>2025-12-18T08:10:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/badcandy</loc>
  <lastmod>2025-12-17T15:43:21+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/building-cyber-capability-and-resilience-across-the-asia-pacific-region</loc>
  <lastmod>2025-12-18T08:23:38+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/scammers-impersonating-police-to-target-victims-for-cryptocurrencyseed-wallet-theft</loc>
  <lastmod>2025-12-17T16:12:36+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/view-all-content/news/exercise-cyber-arrow</loc>
  <lastmod>2025-12-18T08:23:29+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/protecting-devices-systems/hardening-systems-applications/network-hardening/bulletproof-defense-mitigating-risks-from-bulletproof-hosting-providers</loc>
  <lastmod>2026-02-19T16:24:52+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-guidance-for-mitigating-risks-from-bulletproof-hosting-providers</loc>
  <lastmod>2025-12-18T08:23:21+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/operational-technology-environments/principles-for-the-secure-integration-of-artificial-intelligence-in-operational-technology</loc>
  <lastmod>2026-02-19T16:23:27+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-guidance-for-critical-infrastructure-on-integrating-ai-securely-into-operational-technology-environments</loc>
  <lastmod>2025-12-18T08:23:12+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerability-in-react-server-components-cve-2025-55182</loc>
  <lastmod>2025-12-04T13:07:51+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/information-stealers-are-on-the-rise-are-you-at-risk</loc>
  <lastmod>2025-12-18T08:23:03+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/joint-advisory-released-on-pro-russia-hacktivists-conducting-attacks-against-critical-infrastructure</loc>
  <lastmod>2026-03-23T14:31:07+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/pro-russia-hacktivists-conduct-opportunistic-attacks-against-us-and-global-critical-infrastructure</loc>
  <lastmod>2026-02-06T11:59:34+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerabilities-in-multiple-fortinet-products-forticloud-sso-login-authentication-bypass</loc>
  <lastmod>2025-12-17T16:12:25+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/quantum/quantum-technology-primer-overview</loc>
  <lastmod>2026-03-18T09:06:57+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-publication-released-quantum-technology-primer-overview</loc>
  <lastmod>2025-12-15T09:52:34+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/artificial-intelligence/artificial-intelligence-for-small-business</loc>
  <lastmod>2026-01-14T08:10:42+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-vulnerability-in-watchguard-firebox-devices-cve-2025-14733</loc>
  <lastmod>2025-12-22T16:58:39+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/vulnerability-in-mongodb-product-mongodb-server-leak</loc>
  <lastmod>2026-01-05T16:24:56+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/critical-unauthenticated-remote-code-execution-vulnerability-in-n8n-workflow-automation-platform</loc>
  <lastmod>2026-01-08T15:10:53+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-publication-to-help-small-businesses-manage-cyber-security-risks-from-AI</loc>
  <lastmod>2026-01-14T08:12:37+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/operational-technology-environments/secure-connectivity-principles-for-operational-technology</loc>
  <lastmod>2026-03-24T08:23:59+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/new-ot-connectivity-principles-set-a-higher-security-bar-for-organisations</loc>
  <lastmod>2026-01-15T08:28:35+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/a-fireside-chat-with-australias-big-4-banks</loc>
  <lastmod>2026-01-23T09:18:39+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/reports-and-statistics/the-commonwealth-cyber-security-posture-in-2025</loc>
  <lastmod>2026-02-12T09:42:32+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/progress-ongoing-to-improve-the-australian-governments-cyber-resilience</loc>
  <lastmod>2026-02-12T09:46:02+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/quantum/quantum-technology-primer-computing</loc>
  <lastmod>2026-03-18T09:07:30+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/quantum-technology-primer-series-quantum-computing</loc>
  <lastmod>2026-02-19T08:37:41+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/detecting-responding-to-threats/cyber-security-incident-response/azul-malware-analysis-tool</loc>
  <lastmod>2026-02-24T09:07:35+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/explore-analyse-and-correlate-malware-at-scale-with-azul</loc>
  <lastmod>2026-02-24T09:07:48+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/exploitation-of-cisco-sd-wan-appliances</loc>
  <lastmod>2026-03-06T17:42:57+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/inc-ransom-affiliate-model-enabling-targeting-of-critical-networks</loc>
  <lastmod>2026-03-23T15:01:49+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/inc-ransom-and-affiliate-network-operating-in-australia-new-zealand-and-the-pacific-island-states</loc>
  <lastmod>2026-03-23T14:30:24+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/third-release-in-our-quantum-technology-primer-series-communications</loc>
  <lastmod>2026-03-18T09:04:26+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/quantum/quantum-technology-primer-communications</loc>
  <lastmod>2026-03-19T11:31:46+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/business-government/secure-design/securing-space</loc>
  <lastmod>2026-03-25T08:58:33+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/view-all-content/news/securing-space-cyber-security-for-leo-satcom</loc>
  <lastmod>2026-03-25T08:59:11+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
 </url>
 <url>
  <loc>https://www.cyber.gov.au/about-us/work-with-us</loc>
  <lastmod>2026-03-30T12:25:02+11:00</lastmod>
  <changefreq>monthly</changefreq>
  <priority>0.5</priority>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-02/A%20%28Become%20a%20partner%29.png</image:loc>
   <image:caption>Become a Partner</image:caption>
  </image:image>
  <image:image>
   <image:loc>https://www.cyber.gov.au/sites/default/files/2023-03/governance.png</image:loc>
   <image:caption>Governance</image:caption>
  </image:image>
 </url>
</urlset>
