<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.eset.ie/2025/01/23/the-evolving-landscape-of-data-privacy-key-trends-to-shape-2025/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1080x1080-7.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1920x1080-6.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2025-01-23T12:06:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/07/press-clippings-2025/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/techbuzzireland.com-22.01.2025.jpg</image:loc><image:title>Techbuzzireland.com 22.01.2025</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/it.ie-08.01.2025.jpg</image:loc><image:title>IT.ie 08.01.2025</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/irish-tech-news-17.01.2025.jpg</image:loc><image:title>Irish Tech News 17.01.2025</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/the-irish-times-16.01.2025.jpg</image:loc><image:title>The Irish Times 16.01.2025</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/the-irish-sun-06.01.2025.jpg</image:loc><image:title>The Irish Sun 06.01.2025</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/msn-ireland-06.01.2025.jpg</image:loc><image:title>MSN Ireland 06.01.2025</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/clippingsesetie.webp</image:loc><image:title>clippingsesetie</image:title></image:image><lastmod>2025-01-23T09:34:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/22/eset-discovers-new-apt-group-and-its-supply-chain-attack-on-south-korean-vpn-service/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1080x1080-6.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1920x1080-5.jpg</image:loc><image:title>1920x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-01-22T09:53:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/21/under-lock-and-key-protecting-corporate-data-from-cyberthreats-in-2025/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1080x1080-5.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1920x1080-4.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2025-01-21T12:05:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/16/europe-prepared-strategy-to-protect-hospitals-from-cyberattacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/health.jpg</image:loc><image:title>health</image:title></image:image><lastmod>2025-01-16T11:05:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/16/eset-research-discovers-uefi-secure-boot-bypass-vulnerability/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1080x1080-4.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1920x1080-3.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2025-01-16T10:28:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/15/cybersecurity-and-ai-what-does-2025-have-in-store/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/ai2025-1080x1080-1.jpg</image:loc><image:title>ai2025-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/ai2025-1920x1080-1.jpg</image:loc><image:title>ai2025-1920x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2025-01-15T11:12:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/15/uk-ministers-consider-banning-public-bodies-from-making-ransomware-payments/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/ransom.jpg</image:loc><image:title>ransom</image:title></image:image><lastmod>2025-01-15T10:43:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/14/protecting-children-online-where-floridas-new-law-falls-short/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1080x1080-3.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1920x1080-2.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2025-01-14T10:32:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/13/phishing-messages-deceive-apple-imessage-users-into-turning-off-protection/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/apple_iphone.jpg</image:loc><image:title>Apple_Iphone</image:title></image:image><lastmod>2025-01-13T10:16:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/10/is-your-child-dealing-with-excessive-internet-use/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/internetkids2.jpg</image:loc><image:title>InternetKids2</image:title></image:image><lastmod>2025-01-10T10:55:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/09/crypto-is-soaring-but-so-are-threats-heres-how-to-keep-your-wallet-safe/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1080x1080-2.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1920x1080-1.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2025-01-09T12:28:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/08/apt-groups-are-increasingly-deploying-ransomware-and-thats-bad-news-for-everyone/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1080x1080-1.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1920x1080.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2025-01-08T10:12:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/07/ai-moves-to-your-pc-with-its-own-special-hardware/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/ai-move-1080x1080-1.jpg</image:loc><image:title>ai-move-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/ai-move-1920x1080-1.jpg</image:loc><image:title>ai-move-1920x1080</image:title></image:image><lastmod>2025-01-07T11:15:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/06/eset-research-podcast-telekopye-again/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/podcast-1080x1080-1.png</image:loc><image:title>podcast-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/podcast-1920x1080-1.jpg</image:loc><image:title>podcast-1920x1080</image:title></image:image><lastmod>2025-01-06T11:32:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2025/01/03/eset-unveils-further-innovation-for-intel-powered-ai-pcs/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1080x1080.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2025/01/1300x736.jpg</image:loc><image:title>1300x736</image:title></image:image><lastmod>2025-01-03T10:56:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/19/can-ai-systems-be-socially-engineered/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/ai-systems-social-engineering.jpeg</image:loc><image:title>ai-systems-social-engineering</image:title></image:image><lastmod>2024-12-19T11:12:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/19/hacking-a-car-or-rather-its-infotainment-system/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/car-hacking-infotainment.jpeg</image:loc><image:title>car-hacking-infotainment</image:title></image:image><lastmod>2024-12-19T11:04:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/18/cybersecurity-is-never-out-of-office-protecting-your-business-anytime-anywhere/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/oooffice-1080x1080-1.jpg</image:loc><image:title>oooffice-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/oooffice-1920x1080-1.jpg</image:loc><image:title>oooffice-1920x1080</image:title></image:image><lastmod>2024-12-18T10:40:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/18/delivering-business-security-with-extended-prevention/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/1080x1080.jpg</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/1300x736.jpg</image:loc><image:title>1300x736</image:title></image:image><lastmod>2024-12-18T10:24:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/11/press-clippings-2024/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/it.ie-03.09.2024.jpg</image:loc><image:title>IT.ie 03.09.2024</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/it.ie-16.10.2024.jpg</image:loc><image:title>IT.ie 16.10.2024</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/it.ie-16.12.2024.jpg</image:loc><image:title>IT.ie 16.12.2024</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/the-irish-sun-13.12.2024.jpg</image:loc><image:title>The Irish Sun 13.12.2024</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/the-irish-sun-09.12.2024.jpg</image:loc><image:title>The Irish Sun 09.12.2024</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/the-kilkenny-observer-06.12.2024b.jpg</image:loc><image:title>The Kilkenny Observer 06.12.2024b</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/the-kilkenny-observer-06.12.2024.jpg</image:loc><image:title>The Kilkenny Observer 06.12.2024</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/irish-tech-news-29.11.2024.jpg</image:loc><image:title>Irish Tech News 29.11.2024</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/msn-ireland-27.11.2024.jpg</image:loc><image:title>MSN Ireland 27.11.2024</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/the-irish-sun-26.11.2024.jpg</image:loc><image:title>The Irish Sun 26.11.2024</image:title></image:image><lastmod>2024-12-17T11:46:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/17/eset-threat-report-h2-2024/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/eset-threat-report-h2-2024.jpeg</image:loc><image:title>eset-threat-report-h2-2024</image:title></image:image><lastmod>2024-12-17T11:14:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/17/nearly-800-arrested-over-nigerian-crypto-romance-scam/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/cryptrom1.jpg</image:loc><image:title>cryptrom1</image:title></image:image><lastmod>2024-12-17T10:56:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/12/the-12-scams-of-christmas-2024/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/itie3b.jpg</image:loc><image:title>ITIE3b</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/itie3.jpg</image:loc><image:title>ITIE3</image:title></image:image><lastmod>2024-12-12T11:51:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/11/how-cyber-secure-is-your-business/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/cybersecure.jpg</image:loc><image:title>cybersecure</image:title></image:image><lastmod>2024-12-11T11:07:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/10/phishers-impersonating-police-arrested-in-multi-million-euro-scam/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/phishing4.jpeg</image:loc><image:title>phishing4</image:title></image:image><lastmod>2024-12-10T12:14:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/09/are-pre-owned-smartphones-safe-how-to-choose-a-second-hand-phone-and-avoid-security-risks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/1080x1080.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/1920x1080.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-12-09T11:46:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/06/kathryn-thornton-correcting-hubbles-vision/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/thorn2.jpg</image:loc><image:title>Thorn2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/thorn3.jpg</image:loc><image:title>Thorn3</image:title></image:image><lastmod>2024-12-06T12:34:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/05/philip-torr-ai-to-the-people/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/torr2.jpg</image:loc><image:title>Torr2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/torr3.jpg</image:loc><image:title>Torr3</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/torr1.jpg</image:loc><image:title>Torr1</image:title></image:image><lastmod>2024-12-05T12:26:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/04/screentime-as-a-reward-should-parents-use-it-or-lose-it/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/eset_sko_social_1080x1080_rethink-the-rewards.jpg</image:loc><image:title>ESET_SKO_Social_1080x1080_Rethink the rewards</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/eset_sko_social_1200x628_rethink-the-rewards.jpg</image:loc><image:title>ESET_SKO_Social_1200x628_Rethink the rewards</image:title></image:image><lastmod>2024-12-04T12:31:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/04/police-crack-encrypted-messaging-service-used-by-criminals-europol-says/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/europol2.jpg</image:loc><image:title>Europol2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/europol.jpg</image:loc><image:title>Europol</image:title></image:image><lastmod>2024-12-04T12:10:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/03/rethinking-cybersecurity-in-the-age-of-global-challenges/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/marko2.jpg</image:loc><image:title>Marko2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/marko3.jpg</image:loc><image:title>Marko3</image:title></image:image><lastmod>2024-12-03T11:18:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/03/achieving-cybersecurity-compliance-in-5-steps/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/compliance-1080x1080-1.jpg</image:loc><image:title>compliance-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/compliance-1920x1080-1.jpg</image:loc><image:title>compliance-1920x1080</image:title></image:image><lastmod>2024-12-03T11:05:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/02/disinformation-hacking-seen-as-top-threats-in-ipsos-world-affairs-report/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/hacker.jpg</image:loc><image:title>hacker</image:title></image:image><lastmod>2024-12-02T12:13:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/12/02/eset-announces-new-security-integrations-with-major-vendors-for-enhanced-business-protection/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/fb-ig-feed_1080x1080.png</image:loc><image:title>_FB IG feed_1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/12/fb-ig-feed_1200x628.png</image:loc><image:title>_FB IG feed_1200x628</image:title></image:image><lastmod>2024-12-02T12:03:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/29/phishing-you-happy-holidays/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1080x1080-8.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1200x628-1.png</image:loc><image:title>1200x628</image:title></image:image><lastmod>2024-11-29T12:48:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/29/eset-and-mindflow-partner-to-enhance-cybersecurity-with-advanced-automation/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/eset-mindflow-1080x1080-1.png</image:loc><image:title>eset-mindflow-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/eset-mindflow-1200x628-1.png</image:loc><image:title>eset-mindflow-1200x628</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-11-29T12:34:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/28/scams-to-look-out-for-this-holiday-season/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1080x1080-7.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1920x1080-7.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-11-28T13:45:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/27/eset-research-discovers-the-first-uefi-bootkit-for-linux/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1080x1080-6.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1920x1080-6.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-11-27T12:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/27/eset-threat-intelligence-enhancing-cybersecurity-workflows-with-filigrans-opencti/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/open-cti-1080x1080-1.png</image:loc><image:title>open-cti-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/open-cti-1200x628-1.png</image:loc><image:title>open-cti-1200x628</image:title></image:image><lastmod>2024-11-27T11:46:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/26/eset-research-discovers-mozilla-and-windows-zero-day-zero-click-vulnerabilities-exploited-by-romcom-apt-group/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1080x1080-5.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1920x1080-5.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-11-26T12:20:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/21/eset-research-discovers-wolfsbane-new-linux-cyberespionage-backdoor-by-gelsemium-apt/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/wolfsbane-1080x1080-1.jpg</image:loc><image:title>wolfsbane-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/wolfsbane-1920x1080-1.jpg</image:loc><image:title>wolfsbane-1920x1080</image:title></image:image><lastmod>2024-11-21T13:07:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/20/is-your-childs-phone-making-them-sick/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/mobile-children.jpg</image:loc><image:title>mobile-children</image:title></image:image><lastmod>2024-11-20T11:41:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/19/black-friday-turning-into-black-fraud-day/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/bfs2.jpg</image:loc><image:title>bfs2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/bfs.jpg</image:loc><image:title>bfs</image:title></image:image><lastmod>2024-11-19T11:05:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/19/my-information-was-stolen-now-what/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/infostealer-1080x1080-1.jpg</image:loc><image:title>infostealer-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/infostealer-1920x1080-1.jpg</image:loc><image:title>infostealer-1920x1080</image:title></image:image><lastmod>2024-11-19T10:37:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/18/what-is-scam-likely-putting-the-phone-down-on-unwanted-calls/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1080x1080-4.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1920x1080-4.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-11-18T12:16:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/15/the-true-horror-of-gaming-annoyance/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/gaming-1080x1080-1.png</image:loc><image:title>gaming-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/gaming-1200x628-copy.png</image:loc><image:title>gaming-1200x628 copy</image:title></image:image><lastmod>2024-11-15T12:26:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/14/cyberespionage-the-gamaredon-way/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/podcast-1080x1080-1.png</image:loc><image:title>podcast-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/podcast-1200x628-1.png</image:loc><image:title>podcast-1200x628</image:title></image:image><lastmod>2024-11-14T11:46:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/13/beyond-the-checkbox-demystifying-cybersecurity-compliance/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1920x1080-3.jpg</image:loc><image:title>1920x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1920x1080-2.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-11-13T11:24:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/13/amazon-confirms-employee-data-exposed-in-leak-linked-to-moveit-vulnerability/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/amazon2.jpg</image:loc><image:title>amazon2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/amazon.jpg</image:loc><image:title>amazon</image:title></image:image><lastmod>2024-11-13T11:13:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/12/beats-by-bot-the-ai-remix-revolution/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1080x1080-3.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1920x1080-1.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-11-12T11:27:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/08/why-botnet-tracking-is-so-effective/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/etec-botnet-1080x1080-1.png</image:loc><image:title>etec-botnet-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/etec-botnet-1300x736-1.png</image:loc><image:title>etec-botnet-1300x736</image:title></image:image><lastmod>2024-11-08T11:31:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/08/days-after-takedown-eset-research-releases-analysis-of-redline-stealer-infostealer-empire/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1080x1080-2.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1920x1080.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-11-08T10:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/07/eset-releases-latest-q2-2024-q3-2024-apt-report-apt-groups-expand-targeting-and-diplomatic-espionage/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1080x1080-1.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1200x628.png</image:loc><image:title>1200x628</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/picture1.png</image:loc><image:title>Picture1</image:title></image:image><lastmod>2024-11-07T11:29:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/06/how-eset-participated-in-the-grandoreiro-banking-trojan-disruption/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1080x1080.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/1300x736.jpg</image:loc><image:title>1300x736</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-11-06T13:12:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/05/games-apps-websites-anything-can-be-abused-how-to-protect-your-family-from-mobile-threats/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/smartphones.jpeg</image:loc><image:title>smartphones</image:title></image:image><lastmod>2024-11-05T11:13:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/11/04/innovating-to-save-our-planet/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/11/pinpoint.jpeg</image:loc><image:title>pinpoint</image:title></image:image><lastmod>2024-11-04T12:06:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/31/macrons-bodyguards-reveal-his-location-by-sharing-strava-data/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/fitness-tracking-623x425-1.jpeg</image:loc><image:title>fitness-tracking-623x425</image:title></image:image><lastmod>2024-10-31T11:22:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/30/how-to-remove-your-personal-information-from-google-search-results/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/remove-personal-data-1080x1080-1.jpg</image:loc><image:title>remove-personal-data-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/remove-personal-data-1920x1080-1.jpg</image:loc><image:title>remove-personal-data-1920x1080</image:title></image:image><lastmod>2024-10-30T10:19:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/29/identity-theft-is-getting-personal-what-to-do-if-youve-found-yourself-on-a-list-of-breached-personal-data/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/ga_mynlxyaa7dzy.png</image:loc><image:title>Ga_MYnlXYAA7DzY</image:title></image:image><lastmod>2024-10-29T10:39:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/29/dont-become-a-statistic-defending-your-personal-data-from-dark-web-criminals/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/1080x1080-1.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/1920x1080-1.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-10-29T10:27:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/25/eset-research-podcast-cosmicbeetle/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/podcast-1080x1080-1.png</image:loc><image:title>podcast-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/podcast-1920x1080-1.jpg</image:loc><image:title>podcast-1920x1080</image:title></image:image><lastmod>2024-10-25T10:33:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/24/eset-boosts-its-home-security-to-protect-your-family-against-identity-theft-and-ransomware/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/data_theft.png</image:loc><image:title>data_theft</image:title></image:image><lastmod>2024-10-24T10:40:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/24/meta-brings-back-face-scanning-to-combat-scams/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/facial-recognition.jpg</image:loc><image:title>facial-recognition</image:title></image:image><lastmod>2024-10-24T10:12:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/23/eset-bulks-up-its-eset-home-consumer-protections-against-identity-theft-ransomware-phishing-and-more/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/launch-hercules-2-1080x1080-1.png</image:loc><image:title>launch-hercules-2-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/launch-hercules-2-1200x628-1.png</image:loc><image:title>launch-hercules-2-1200x628</image:title></image:image><lastmod>2024-10-23T11:37:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/22/internet-archive-breached-again/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/data_breach.jpg</image:loc><image:title>data_breach</image:title></image:image><lastmod>2024-10-22T10:24:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/22/google-voice-scams-what-are-they-and-how-do-i-avoid-them/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/1080x1080.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/1920x1080.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-10-22T09:51:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/18/quishing-attacks-are-targeting-electric-car-owners-heres-how-to-slam-on-the-brakes/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/qr-code-phishing-qishing-cars-electric-charging-stations.jpeg</image:loc><image:title>qr-code-phishing-qishing-cars-electric-charging-stations</image:title></image:image><lastmod>2024-10-22T09:18:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/18/the-eus-new-nis2-directive-is-now-enforceable-by-member-states/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/andy-garth-1080x1080-2.png</image:loc><image:title>andy garth 1080x1080 2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/andy-garth-1200x628-1.png</image:loc><image:title>andy garth 1200x628</image:title></image:image><lastmod>2024-10-18T12:02:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/17/aspiring-digital-defender-explore-cybersecurity-internships-scholarships-and-apprenticeships/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/cybersecurity-internships-apprenticeships-scholarships.jpeg</image:loc><image:title>cybersecurity-internships-apprenticeships-scholarships</image:title></image:image><lastmod>2024-10-17T08:59:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/16/eset-integrates-with-superops-to-elevate-cybersecurity-for-msps/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/fb-ig-feed_1080x1080.png</image:loc><image:title>_FB IG feed_1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/fb-ig-feed_1200x628.png</image:loc><image:title>_FB IG feed_1200x628</image:title></image:image><lastmod>2024-10-16T12:54:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/16/protecting-children-from-grooming/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/safe_online.jpg</image:loc><image:title>safe_online</image:title></image:image><lastmod>2024-10-16T12:42:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/14/pokemon-developer-was-hacked-resulting-in-decades-of-data-being-leaked/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/pokemon2.jpg</image:loc><image:title>Pokemon2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/pokemon.jpg</image:loc><image:title>Pokemon</image:title></image:image><lastmod>2024-10-14T12:18:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/11/internet-archive-hacked-data-breach-impacts-31-million-users/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/breach.jpg</image:loc><image:title>breach</image:title></image:image><lastmod>2024-10-11T11:24:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/10/eset-research-telekopye-scammer-network-targets-booking-com-and-airbnb/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/telekopye3-1080x1080-1.png</image:loc><image:title>telekopye3-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/telekopye3-1920x1080-1.png</image:loc><image:title>telekopye3-1920x1080</image:title></image:image><lastmod>2024-10-10T10:58:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/09/cyber-insurance-human-risk-and-the-potential-for-cyber-ratings/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/cyber-insurance-future-ratings-human-risk.jpeg</image:loc><image:title>cyber-insurance-future-ratings-human-risk</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-10-09T12:33:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/08/eset-research-goldenjackal-apt-group-with-air-gap-capable-tools-targets-systems-in-europe-to-steal-confidential-data/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/goldenjackal-1920x1080-1.jpg</image:loc><image:title>goldenjackal-1920x1080</image:title></image:image><lastmod>2024-10-08T12:06:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/07/the-complexities-of-attack-attribution/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/cyberattack.jpg</image:loc><image:title>Cyberattack</image:title></image:image><lastmod>2024-10-07T09:07:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/04/preparing-for-nis2-why-a-multi-layered-cybersecurity-approach-is-critical/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/nis2.jpg</image:loc><image:title>nis2</image:title></image:image><lastmod>2024-10-04T11:19:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/03/why-system-resilience-should-mainly-be-the-job-of-the-os-not-just-third-party-applications/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/system-resilience-operating-system-third-party-software.jpeg</image:loc><image:title>system-resilience-operating-system-third-party-software</image:title></image:image><lastmod>2024-10-03T11:42:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/02/eset-research-discovers-new-government-attacking-apt-group/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/beekeeper-1920x1080-1.jpg</image:loc><image:title>beekeeper-1920x1080</image:title></image:image><lastmod>2024-10-02T13:44:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/10/01/cybersecurity-awareness-month-needs-a-radical-overhaul-it-needs-legislation/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/cyberawareness-month-1080x1080-1.jpg</image:loc><image:title>cyberawareness-month-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-10-01T11:12:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/30/a-guide-on-how-to-differentiate-between-mdr-services/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/image-3.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/mdr.jpg</image:loc><image:title>mdr</image:title></image:image><lastmod>2024-09-30T11:44:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/27/tech-playdates-turning-screen-time-into-quality-time/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/gaming.jpg</image:loc><image:title>gaming</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/gaming2c.jpg</image:loc><image:title>gaming2c</image:title></image:image><lastmod>2024-09-27T11:34:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/26/what-is-fileless-malware-and-how-to-protect-yourself/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/fileless2-250x250-1.jpg</image:loc><image:title>fileless2-250x250</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/fileless2-1200x628-1.jpg</image:loc><image:title>fileless2-1200x628</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/image-2.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-26T12:27:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/25/dont-panic-and-other-tips-for-staying-safe-from-scareware/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/scareware-scam-malicious-software.jpeg</image:loc><image:title>scareware-scam-malicious-software</image:title></image:image><lastmod>2024-09-25T10:27:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/24/time-to-engage-how-parents-can-help-keep-their-children-safe-on-snapchat/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/snapchat-security-children.jpeg</image:loc><image:title>snapchat-security-children</image:title></image:image><lastmod>2024-09-24T09:49:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/23/6-common-geek-squad-scams-and-how-to-defend-against-them/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/geek-1080x1080-1.jpg</image:loc><image:title>geek-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/geek-squad-scams-best-buy.jpeg</image:loc><image:title>geek-squad-scams-best-buy</image:title></image:image><lastmod>2024-09-23T10:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/20/pager-attack-raises-concerns/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/middle-east.jpg</image:loc><image:title>middle-east</image:title></image:image><lastmod>2024-09-20T09:46:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/20/understanding-cyber-incident-disclosure/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/cyber-incident-disclosure-insurance.png</image:loc><image:title>cyber-incident-disclosure-insurance</image:title></image:image><lastmod>2024-09-20T09:30:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/04/the-key-considerations-for-cyber-insurance-a-pragmatic-approach/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/image-1.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-09-20T09:24:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/19/influencing-the-influencers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/influencing_influencers2.jpg</image:loc><image:title>influencing_influencers2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/influencing_influencers1.jpg</image:loc><image:title>influencing_influencers1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/unlocked-403-cybersecurity-podcast-analyst-relations.png</image:loc><image:title>unlocked-403-cybersecurity-podcast-analyst-relations</image:title></image:image><lastmod>2024-09-19T12:22:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/18/eset-research-podcast-evilvideo/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/podcast-1080x1080-1.png</image:loc><image:title>podcast-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/podcast-1200x628-1.png</image:loc><image:title>podcast-1200x628</image:title></image:image><lastmod>2024-09-18T11:39:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/17/ai-security-bubble-already-springing-leaks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/ai-cybersecurity-bubble.jpeg</image:loc><image:title>ai-cybersecurity-bubble</image:title></image:image><lastmod>2024-09-17T10:09:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/16/hackers-force-chrome-users-to-hand-over-google-passwords/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/google-vulnerability.jpg</image:loc><image:title>google-vulnerability</image:title></image:image><lastmod>2024-09-16T08:40:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/05/eset-research-podcast-hotpage/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/hotpage-podcast-1080x1080-1.png</image:loc><image:title>hotpage-podcast-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/hotpage-podcast-1200x628-1.png</image:loc><image:title>hotpage-podcast-1200x628</image:title></image:image><lastmod>2024-09-05T09:35:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/09/03/in-plain-sight-malicious-ads-hiding-in-search-results/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/1080x1080.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/09/1200x628.png</image:loc><image:title>1200x628</image:title></image:image><lastmod>2024-09-03T10:49:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/30/eset-research-spy-group-exploits-wps-office-zero-day-analysis-uncovers-a-second-vulnerability/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/1080x1080.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/1920x1080.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-08-30T09:27:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/29/beware-of-ticket-scammers-on-social-media-dont-let-fake-promises-ruin-your-concert-experience/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/itieblog2.jpg</image:loc><image:title>itieblog2</image:title></image:image><lastmod>2024-08-29T09:46:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/28/old-devices-new-dangers-the-risks-of-unsupported-iot-tech/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/unsupported-iot-wls.jpeg</image:loc><image:title>unsupported-iot-wls</image:title></image:image><lastmod>2024-08-28T10:55:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/08/toys-behaving-badly-how-parents-can-protect-their-family-from-iot-threats/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/toys-smart-internet-things-children-623x415-1.jpg</image:loc><image:title>toys-smart-internet-things-children-623x415-1</image:title></image:image><lastmod>2024-08-28T10:53:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/26/thats-how-easy-it-is-to-hack-your-phone/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/unlocked.jpg</image:loc><image:title>unlocked</image:title></image:image><lastmod>2024-08-26T11:23:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/20/be-careful-what-you-pwish-for-phishing-in-pwa-applications/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/pwa-phishing-android-ios.jpeg</image:loc><image:title>pwa-phishing-android-ios</image:title></image:image><lastmod>2024-08-26T11:15:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/23/eset-research-discovers-ngate-android-malware-which-relays-nfc-traffic-to-steal-victims-cash-from-atms/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/ngate-android-nfc.jpeg</image:loc><image:title>ngate-android-nfc</image:title></image:image><lastmod>2024-08-23T09:05:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/22/how-regulatory-standards-and-cyber-insurance-inform-each-other/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/regulations-and-insurance.png</image:loc><image:title>regulations-and-insurance</image:title></image:image><lastmod>2024-08-22T10:30:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/16/finding-balance-nurturing-independence-while-ensuring-safety/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/eset_sko_cover_foto_170x170_parental_control_balance-of-freedom.png</image:loc><image:title>ESET_SKO_Cover_foto_170x170_Parental_Control_Balance of freedom</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/eset_sko_cover_foto_1254x837_parental_control_balance-of-freedom.png</image:loc><image:title>ESET_SKO_Cover_foto_1254x837_Parental_Control_Balance of freedom</image:title></image:image><lastmod>2024-08-16T09:34:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/15/the-great-location-leak-privacy-risks-in-dating-apps/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/privacy-dating-apps.png</image:loc><image:title>privacy-dating apps</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/dating-apps-location-risks-privacy.jpeg</image:loc><image:title>dating-apps-location-risks-privacy</image:title></image:image><lastmod>2024-08-15T11:02:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/14/why-scammers-want-your-phone-number/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/phone-numbers-scams.jpeg</image:loc><image:title>phone-numbers-scams</image:title></image:image><lastmod>2024-08-14T10:01:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/13/top-6-craigslist-scams-dont-fall-for-these-tricks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/gux_kddxgaagnzx.png</image:loc><image:title>GUx_KDdXgAAgnzx</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/common-craigslist-scams.jpeg</image:loc><image:title>common-craigslist-scams</image:title></image:image><lastmod>2024-08-13T09:02:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/08/why-tech-savvy-leadership-is-key-to-cyber-insurance-readiness/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/cyber-insurance-prevent-protect-insure-blog-three.png</image:loc><image:title>cyber-insurance-prevent-protect-insure-blog-three</image:title></image:image><lastmod>2024-08-08T09:53:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/07/how-minecraft-and-game-modding-can-undermine-your-security/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/minecraft.jpg</image:loc><image:title>Minecraft</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/minecraft.png</image:loc><image:title>minecraft</image:title></image:image><lastmod>2024-08-07T10:34:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/06/eset-recognized-as-a-representative-vendor-in-the-2024-gartner-market-guide-for-managed-detection-and-response/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/fb-ig-feed_1080x1080.png</image:loc><image:title>_FB IG feed_1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/fb-ig-feed_1200x628.png</image:loc><image:title>_FB IG feed_1200x628</image:title></image:image><lastmod>2024-08-06T10:46:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/08/01/the-cyberthreat-that-drives-businesses-towards-cyber-risk-insurance/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/08/cyber-insurance-small-businesses-prevent-protect-insure.png</image:loc><image:title>cyber-insurance-small-businesses-prevent-protect-insure</image:title></image:image><lastmod>2024-08-01T12:05:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/31/microsoft-says-cyber-attack-triggered-latest-outage/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/laptop-5603790_640.jpg</image:loc><image:title>laptop-5603790_640</image:title></image:image><lastmod>2024-07-31T09:11:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/30/beware-of-fake-ai-tools-masking-very-real-malware-threats/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/1080x1080-6.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/fake-ai-tools-imposters-malware.jpeg</image:loc><image:title>fake-ai-tools-imposters-malware</image:title></image:image><lastmod>2024-07-30T09:19:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/25/eset-research-discovers-evilvideo-telegram-app-for-android-targeted-by-zero-day-exploit-sending-malicious-videos/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/1080x1080-5.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/telegram-exploit-zero-day-cursed-tapes.jpeg</image:loc><image:title>telegram-exploit-zero-day-cursed-tapes</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-07-25T10:21:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/24/building-cyber-resilience-lessons-learned-from-the-crowdstrike-incident/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/resilience-1080x1080-1.jpg</image:loc><image:title>resilience-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/crowdstrike-incident-outages-lessons-learned-resilience.jpeg</image:loc><image:title>crowdstrike-incident-outages-lessons-learned-resilience</image:title></image:image><lastmod>2024-07-24T10:45:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/23/eset-research-hamster-kombat-game-misused-by-cybercriminals-as-spyware-and-infostealer/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/1080x1080-4.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/1920x1080-1.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-07-23T11:13:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/23/cyber-security-breaches-causes-solutions/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/breaches.jpg</image:loc><image:title>breaches</image:title></image:image><lastmod>2024-07-23T10:17:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/19/the-cyber-security-guide-for-smes/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/it-ie2.jpg</image:loc><image:title>it-ie2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/it-ie1.jpg</image:loc><image:title>it-ie1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/dl-1.jpg</image:loc><image:title>dl</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/dl.jpg</image:loc><image:title>dl</image:title></image:image><lastmod>2024-07-23T10:11:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/22/beyond-the-blue-screen-of-death-why-software-updates-matter/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/bsod_wls.jpg</image:loc><image:title>bsod_wls</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/crowdstrike-outages-cybersecurity-updates.jpeg</image:loc><image:title>crowdstrike-outages-cybersecurity-updates</image:title></image:image><lastmod>2024-07-22T11:59:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/19/global-it-outage-hits-companies-around-the-as-planes-grounded-and-train-services-affected/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/bsod.jpg</image:loc><image:title>bsod</image:title></image:image><lastmod>2024-07-19T10:41:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/18/hotpage-browser-injector-capable-of-replacing-web-content-and-redirecting-users/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/hotpage-1080x1080-1.jpg</image:loc><image:title>hotpage-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/hotpage-1200x628-1.jpg</image:loc><image:title>hotpage-1200x628</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/servercatalog.png</image:loc><image:title>servercatalog</image:title></image:image><lastmod>2024-07-18T10:10:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/17/small-but-mighty-top-5-pocket-sized-gadgets-to-boost-your-ethical-hacking-skills/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-07-17T11:45:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/16/hacker-group-claims-it-leaked-internal-disney-data/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/disney.jpg</image:loc><image:title>disney</image:title></image:image><lastmod>2024-07-16T10:29:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/16/hello-is-it-me-youre-looking-for-how-scammers-get-your-phone-number/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/1080x1080-3.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/1200x628-2.png</image:loc><image:title>1200x628</image:title></image:image><lastmod>2024-07-16T10:09:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/15/should-ransomware-payments-be-banned/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/ransomware.jpg</image:loc><image:title>ransomware</image:title></image:image><lastmod>2024-07-15T10:36:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/12/raising-digital-natives-debunking-tech-fears-for-parents/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/cybersecurity-privacy-children.jpg</image:loc><image:title>cybersecurity-privacy-children</image:title></image:image><lastmod>2024-07-12T10:27:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/12/eset-recognised-as-a-customers-choice-for-midsize-enterprises/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/gartner-2024-1080x1080-1.png</image:loc><image:title>gartner-2024-1080x1080</image:title></image:image><lastmod>2024-07-12T10:10:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/11/understanding-iot-security-risks-and-how-to-mitigate-them/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/iot.jpg</image:loc><image:title>IoT</image:title></image:image><lastmod>2024-07-11T11:11:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/10/5-common-ticketmaster-scams-how-fraudsters-steal-the-show/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/ticketmaster-1080x1080-1.jpg</image:loc><image:title>ticketmaster-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/ticketmaster-1200x628-1.jpg</image:loc><image:title>ticketmaster-1200x628</image:title></image:image><lastmod>2024-07-10T11:49:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/09/how-to-protect-your-phone-and-data-against-face-stealing-scams/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/face-cb-1080x1080-1.png</image:loc><image:title>face-cb-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/face-cb-1200x628-1.png</image:loc><image:title>face-cb-1200x628</image:title></image:image><lastmod>2024-07-09T11:40:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/08/social-media-and-teen-mental-health/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/children-socialmedia-2.jpg</image:loc><image:title>children-socialmedia-2</image:title></image:image><lastmod>2024-07-08T11:21:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/05/europol-cracks-down-on-criminals-exploiting-cobalt-strike-tool/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/europol.jpg</image:loc><image:title>europol</image:title></image:image><lastmod>2024-07-05T11:11:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/04/ai-in-the-workplace-the-good-the-bad-and-the-algorithmic/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/1080x1080-2.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/1200x628-1.png</image:loc><image:title>1200x628</image:title></image:image><lastmod>2024-07-04T10:43:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/03/dont-get-stung-by-these-common-booking-com-scams/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/1080x1080-1.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/1200x628.png</image:loc><image:title>1200x628</image:title></image:image><lastmod>2024-07-03T10:23:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/02/how-are-kids-interacting-with-social-media-daily/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/kids_socmedia.jpg</image:loc><image:title>kids_socmedia</image:title></image:image><lastmod>2024-07-02T09:29:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/07/01/hijacked-how-hacked-youtube-channels-spread-scams-and-malware/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/1080x1080.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/07/1920x1080.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-07-01T10:18:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/28/eset-threat-report-h1-2024/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/image-2.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/image-1.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-06-28T11:44:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/27/cyber-insurance-as-part-of-the-cyber-threat-mitigation-strategy/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/cyberinsurance-prevent-protect-insure.jpeg</image:loc><image:title>cyberinsurance-prevent-protect-insure</image:title></image:image><lastmod>2024-06-27T10:15:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/26/kaseya-dattocon-europe-why-quality-matters/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/1080x1080-1.jpg</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/1200x628-2.png</image:loc><image:title>1200x628</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/picture1.png</image:loc><image:title>Picture1</image:title></image:image><lastmod>2024-06-26T10:17:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/25/buying-a-vpn-heres-what-to-know-and-look-for/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/1080x1080-1.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/1920x1080-1.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-06-25T11:20:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/24/different-creativity-playgrounds-use-social-media-apps-for-creative-development/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/kids_socmedia.jpg</image:loc><image:title>kids_socmedia</image:title></image:image><lastmod>2024-06-24T12:09:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/20/my-health-information-has-been-stolen-now-what/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/1080x1080.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/1200x628-1.png</image:loc><image:title>1200x628-1</image:title></image:image><lastmod>2024-06-20T10:15:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/19/hacktivism-is-evolving-and-that-could-be-bad-news-for-organisations-everywhere/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/hacktivism-1080x1080-1.jpg</image:loc><image:title>hacktivism-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/hacktivism-1920x1080-1.jpg</image:loc><image:title>hacktivism-1920x1080-1</image:title></image:image><lastmod>2024-06-19T17:27:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/18/locked-shields-2024-ancient-inspiration-deployed-for-todays-complex-digital-battlegrounds/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/ls-thumb1-250x250-1.png</image:loc><image:title>ls-thumb1-250x250</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/ls-1200x628-1.png</image:loc><image:title>ls-1200x628-1</image:title></image:image><lastmod>2024-06-18T09:35:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/17/preventative-defense-tactics-in-the-real-world/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/1920x1080.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-06-17T10:42:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/13/eset-research-arid-viper-group-targets-middle-east-poisons-palestinian-app-with-spyware/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/aviper-1920x1080-1.jpg</image:loc><image:title>aviper-1920x1080-1</image:title></image:image><lastmod>2024-06-13T10:26:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/12/valuable-targets-attract-advanced-threat-actors-how-to-defend-against-quiet-and-persistent-attacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/1080x1080.jpg</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/1200x628.png</image:loc><image:title>1200x628</image:title></image:image><lastmod>2024-06-12T08:23:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/11/eset-wins-best-cybersecurity-vendor-blog-award/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/european-cybersecurity-blogger-awards-vendor-blog.jpeg</image:loc><image:title>european-cybersecurity-blogger-awards-vendor-blog</image:title></image:image><lastmod>2024-06-11T09:40:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/10/tiktok-zero-day-hack-is-taking-over-celebrity-and-brand-accounts/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/f.jpg</image:loc><image:title>f</image:title></image:image><lastmod>2024-06-10T09:28:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/07/the-job-hunters-guide-separating-genuine-offers-from-scams/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/job-offers-lq.jpeg</image:loc><image:title>job-offers-lq</image:title></image:image><lastmod>2024-06-07T10:06:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/05/361-million-stolen-accounts-leaked-on-telegram/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/accounthack.jpg</image:loc><image:title>accounthack</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/tg.png</image:loc><image:title>tg</image:title></image:image><lastmod>2024-06-05T10:28:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/05/kaseya-dattocon-europe-how-to-secure-msp-success-brick-by-brick/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/dattocon-bricks-msp-1200x628-1.png</image:loc><image:title>dattocon-bricks-msp-1200x628-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/dattocon-bricks-msp-1080x1080-1.png</image:loc><image:title>dattocon-bricks-msp-1080x1080-1</image:title></image:image><lastmod>2024-06-05T09:16:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/06/04/the-murky-world-of-password-leaks-and-how-to-check-if-youve-been-hit/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-06-04T09:09:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/31/ai-in-hr-is-artificial-intelligence-changing-how-we-hire-employees-forever/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/ai-hr-hiring-recruitment.jpeg</image:loc><image:title>ai-hr-hiring-recruitment</image:title></image:image><lastmod>2024-05-31T09:45:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/31/digital-security-2024-tomorrows-threats-require-modern-prevention-with-mdr/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/1080x1080-2.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/1200x628-2.png</image:loc><image:title>1200x628-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-22.png</image:loc><image:title>image-22</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-21.png</image:loc><image:title>image-21</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-20.png</image:loc><image:title>image-20</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-19.png</image:loc><image:title>image-19</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-18.png</image:loc><image:title>image-18</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-17.png</image:loc><image:title>image-17</image:title></image:image><lastmod>2024-05-31T09:34:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/30/hackers-claim-ticketmaster-data-breach/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/hacker.jpg</image:loc><image:title>hacker</image:title></image:image><lastmod>2024-05-31T08:28:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/29/digital-security-2024-big-on-prevention-even-bigger-on-ai/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/eset-world-2024.jpeg</image:loc><image:title>eset-world-2024</image:title></image:image><lastmod>2024-05-29T11:52:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/28/beyond-the-buzz-understanding-ai-and-its-role-in-cybersecurity/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-16.png</image:loc><image:title>image-16</image:title></image:image><lastmod>2024-05-28T11:55:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/27/mandatory-reporting-of-ransomware-attacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-15.png</image:loc><image:title>image-15</image:title></image:image><lastmod>2024-05-27T12:00:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/23/europeans-face-evolving-cyberthreats-defense-strategies-need-to-be-robust-and-pragmatic/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/1080x1080-1.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/1200x628-1.png</image:loc><image:title>1200x628-1</image:title></image:image><lastmod>2024-05-23T11:34:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/22/what-happens-when-ai-goes-rogue-and-how-to-stop-it/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-14.png</image:loc><image:title>image-14</image:title></image:image><lastmod>2024-05-22T10:46:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/21/untangling-the-hiring-dilemma-how-security-solutions-free-up-hr-processes/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-13.png</image:loc><image:title>image-13</image:title></image:image><lastmod>2024-05-21T11:47:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/20/help-your-child-overcome-a-cyberbullying-incident/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/cyberb.jpg</image:loc><image:title>cyberb</image:title></image:image><lastmod>2024-05-20T10:09:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/17/is-ai-enabling-a-new-wave-of-cyberbullying/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-12.png</image:loc><image:title>image-12</image:title></image:image><lastmod>2024-05-17T09:21:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/16/eset-research-lunar-arsenal-to-target-spy-on-european-diplomats/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/1080x1080.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/1920x1080-1.jpg</image:loc><image:title>1920x1080-1</image:title></image:image><lastmod>2024-05-16T10:31:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/15/400k-linux-servers-compromised-for-cryptocurrency-theft-and-financial-gain/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/ebury-1080x1080-1.jpg</image:loc><image:title>ebury-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/ebury-1920x1080-1.jpg</image:loc><image:title>ebury-1920x1080-1</image:title></image:image><lastmod>2024-05-15T09:43:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/15/eset-apt-activity-report-q4-2023-q1-2024/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-11.png</image:loc><image:title>image-11</image:title></image:image><lastmod>2024-05-15T09:27:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/14/how-to-talk-about-climate-change-and-what-motivates-people-to-action-an-interview-with-katharine-hayhoe/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/katharine-hayhoe-thumbnail-image.jpeg</image:loc><image:title>katharine-hayhoe-thumbnail-image</image:title></image:image><lastmod>2024-05-14T09:59:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/13/in-it-to-win-it-esets-blog-shortlisted-for-european-security-blogger-awards/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-10.png</image:loc><image:title>image-10</image:title></image:image><lastmod>2024-05-13T11:32:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/10/future-proofing-pc-fleets-with-the-powerful-pairing-of-intel-threat-detection-technology-and-ai-native-endpoint-protection/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/250x250.jpg</image:loc><image:title>250x250</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/1200x628.png</image:loc><image:title>1200x628</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2024-05-10T10:49:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/10/ai-hype-overload/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-8.png</image:loc><image:title>image-8</image:title></image:image><lastmod>2024-05-10T10:33:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/09/eset-included-among-notable-vendors-in-mobile-threat-defense-solutions-landscape-report/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/forrester-pr-1080x1080-1.jpg</image:loc><image:title>forrester-pr-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/forrester-pr-1200x628-1.jpg</image:loc><image:title>forrester-pr-1200x628-1</image:title></image:image><lastmod>2024-05-09T10:14:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/08/reducing-the-complexity-of-security-tasks-with-the-involvement-of-ai/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/ai-help-1920x1080-1.png</image:loc><image:title>ai-help-1920x1080-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2024-05-08T11:27:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/07/the-hackers-toolkit-4-gadgets-that-could-spell-security-trouble/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/1920x1080.jpg</image:loc><image:title>1920x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2024-05-07T09:59:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/03/adding-insult-to-injury-crypto-recovery-scams/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/crypto-theft-wls-1920x1080-2.png</image:loc><image:title>crypto-theft-wls-1920x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/crypto-theft-wls-1920x1080-1.png</image:loc><image:title>crypto-theft-wls-1920x1080-1</image:title></image:image><lastmod>2024-05-03T10:11:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/02/mum-im-ready-when-should-you-get-your-child-their-first-smartphone/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/kidphone.jpg</image:loc><image:title>kidphone</image:title></image:image><lastmod>2024-05-02T09:34:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/05/01/leveling-the-playing-field-for-all-with-mdr/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-05-01T12:10:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/30/unlocking-the-power-of-enterprise-grade-security-for-businesses-of-all-sizes/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2024-04-30T11:09:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/29/major-phishing-as-a-service-platform-disrupted/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/phishing.jpg</image:loc><image:title>phishing</image:title></image:image><lastmod>2024-04-29T10:52:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/26/imagine-vacationing-without-a-smartphone-cybercriminals-cant/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/vacation-smartphone-1080x1080-1.png</image:loc><image:title>vacation-smartphone-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/vacation-smartphone-1200x628-1.png</image:loc><image:title>vacation-smartphone-1200x628-1</image:title></image:image><lastmod>2024-04-26T10:05:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/25/gripped-by-python-5-reasons-why-python-is-popular-among-cybersecurity-professionals/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/python-1080x1080-1.png</image:loc><image:title>python-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/python-1200x628-1.png</image:loc><image:title>python-1200x628-1</image:title></image:image><lastmod>2024-04-25T11:47:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/25/prevention-first-security-begins-with-data-enhanced-insight-meet-eset-threat-intelligence/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/1080x1080-1.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/1200x628-1.png</image:loc><image:title>1200x628-1</image:title></image:image><lastmod>2024-04-25T11:34:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/24/how-technology-drives-progress-a-qa-with-nobel-laureate-michel-mayor/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/michel_mayor-1080x1920-1.png</image:loc><image:title>michel_mayor-1080x1920-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/michel_mayor-1080x1080-2.png</image:loc><image:title>michel_mayor-1080x1080-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/michel_mayor-1080x1080-1.png</image:loc><image:title>michel_mayor-1080x1080</image:title></image:image><lastmod>2024-04-24T11:02:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/23/how-to-prepare-msps-for-advanced-phishing-without-wearing-out-it-staff/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/1080x1080.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/1200x628.png</image:loc><image:title>1200x628</image:title></image:image><lastmod>2024-04-23T11:03:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/18/the-many-faces-of-impersonation-fraud-spot-an-imposter-before-its-too-late/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/impersonation-scams-fraud.jpeg</image:loc><image:title>impersonation-scams-fraud</image:title></image:image><lastmod>2024-04-18T09:56:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/17/even-legitimate-websites-can-become-traps-and-small-home-offices-need-to-be-prepared/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/traps-1080x1080-1.png</image:loc><image:title>traps-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/traps-1200x628-1.png</image:loc><image:title>traps-1200x628-1</image:title></image:image><lastmod>2024-04-17T11:48:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/16/the-abcs-of-how-online-ads-can-impact-childrens-well-being/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2024-04-16T09:56:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/15/bitcoin-scams-hacks-and-heists-and-how-to-avoid-them/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2024-04-15T10:15:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/12/apple-notifies-users-in-92-countries-about-mercenary-spyware-attacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/iphone.jpg</image:loc><image:title>iphone</image:title></image:image><lastmod>2024-04-12T10:40:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/11/beyond-fun-and-games-exploring-privacy-risks-in-childrens-apps/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/1920x1080.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2024-04-11T10:10:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/11/set-and-protect-a-cybersecurity-road-map-for-small-and-home-offices/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/eset_soho.jpg</image:loc><image:title>eset_soho</image:title></image:image><lastmod>2024-04-11T09:30:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/10/eset-discovers-targeted-attack-via-fake-messaging-apps-available-on-web-and-google-play/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/exo-1920x1080-1.jpg</image:loc><image:title>exo-1920x1080-1</image:title></image:image><lastmod>2024-04-10T09:48:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/08/7-reasons-why-cybercriminals-want-your-personal-data/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/personal-data-cybercrime.jpeg</image:loc><image:title>personal-data-cybercrime</image:title></image:image><lastmod>2024-04-08T11:10:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/04/how-to-time-limit-your-childs-apps/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/onlinekids.jpg</image:loc><image:title>onlinekids</image:title></image:image><lastmod>2024-04-04T12:12:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/03/how-often-should-you-change-your-passwords/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2024-04-03T11:27:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/04/02/malware-hiding-in-pictures-more-likely-than-you-think/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/04/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-04-02T11:02:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/29/rdp-remains-a-security-concern/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/rdp.jpg</image:loc><image:title>rdp</image:title></image:image><lastmod>2024-03-29T11:25:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/28/eset-has-been-recognised-as-a-top-player-in-radicati-market-quadrant-for-the-fifth-consecutive-year/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/radicati-1080x1080-2.png</image:loc><image:title>radicati-1080x1080-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/radicati-1200x628-2.png</image:loc><image:title>radicati-1200x628-2</image:title></image:image><lastmod>2024-03-28T12:51:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/28/cybercriminals-play-dirty-a-look-back-at-10-cyber-hits-on-the-sporting-world/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/image-11.png</image:loc><image:title>image-11</image:title></image:image><lastmod>2024-03-28T12:40:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/27/cybersecurity-starts-at-home-help-your-children-stay-safe-online-with-open-conversations/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/image-10.png</image:loc><image:title>image-10</image:title></image:image><lastmod>2024-03-27T11:11:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/26/borrower-beware-common-loan-scams-and-how-to-avoid-them/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/image-7.png</image:loc><image:title>image-7</image:title></image:image><lastmod>2024-03-26T11:40:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/25/acecryptor-attacks-surge-in-europe/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/acecryptor-analysis-eset.jpg</image:loc><image:title>acecryptor-analysis-eset</image:title></image:image><lastmod>2024-03-25T10:47:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/21/eset-has-been-recognised-in-three-modern-endpoint-security-idc-marketscape-reports/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/idc-marketscape-leader-1080x1080-1.png</image:loc><image:title>IDC Marketscape Leader 1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/idc-marketscape-leader-1200x628-1.png</image:loc><image:title>idc-marketscape-leader-1200x628-1</image:title></image:image><lastmod>2024-03-21T11:54:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/20/eset-research-acecryptor-attacks-on-the-rise/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/image-5.png</image:loc><image:title>image-5</image:title></image:image><lastmod>2024-03-20T10:48:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/19/a-prescription-for-privacy-protection-exercise-caution-when-using-a-mobile-health-app/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2024-03-19T12:05:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/15/cyber-threat-intelligence-explained/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2024-03-15T10:46:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/14/guarding-children-against-identity-theft-red-flags-every-parent-should-know/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2024-03-14T11:26:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/13/how-to-share-sensitive-files-securely-online/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2024-03-13T12:08:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/12/french-state-services-hit-by-cyberattacks-of-unprecedented-intensity/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/france.jpg</image:loc><image:title>france</image:title></image:image><lastmod>2024-03-12T13:04:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/11/how-to-protect-your-childs-identity/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/kidsid.jpg</image:loc><image:title>kidsid</image:title></image:image><lastmod>2024-03-11T12:11:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/08/international-womens-day-esets-women-in-cybersecurity/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/w-day-1080x1080-1.jpg</image:loc><image:title>w-day-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/w-day-1200x628-1.jpg</image:loc><image:title>w-day-1200x628-1</image:title></image:image><lastmod>2024-03-08T11:49:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/07/apple-stresses-security-risks-of-complying-with-eus-digital-markets-act/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/appleeu.jpg</image:loc><image:title>appleeu</image:title></image:image><lastmod>2024-03-07T10:47:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/06/top-10-scams-targeting-seniors-and-how-to-keep-your-money-safe/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/senior-citizens-scams.jpeg</image:loc><image:title>senior-citizens-scams</image:title></image:image><lastmod>2024-03-06T12:36:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/05/irresistible-hooks-habits-and-why-you-cant-put-down-your-phone/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-03-05T11:07:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/03/01/how-can-i-keep-my-child-safe-from-sextortion/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/03/sxt.jpg</image:loc><image:title>sxt</image:title></image:image><lastmod>2024-03-01T13:13:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/29/6-open-source-tools-to-assess-and-enhance-corporate-defenses/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/image-12.png</image:loc><image:title>image-12</image:title></image:image><lastmod>2024-02-29T11:25:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/28/vulnerabilities-in-business-vpns-under-the-spotlight/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/image-11.png</image:loc><image:title>image-11</image:title></image:image><lastmod>2024-02-28T13:23:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/27/keeping-encryption-secure-from-bitlocker-sniffing/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/image-10.png</image:loc><image:title>image-10</image:title></image:image><lastmod>2024-02-27T12:12:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/26/10-things-to-avoid-posting-on-social-media-and-why/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2024-02-26T11:41:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/23/should-we-be-prepared-for-ai-based-critical-infrastructure-attacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/protectplatform.jpg</image:loc><image:title>protectplatform</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/image-8.png</image:loc><image:title>image-8</image:title></image:image><lastmod>2024-02-23T12:27:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/22/everything-you-need-to-know-about-ip-grabbers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/image-7.png</image:loc><image:title>image-7</image:title></image:image><lastmod>2024-02-22T12:00:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/21/a-guide-to-online-threats-faced-by-kids-over-the-last-30-years/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/kidsthreats.jpg</image:loc><image:title>kidsthreats</image:title></image:image><lastmod>2024-02-21T12:59:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/20/hacker-groups-site-taken-over-by-law-enforcement/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/hacker5.jpg</image:loc><image:title>hacker5</image:title></image:image><lastmod>2024-02-20T11:36:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/19/cyber-insurance-and-vulnerability-scanning/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/vuln.jpg</image:loc><image:title>vuln</image:title></image:image><lastmod>2024-02-19T11:47:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/16/all-eyes-on-ai-unlocked-403-a-cybersecurity-podcast/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/unlocked.jpg</image:loc><image:title>unlocked</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/image-6.png</image:loc><image:title>image-6</image:title></image:image><lastmod>2024-02-16T11:42:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/14/200000-facebook-marketplace-user-records-leaked-on-hacking-forum/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/facebook.jpg</image:loc><image:title>facebook</image:title></image:image><lastmod>2024-02-15T11:54:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/15/why-do-you-need-to-talk-to-your-kids-about-online-threats/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/kidsonline.jpg</image:loc><image:title>kidsonline</image:title></image:image><lastmod>2024-02-15T11:52:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/14/the-art-of-digital-sleuthing-how-digital-forensics-unlocks-the-truth/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/image-5.png</image:loc><image:title>image-5</image:title></image:image><lastmod>2024-02-14T11:32:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/13/dont-let-your-desire-for-love-benefit-scammers-lust-for-data/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2024-02-13T11:35:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/12/ransomware-payments-hit-a-record-high-in-2023/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/ransom4.jpg</image:loc><image:title>ransom4</image:title></image:image><lastmod>2024-02-12T12:39:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/08/3-million-smart-toothbrushes-were-just-used-in-a-ddos-attack/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/ddos-4.jpg</image:loc><image:title>ddos</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/ddos-2.jpg</image:loc><image:title>ddos-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/ddos.jpg</image:loc><image:title>ddos</image:title></image:image><lastmod>2024-02-12T11:36:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/09/the-buck-stops-here-why-the-stakes-are-high-for-cisos/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2024-02-09T12:48:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/07/left-to-their-own-devices-security-for-employees-using-personal-devices-for-work/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2024-02-07T11:24:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/06/could-your-valentine-be-a-scammer-how-to-avoid-getting-caught-in-a-bad-romance/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2024-02-06T10:10:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/02/01/eset-research-discovers-espionage-apps-utilizing-romance-scams/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-02-01T13:11:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/31/eset-research-podcast-chatgpt-the-moveit-hack-and-pandora/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-19.png</image:loc><image:title>image-19</image:title></image:image><lastmod>2024-01-31T12:16:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/30/eset-research-joins-global-operation-to-disrupt-the-grandoreiro-banking-trojan-operating-in-latin-america-and-spain/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-18.png</image:loc><image:title>image-18</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-17.png</image:loc><image:title>image-17</image:title></image:image><lastmod>2024-01-30T12:24:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/29/cyber-the-swiss-army-knife-of-tradecraft/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-16.png</image:loc><image:title>image-16</image:title></image:image><lastmod>2024-01-29T12:28:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/25/mother-of-all-breaches-reveals-26-billion-records/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-15.png</image:loc><image:title>image-15</image:title></image:image><lastmod>2024-01-25T11:25:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/25/assessing-and-mitigating-supply-chain-cybersecurity-risks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-14.png</image:loc><image:title>image-14</image:title></image:image><lastmod>2024-01-25T11:20:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/24/break-the-fake-ai-voice-cloning-scams/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-13.png</image:loc><image:title>image-13</image:title></image:image><lastmod>2024-01-24T12:09:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/23/caught-in-the-web-understanding-and-battling-internet-addiction/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-12.png</image:loc><image:title>image-12</image:title></image:image><lastmod>2024-01-23T10:32:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/22/understanding-the-power-of-managed-detection-and-response-mdr-for-small-and-medium-sized-businesses-smbs/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/managed-detection-response-solution-1.png</image:loc><image:title>managed-detection-response-solution-1</image:title></image:image><lastmod>2024-01-22T12:04:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/19/teamviewer-abused-to-breach-networks-in-new-ransomware-attacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-11.png</image:loc><image:title>image-11</image:title></image:image><lastmod>2024-01-19T12:29:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/18/virtual-kidnapping-how-to-see-through-this-terrifying-scam/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-10.png</image:loc><image:title>image-10</image:title></image:image><lastmod>2024-01-18T13:30:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/17/is-temu-safe-what-to-know-before-you-shop-like-a-billionaire/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2024-01-17T11:29:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/16/the-7-deadly-cloud-security-sins-and-how-smbs-can-do-things-better/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/cloud-cybersecurity-mistakes-businesses.jpeg</image:loc><image:title>cloud-cybersecurity-mistakes-businesses</image:title></image:image><lastmod>2024-01-16T12:26:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/15/trojan-malware-on-android-tv/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-8.png</image:loc><image:title>image-8</image:title></image:image><lastmod>2024-01-15T12:42:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/11/a-peek-behind-the-curtain-how-are-sock-puppet-accounts-used-in-osint/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-7.png</image:loc><image:title>image-7</image:title></image:image><lastmod>2024-01-11T12:18:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/10/attack-of-the-copycats-how-fake-messaging-apps-and-app-mods-could-bite-you/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-6.png</image:loc><image:title>image-6</image:title></image:image><lastmod>2024-01-10T14:09:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/09/love-is-in-the-ai-finding-love-online-takes-on-a-whole-new-meaning/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-5.png</image:loc><image:title>image-5</image:title></image:image><lastmod>2024-01-10T17:01:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/08/eset-ais-advantage-in-threat-detection-investigation-and-response-tdir/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2024-01-08T12:30:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/05/lost-and-found-how-to-locate-your-missing-devices-and-more/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2024-01-05T12:33:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/03/press-clippings-2023/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/funnier9-31.12.2023.jpg</image:loc><image:title>funnier9-31.12.2023</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/lovevouchers-15.12.2023.jpg</image:loc><image:title>lovevouchers-15.12.2023</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/radius-13.11.2023.jpg</image:loc><image:title>radius-13.11.2023</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/radius-25.10.2023.jpg</image:loc><image:title>radius-25.10.2023</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/software-advice-03.12.2023.jpg</image:loc><image:title>software-advice-03.12.2023</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/reclaimthefacts-20.11.2023.jpg</image:loc><image:title>reclaimthefacts-20.11.2023</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/techmins-18.11.2023.jpg</image:loc><image:title>techmins-18.11.2023</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/ugetuntopc-19.10.2023.jpg</image:loc><image:title>ugetuntopc-19.10.2023</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/the-irish-sun-06.12.2023.jpg</image:loc><image:title>the-irish-sun-06.12.2023</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/siliconrepublic-06.12.2023.jpg</image:loc><image:title>siliconrepublic-06.12.2023</image:title></image:image><lastmod>2024-01-05T11:29:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/04/got-a-new-device-7-things-to-do-before-disposing-of-your-old-tech/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2024-01-04T11:08:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/03/say-what-you-will-your-favorite-speech-to-text-app-may-be-a-privacy-risk/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2024-01-03T12:33:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2024/01/02/a-year-in-review-10-of-the-biggest-security-incidents-of-2023/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2024/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2024-01-02T11:07:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/12/21/safeguard-the-joy-10-tips-for-securing-your-shiny-new-device/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/image-8.png</image:loc><image:title>image-8</image:title></image:image><lastmod>2023-12-21T12:47:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/12/21/these-arent-the-androids-you-should-be-looking-for/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/image-7.png</image:loc><image:title>image-7</image:title></image:image><lastmod>2023-12-21T12:34:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/12/20/eset-threat-report-h2-2023/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/image-6.png</image:loc><image:title>image-6</image:title></image:image><lastmod>2023-12-20T10:22:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/12/20/silent-but-deadly-the-rise-of-zero-click-attacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/image-5.png</image:loc><image:title>image-5</image:title></image:image><lastmod>2023-12-20T10:10:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/12/20/should-we-regulate-ai/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2023-12-20T10:01:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/12/08/black-hat-europe-2023-the-past-could-return-to-haunt-you/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2023-12-08T12:49:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/12/07/to-tap-or-not-to-tap-are-nfc-payments-safer/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2023-12-07T12:21:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/12/06/navigating-privacy-should-we-put-the-brakes-on-car-tracking/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2023-12-06T10:54:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/12/05/loan-sharks-use-android-apps-to-reach-new-depths/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/loan-sharks-wls-1920x1080-1.png</image:loc><image:title>loan-sharks-wls-1920x1080-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-12-05T13:27:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/12/04/teaching-appropriate-use-of-ai-tech/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/ai.jpg</image:loc><image:title>ai</image:title></image:image><lastmod>2023-12-04T12:11:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/12/01/time-is-money-how-the-new-eset-professional-service-automation-plugin-makes-the-life-of-a-managed-service-provider-easier/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/12/the-protection-deck.png</image:loc><image:title>the-protection-deck</image:title></image:image><lastmod>2023-12-01T11:29:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/30/executives-behaving-badly-5-ways-to-manage-the-executive-cyberthreat/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2023-11-30T10:55:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/29/new-bluffs-attack-lets-attackers-hijack-bluetooth-connections/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/bluetooth.jpg</image:loc><image:title>bluetooth</image:title></image:image><lastmod>2023-11-29T11:33:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/29/very-precisely-lost-gps-jamming/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2023-11-29T11:22:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/28/retail-at-risk-top-threats-facing-retailers-this-holiday-season/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/online-retail-cyberthreats.jpeg</image:loc><image:title>online-retail-cyberthreats</image:title></image:image><lastmod>2023-11-28T10:54:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/27/tis-the-season-to-be-wary-12-steps-to-ruin-a-cybercriminals-day/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/cybersecurity-safe-online-shopping.jpeg</image:loc><image:title>cybersecurity-safe-online-shopping</image:title></image:image><lastmod>2023-11-27T13:01:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/24/eset-extends-its-portfolio-with-vpn-and-identity-protection-in-a-brand-new-all-in-one-offering/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/the-protection-deck.png</image:loc><image:title>the-protection-deck</image:title></image:image><lastmod>2023-11-24T12:30:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/23/navigating-the-digital-playground-how-to-prevent-cyberbullying-in-online-gaming/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/gaming2.jpg</image:loc><image:title>gaming2</image:title></image:image><lastmod>2023-11-23T11:54:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/22/your-voice-is-my-password/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2023-11-22T13:43:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/21/is-temu-safe-why-its-single-layer-security-should-be-a-red-flag-to-shoppers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/temu.jpg</image:loc><image:title>temu</image:title></image:image><lastmod>2023-11-21T11:55:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/20/spam-email-as-gaeilge-pretending-to-come-from-a-lottery-winner-wont-make-you-rich/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/phishing-3.jpg</image:loc><image:title>phishing-3</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/julie.jpg</image:loc><image:title>julie</image:title></image:image><lastmod>2023-11-20T12:00:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/20/fuel-for-thought-can-a-driverless-car-get-arrested/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/1920x1080.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2023-11-20T11:01:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/17/is-your-linkedin-profile-revealing-too-much/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/golpes-linkedin.jpeg</image:loc><image:title>golpes-linkedin</image:title></image:image><lastmod>2023-11-17T11:12:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/16/simple-antivirus-is-not-enough-anymore-eset-is-introducing-all-in-one-protection-for-consumers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/1080x1080.jpg</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/1200x628.jpg</image:loc><image:title>1200x628</image:title></image:image><lastmod>2023-11-16T10:20:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/15/level-up-these-games-will-make-learning-about-cybersecurity-fun/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/jogos-ciberseguranca-755x425-1.png</image:loc><image:title>jogos-ciberseguranca-755x425-1</image:title></image:image><lastmod>2023-11-15T11:53:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/14/royal-ransomware-asked-350-victims-to-pay-275-million/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/ransomware.jpg</image:loc><image:title>ransomware</image:title></image:image><lastmod>2023-11-14T09:39:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/13/capture-the-flag-5-websites-to-sharpen-your-hacking-skills/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/ctf.jpeg</image:loc><image:title>ctf</image:title></image:image><lastmod>2023-11-13T10:58:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/10/chinese-bank-in-us-hit-by-ransomware-attack/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/ransomware-3.jpg</image:loc><image:title>ransomware-3</image:title></image:image><lastmod>2023-11-10T11:04:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/09/whatsapp-can-now-hide-your-ip-address-during-calls-for-added-security/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/whatsapp.jpg</image:loc><image:title>whatsapp</image:title></image:image><lastmod>2023-11-09T12:45:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/08/fake-ledger-live-app-in-microsoft-store-steals-768000-in-crypto/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/cryptocrim.jpg</image:loc><image:title>cryptocrim</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/cryptocrime.jpg</image:loc><image:title>cryptocrime</image:title><image:caption>Crypto money bitcoin background. Crypto hacker hand hold golden BTC bit coin. Digital money, stock market concept; Shutterstock ID 2125369931; purchase_order: 1013604; job: WLS; client: ESET; other:</image:caption></image:image><lastmod>2023-11-08T12:56:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/07/google-warns-how-hackers-could-abuse-calendar-service/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/google2.jpg</image:loc><image:title>google2</image:title></image:image><lastmod>2023-11-07T11:44:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/06/navigating-the-security-and-privacy-challenges-of-large-language-models/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-11-06T12:32:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/03/eset-research-infamous-iot-botnet-mozi-taken-down-via-a-kill-switch/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/mozi-iot-botnet-kill-switch-eset-research.jpeg</image:loc><image:title>mozi-iot-botnet-kill-switch-eset-research</image:title></image:image><lastmod>2023-11-03T12:16:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/11/02/7-ways-to-attract-more-women-into-cybersecurity/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/11/women-cybersecurity.jpeg</image:loc><image:title>women-cybersecurity</image:title></image:image><lastmod>2023-11-02T10:39:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/26/winter-vivern-exploits-zero-day-vulnerability-in-roundcubewebmail-servers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/roundcube-1080x1080-1.png</image:loc><image:title>roundcube-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/roundcube-1200x628-1.png</image:loc><image:title>roundcube-1200x628-1</image:title></image:image><lastmod>2023-10-26T11:05:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/25/data-of-thousands-of-drivers-in-ireland-who-had-vehicles-towed-exposed-in-it-breach/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/data-breach-ireland.jpg</image:loc><image:title>data-breach-ireland</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/data_breach.jpg</image:loc><image:title>data_breach</image:title></image:image><lastmod>2023-10-25T11:24:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/24/eset-named-strategic-leader-in-av-comparatives-2023-endpoint-prevention-and-response-epr-test/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/image.jpeg</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/podium-1080x1080-1.jpg</image:loc><image:title>podium-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/podium-1200x628-1.jpg</image:loc><image:title>podium-1200x628-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/1.png</image:loc><image:title>1</image:title></image:image><lastmod>2023-10-24T12:30:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/23/one-login-to-rule-them-all-should-you-sign-in-with-google-or-facebook-on-other-websites/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/social-login-sso-pros-cons.jpeg</image:loc><image:title>social-login-sso-pros-cons</image:title></image:image><lastmod>2023-10-23T11:49:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/20/hacker-leaks-millions-of-genetic-data-profiles/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/sci-hac.jpg</image:loc><image:title>sci-hac</image:title></image:image><lastmod>2023-10-20T10:26:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/19/strengthening-the-weakest-link-top-3-security-awareness-topics-for-your-employees/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/csam-awareness-topics.jpeg</image:loc><image:title>csam-awareness-topics</image:title></image:image><lastmod>2023-10-19T11:38:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/18/better-safe-than-sorry-10-tips-to-build-an-effective-business-backup-strategy/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/1920x1080-1.jpg</image:loc><image:title>1920x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/1920x1080.jpg</image:loc><image:title>1920x1080</image:title></image:image><lastmod>2023-10-18T12:02:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/17/whatsapp-turns-on-passwordless-logins-for-android-users/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/whatsapp-android-1.jpg</image:loc><image:title>whatsapp-android</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/whatsapp-android.jpg</image:loc><image:title>whatsapp-android</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/android.jpg</image:loc><image:title>android</image:title></image:image><lastmod>2023-10-17T10:39:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/16/staying-on-top-of-security-updates/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/updates.jpg</image:loc><image:title>updates</image:title></image:image><lastmod>2023-10-16T11:27:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/13/13-netiquette-principles-to-empower-your-child/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/kids_netiquette.jpg</image:loc><image:title>kids_netiquette</image:title></image:image><lastmod>2023-10-13T10:19:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/12/building-digital-armies/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/cybercrime-defenders-cooperation.jpeg</image:loc><image:title>cybercrime-defenders-cooperation</image:title></image:image><lastmod>2023-10-12T10:45:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/11/mom-dont-embarrass-me-what-do-children-think-of-their-parents-netiquette/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/teens.jpg</image:loc><image:title>teens</image:title></image:image><lastmod>2023-10-11T12:34:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/10/your-family-home-and-small-business-need-a-cyber-resilience-strategy-too/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/cyber-resilience-family-home-business.jpeg</image:loc><image:title>cyber-resilience-family-home-business</image:title></image:image><lastmod>2023-10-10T12:07:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/09/principles-to-follow-when-commenting-on-others-posts/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/rxkudchwxgr3evuyqg2w.png</image:loc><image:title>rxkudchwxgr3evuyqg2w</image:title></image:image><lastmod>2023-10-09T10:04:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/06/fake-friends-and-followers-on-social-media-and-how-to-spot-them/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/fake-friends-followers-social-media-1.jpeg</image:loc><image:title>fake-friends-followers-social-media</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/fake-friends-followers-social-media.jpeg</image:loc><image:title>fake-friends-followers-social-media</image:title></image:image><lastmod>2023-10-06T11:15:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/05/mrbeast-and-bbc-stars-used-in-deepfake-scam-videos/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/deepfakes-2.jpg</image:loc><image:title>deepfakes-2</image:title></image:image><lastmod>2023-10-05T11:14:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/04/rules-of-engagement-issued-to-hacktivists-after-chaos/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/hacker1.jpeg</image:loc><image:title>hacker1</image:title></image:image><lastmod>2023-10-04T12:07:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/03/playing-your-part-in-building-a-safer-digital-world-why-cybersecurity-matters/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/cybersecurity-awareness-month.jpeg</image:loc><image:title>cybersecurity-awareness-month</image:title></image:image><lastmod>2023-10-03T10:53:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/10/02/eset-research-lazarus-impersonates-meta-on-linkedin-to-attack-an-aerospace-company-in-spain/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/10/eset-threat-research-apt-lazarus-spain-lightlesscan.jpeg</image:loc><image:title>eset-threat-research-apt-lazarus-spain-lightlesscan</image:title></image:image><lastmod>2023-10-02T11:09:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/29/the-customers-have-spoken-eset-recognised-as-a-customers-choice-among-endpoint-protection-platforms/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/zuzana.png</image:loc><image:title>zuzana</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/image-10.png</image:loc><image:title>image-10</image:title></image:image><lastmod>2023-09-29T10:07:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/28/5-of-the-top-programming-languages-for-cybersecurity/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/lenguajes-programacon-ciberseg.jpeg</image:loc><image:title>lenguajes-programacon-ciberseg</image:title></image:image><lastmod>2023-09-28T12:01:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/27/sony-investigates-cyberattack/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/data-leak.jpg</image:loc><image:title>data-leak</image:title></image:image><lastmod>2023-09-27T11:24:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/26/can-open-source-software-be-secure/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/open-source-code-software-security.jpeg</image:loc><image:title>open-source-code-software-security</image:title></image:image><lastmod>2023-09-26T10:38:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/25/stealth-falcon-preying-over-middle-eastern-skies-with-deadglyph/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/eset-research-stealth-falcon-deadglyph.jpeg</image:loc><image:title>eset-research-stealth-falcon-deadglyph</image:title></image:image><lastmod>2023-09-25T11:20:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/22/malware-what-do-you-need-to-know/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/mw.jpg</image:loc><image:title>mw</image:title></image:image><lastmod>2023-09-22T11:15:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/21/taking-down-turla-balancing-act-between-visibility-usability-with-eset/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2023-09-21T14:01:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/18/apple-launches-ios-17/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/apple1.jpg</image:loc><image:title>apple1</image:title></image:image><lastmod>2023-09-18T10:56:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/15/how-to-talk-with-kids-about-parental-control/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/kidparent-1.jpg</image:loc><image:title>kidparent-1</image:title></image:image><lastmod>2023-09-15T11:35:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/14/read-it-right-how-to-spot-scams-on-reddit/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/reddit-scams-article.jpeg</image:loc><image:title>reddit-scams-article</image:title></image:image><lastmod>2023-09-14T10:41:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/11/eset-research-ballistic-bobcat-targets-businesses-with-a-new-backdoor/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/map-apt42.png</image:loc><image:title>map-apt42</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/ballistic-bobcat-sponsoring-access-backdoor.jpeg</image:loc><image:title>ballistic-bobcat-sponsoring-access-backdoor</image:title></image:image><lastmod>2023-09-13T10:59:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/12/eset-research-podcast-sextortion-digital-usury-and-sql-brute-force/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/image.png</image:loc><image:title>image</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/podcast-1200x628-1.png</image:loc><image:title>podcast-1200x628-1</image:title></image:image><lastmod>2023-09-12T11:16:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/08/will-you-give-x-your-biometric-data/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/biometric-authentications-1.jpg</image:loc><image:title>biometric-authentications</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/biometric-authentications.jpg</image:loc><image:title>biometric-authentications</image:title></image:image><lastmod>2023-09-08T11:42:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/07/staying-ahead-of-threats-5-cybercrime-trends-to-watch/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/cybercrime-trends-watch.jpeg</image:loc><image:title>cybercrime-trends-watch</image:title></image:image><lastmod>2023-09-07T10:42:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/06/atlas-vpn-zero-day-vulnerability-leaks-users-real-ip-address/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/tor-vpn-differences.jpg</image:loc><image:title>tor-vpn-differences</image:title></image:image><lastmod>2023-09-06T09:25:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/05/its-online-it-must-be-true-but-is-it/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/fake-news.jpg</image:loc><image:title>fake-news</image:title></image:image><lastmod>2023-09-05T09:57:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/04/getting-off-the-hook-10-steps-to-take-after-clicking-on-a-phishing-link/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/get-off-the-hook-1920x1080-1.jpeg</image:loc><image:title>get-off-the-hook-1920x1080-1</image:title></image:image><lastmod>2023-09-04T11:02:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/09/01/what-you-need-to-know-about-icloud-private-relay/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/09/icloud-private-relay-1920x1080-1.jpeg</image:loc><image:title>icloud-private-relay-1920x1080-1</image:title></image:image><lastmod>2023-09-01T11:26:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/30/eset-research-spy-apps-by-the-gref-group-pose-as-signal-and-telegram-attack-users-in-europe-and-the-us/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/badbazaar-espionage-telegram-signal-android-gref-1.jpeg</image:loc><image:title>badbazaar-espionage-telegram-signal-android-gref-1</image:title></image:image><lastmod>2023-08-30T10:46:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/28/data-breach-at-french-govt-agency-exposes-info-of-10-million-people/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/pole.jpg</image:loc><image:title>pole</image:title></image:image><lastmod>2023-08-28T10:53:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/28/recovering-from-a-supply-chain-attack-what-are-the-lessons-to-learn-from-the-3cx-hack/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/3cx-supply-chain-attacks.jpeg</image:loc><image:title>3cx-supply-chain-attacks</image:title></image:image><lastmod>2023-08-28T10:37:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/25/mitigating-risk-data-loss-prevention-helps-prevent-security-disasters/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/csm_dlp_thumbnail_6d02fbd585.jpg</image:loc><image:title>csm_dlp_thumbnail_6d02fbd585</image:title></image:image><lastmod>2023-08-25T10:21:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/24/dont-skip-out-on-this-back-to-school-supply/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/csm_thumbnail_04657c01e6.jpg</image:loc><image:title>csm_thumbnail_04657c01e6</image:title></image:image><lastmod>2023-08-24T10:27:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/23/do-you-need-to-sacrifice-privacy-for-security/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/1791682031__1__d5052cc17e.jpg</image:loc><image:title>1791682031__1__d5052cc17e</image:title></image:image><lastmod>2023-08-23T10:40:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/22/eset-global-support-wins-2023-sc-awards-in-excellence-for-best-customer-service/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/podium-1080x1080-1.jpg</image:loc><image:title>podium-1080x1080-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/mccarty-quote-card-1200x628-1.png</image:loc><image:title>mccarty-quote-card-1200x628-1</image:title></image:image><lastmod>2023-08-22T10:15:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/21/winrar-flaw-lets-hackers-run-programs-when-you-open-rar-archives/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/rar-2.jpg</image:loc><image:title>rar-2</image:title></image:image><lastmod>2023-08-21T12:32:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/21/a-bards-tale-how-fake-ai-bots-try-to-install-malware/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/bards-tale-1920x1080-1.jpeg</image:loc><image:title>bards-tale-1920x1080-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2023-08-21T12:21:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/21/robot-vacuums-may-be-doing-more-than-they-claim/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/vacuum1080x1080-copy.jpeg</image:loc><image:title>vacuum1080x1080-copy</image:title></image:image><lastmod>2023-08-21T09:58:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/15/reinstalling-eset-for-peak-performance/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/csm_reinstalling_eset_thumbnail_3430ba3bc1.jpg</image:loc><image:title>csm_reinstalling_eset_thumbnail_3430ba3bc1</image:title></image:image><lastmod>2023-08-15T10:19:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/14/recoveries-and-backups/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/data-leak.jpg</image:loc><image:title>data-leak</image:title></image:image><lastmod>2023-08-14T10:30:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/11/time-is-money-and-online-game-scammers-have-lots-of-it/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2023-08-11T10:17:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/10/fingerprints-all-over-can-browser-fingerprinting-increase-website-security/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-08-10T09:30:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/09/psni-data-breach-two-crucial-vulnerabilities-one-big-mess/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/data-breach-psni.jpg</image:loc><image:title>data-breach-psni</image:title></image:image><lastmod>2023-08-09T09:38:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/03/the-grand-theft-of-voice-the-concept-of-a-virtual-kidnap/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/voice-theft-1920x1080-2.png</image:loc><image:title>voice-theft-1920x1080-2</image:title></image:image><lastmod>2023-08-03T09:55:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/02/operating-system-updates-are-critical-to-security-see-how-eset-products-are-impacted-by-end-of-life-for-windows-10/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/windows-101.png</image:loc><image:title>windows-101</image:title></image:image><lastmod>2023-08-02T09:57:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/01/hackers-steal-signal-whatsapp-user-data-with-fake-android-chat-app-safechat/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/android-security.jpg</image:loc><image:title>android-security</image:title></image:image><lastmod>2023-08-01T10:31:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/08/01/quantum-computing-will-it-break-crypto-security-within-a-few-years/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/08/quantum-computing.jpeg</image:loc><image:title>quantum-computing</image:title></image:image><lastmod>2023-08-01T10:21:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/31/captcha-security-to-end-for-google-and-apple-users/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/comp.jpg</image:loc><image:title>comp</image:title></image:image><lastmod>2023-07-31T11:20:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/31/is-backdoor-access-oppressive-week-in-security-with-tony-anscombe/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/is-backdoor-access-oppressive-week-security-tony-anscombe.jpeg</image:loc><image:title>is-backdoor-access-oppressive-week-security-tony-anscombe</image:title></image:image><lastmod>2023-07-31T10:31:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/28/why-business-device-management-should-keep-green-practices-in-mind/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/city.jpg</image:loc><image:title>city</image:title></image:image><lastmod>2023-07-28T11:55:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/27/intruder-from-within-or-is-it/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/intruder-1080x1080-1.png</image:loc><image:title>intruder-1080x1080-1</image:title></image:image><lastmod>2023-07-27T09:56:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/26/gathering-dust-and-data-how-robotic-vacuums-can-spy-on-you/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/hero-image-vacuum.jpeg</image:loc><image:title>hero-image-vacuum</image:title></image:image><lastmod>2023-07-26T11:59:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/25/dear-all-what-are-some-common-subject-lines-in-phishing-emails/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/phishing-lines-hero-image.jpeg</image:loc><image:title>phishing-lines-hero-image</image:title></image:image><lastmod>2023-07-25T10:50:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/24/cloud-security-the-truth-of-the-matter-or-how-it-can-save-your-business/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/cloud.jpg</image:loc><image:title>cloud</image:title></image:image><lastmod>2023-07-24T10:54:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/21/8-common-work-from-home-scams-to-avoid/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/home-scams-1080x1080-1.png</image:loc><image:title>home-scams-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/home-scams-1200x628-1.png</image:loc><image:title>home-scams-1200x628-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/work-from-home-scams.jpeg</image:loc><image:title>work-from-home-scams</image:title></image:image><lastmod>2023-07-21T11:12:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/21/estee-lauder-beauty-giant-breached-by-two-ransomware-gangs/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/estee.jpg</image:loc><image:title>estee</image:title></image:image><lastmod>2023-07-21T10:36:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/20/child-identity-theft-how-do-i-keep-my-kids-personal-data-safe/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/1200x628-1.jpg</image:loc><image:title>1200x628-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/kids_identity_n.jpg</image:loc><image:title>kids_identity_n</image:title></image:image><lastmod>2023-07-20T10:34:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/18/protect-yourself-from-ticketing-scams-ahead-of-the-premier-league-summer-series-usa-tour/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/premier-league-2-1080x1080-1.png</image:loc><image:title>premier-league-2-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/premier-league-2-1200x628-1.png</image:loc><image:title>premier-league-2-1200x628-1</image:title></image:image><lastmod>2023-07-18T10:14:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/17/spotify-reportedly-makes-users-private-playlists-public/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/spotify-accounts-hijacked-credential-stuffing-attacks-623x432-1.jpg</image:loc><image:title>spotify-accounts-hijacked-credential-stuffing-attacks-623x432-1</image:title></image:image><lastmod>2023-07-17T11:22:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/14/usb-drive-malware-attacks-spiking-again-in-first-half-of-2023/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/usb_-623x432-1.jpg</image:loc><image:title>usb_-623x432-1</image:title></image:image><lastmod>2023-07-14T10:14:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/13/the-danger-within-5-steps-you-can-take-to-combat-insider-threats/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/1080x1080.jpg</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/1200x628.jpg</image:loc><image:title>1200x628</image:title></image:image><lastmod>2023-07-13T09:33:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/12/eset-research-podcast-finding-the-mythical-blacklotus-bootkit/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/eset-research-podcast-thumbnail-623x432-1.jpg</image:loc><image:title>eset-research-podcast-thumbnail-623x432-1</image:title></image:image><lastmod>2023-07-12T10:17:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/11/eset-threat-report-h1-2023/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/eset-threat-report-h1-2023-thumbnail-623x432-1.jpg</image:loc><image:title>eset-threat-report-h1-2023-thumbnail-623x432-1</image:title></image:image><lastmod>2023-07-11T10:21:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/10/eset-achieves-certification-in-av-comparatives-first-anti-tampering-test-marking-the-importance-of-these-advanced-security-features-in-business-products/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/1080x1080.png</image:loc><image:title>1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/1200x628.png</image:loc><image:title>1200x628</image:title></image:image><lastmod>2023-07-10T10:49:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/07/eset-research-follows-the-comeback-of-the-infamous-botnet-emotet-targeting-mainly-japan-and-south-europe/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/emotet-eset-threat-research-623x432-1.jpg</image:loc><image:title>emotet-eset-threat-research-623x432-1</image:title></image:image><lastmod>2023-07-07T09:08:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/06/good-for-you-email-scam-claiming-to-be-a-garda-child-pornography-investigation-targets-potential-irish-victims/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/scam-1.jpg</image:loc><image:title>scam</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/scam.jpg</image:loc><image:title>scam</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/convening.jpg</image:loc><image:title>convening</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/good-for-you-1.jpg</image:loc><image:title>good-for-you-1</image:title></image:image><lastmod>2023-07-06T11:21:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/04/deepfaking-it-what-to-know-about-deepfake%e2%80%91driven-sextortion-schemes/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/deepfake-1200x628-1.png</image:loc><image:title>deepfake-1200x628-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/deepfake-1080x1080-1.png</image:loc><image:title>deepfake-1080x1080</image:title></image:image><lastmod>2023-07-04T10:29:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/04/5-things-to-remember-when-using-snapchat/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/eset_sko_articles_foto_snapchat_v2.png</image:loc><image:title>ESET_SKO_articles_foto_Snapchat_V2</image:title></image:image><lastmod>2023-07-04T10:17:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/07/03/verizon-2023-dbir-whats-new-this-year-and-top-takeaways-for-smbs/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/07/verizon-dbir-2023-data-breaches-smbs-takeaways-623x432-1.jpg</image:loc><image:title>verizon-dbir-2023-data-breaches-smbs-takeaways-623x432-1</image:title></image:image><lastmod>2023-07-03T10:51:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/30/employee-monitoring-is-bossware-right-for-your-company/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/employee-software-monitoring-bossware-tattleware-623x432-1.jpg</image:loc><image:title>employee-software-monitoring-bossware-tattleware-623x432-1</image:title></image:image><lastmod>2023-06-30T10:55:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/28/schools-out-for-summer-but-its-not-time-to-let-your-cyber-guard-down/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/vacations-cyber-risks-privacy-children-623x432-1.jpg</image:loc><image:title>vacations-cyber-risks-privacy-children-623x432-1</image:title></image:image><lastmod>2023-06-28T10:37:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/27/how-to-decrease-security-liabilities-for-smbs-look-at-cyber-risks-through-the-eyes-of-an-insurer/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/14268-623x432-1.jpg</image:loc><image:title>14268-623x432-1</image:title></image:image><lastmod>2023-06-27T10:02:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/26/twitter-hacker-sentenced-to-five-years-in-prison/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/twitter-2623x432-1.jpg</image:loc><image:title>twitter-2623x432-1</image:title></image:image><lastmod>2023-06-26T11:50:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/26/should-the-cybersecurity-world-prepare-for-ai-based-critical-infrastructure-attacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/ai-role-1200x628-1.png</image:loc><image:title>ai-role-1200x628-1</image:title></image:image><lastmod>2023-06-26T11:34:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/23/lowering-your-energy-costs-esets-contribution-to-greener-it-practices/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/cloud-business-1.jpg</image:loc><image:title>cloud-business</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/cloud-business.jpg</image:loc><image:title>cloud-business</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/energy-623x432-1.jpg</image:loc><image:title>energy-623x432-1</image:title></image:image><lastmod>2023-06-23T10:10:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/22/passwords-out-passkeys-in-are-you-ready-to-make-the-switch/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/passkeys-passwordless-account-security-623x432-1.jpg</image:loc><image:title>passkeys-passwordless-account-security-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/image-7.png</image:loc><image:title>image-7</image:title></image:image><lastmod>2023-06-22T10:06:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/21/over-100000-chatgpt-accounts-stolen-via-info-stealing-malware/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/chatgpt-623x432-1.jpg</image:loc><image:title>chatgpt-623x432-1</image:title></image:image><lastmod>2023-06-21T10:52:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/21/going-on-vacation-soon-stay-one-step-ahead-of-travel-scammers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/vacation-cybercrime-threats-623x432-1.jpg</image:loc><image:title>vacation-cybercrime-threats-623x432-1</image:title></image:image><lastmod>2023-06-21T10:47:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/20/hackers-use-fake-onlyfans-pics-to-drop-info-stealing-malware/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/spyware-623x432-1.jpg</image:loc><image:title>spyware-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/onlyfans-623x432-1.jpg</image:loc><image:title>onlyfans-623x432-1</image:title></image:image><lastmod>2023-06-20T08:55:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/20/reddit-hackers-threaten-to-leak-data-stolen-in-february-breach/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/reddit_breach-623x432-1.png</image:loc><image:title>reddit_breach-623x432-1</image:title></image:image><lastmod>2023-06-20T08:35:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/16/stop-cyberbullying-day-prevention-is-everyones-responsibility/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/cyberbullying-prevention-responsibility-teens-623x432-1.jpg</image:loc><image:title>cyberbullying-prevention-responsibility-teens-623x432-1</image:title></image:image><lastmod>2023-06-16T11:17:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/16/moveit-hack-update-hacker-gang-clop-publishes-victim-names-on-dark-web/</loc><lastmod>2023-06-16T11:06:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/15/massive-phishing-campaign-uses-6000-sites-to-impersonate-100-brands/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/phishing-scam.jpg</image:loc><image:title>phishing-scam</image:title></image:image><lastmod>2023-06-15T12:20:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/15/spacecobra-group-using-android-gravityrat-goes-after-whatsapp-backups/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/android-gravityrat-whatsapp-backups-bingechat-chatico-623x432-1.jpg</image:loc><image:title>android-gravityrat-whatsapp-backups-bingechat-chatico-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/image-6.png</image:loc><image:title>image-6</image:title></image:image><lastmod>2023-06-15T11:39:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/13/facebook-scam-targets-pages-of-irish-political-parties-media-and-businesses/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/alert_n.jpg</image:loc><image:title>alert_n</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2023-06-13T12:17:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/13/cyber-insurance-101-what-is-it-and-does-my-company-need-it/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/cyber-insurance-101-cybersecurity-623x432-1.jpg</image:loc><image:title>cyber-insurance-101-cybersecurity-623x432-1</image:title></image:image><lastmod>2023-06-13T10:58:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/12/strava-heatmap-feature-can-be-abused-to-find-home-addresses/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/strava-623x432-1-1.jpg</image:loc><image:title>Strava-623x432</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/strava-623x432-1.jpg</image:loc><image:title>strava-623x432-1</image:title></image:image><lastmod>2023-06-12T09:21:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/09/eset-research-deconstructs-asylum-ambuscade-group-focused-on-cybercrime-cyberespionage-and-cyberattacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/asylum-ambuscade-crimeware-cyberespionage-623x432-1.jpg</image:loc><image:title>asylum-ambuscade-crimeware-cyberespionage-623x432-1</image:title></image:image><lastmod>2023-06-09T12:36:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/08/deepfakes-being-used-in-sextortion-scams/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/sextortion-623x415-1.png</image:loc><image:title>sextortion-623x415-1</image:title></image:image><lastmod>2023-06-08T12:04:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/08/hear-no-evil-ultrasound-attacks-on-voice-assistants/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/nuit-ultrasound-attacks-voice-assistants-623x432-1.jpg</image:loc><image:title>nuit-ultrasound-attacks-voice-assistants-623x432-1</image:title></image:image><lastmod>2023-06-08T11:01:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/06/moveit-hack-bbc-ba-and-boots-among-cyber-attack-victims/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/hackers-623x415-1.jpg</image:loc><image:title>hackers-623x415-1</image:title></image:image><lastmod>2023-06-07T13:02:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/07/moveit-hack-update-bbc-ba-and-boots-issued-with-ultimatum-by-cyber-gang-clop/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/hackers-623x415-1-1.jpg</image:loc><image:title>hackers-623x415-1-1</image:title></image:image><lastmod>2023-06-07T13:00:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/07/7-tips-for-spotting-a-fake-mobile-app/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/fake-apps-mobile-security-privacy-623x432-1.jpg</image:loc><image:title>fake-apps-mobile-security-privacy-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-06-07T12:15:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/02/eset-tops-the-2023-performance-malware-protection-tests-for-consumer-products-and-receives-advanced-awards/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/fxm0hu6wcae9tg1.jpg</image:loc><image:title>fxm0hu6wcae9tg1</image:title></image:image><lastmod>2023-06-02T10:35:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/06/01/all-eyes-on-apis-top-3-api-security-risks-and-how-to-mitigate-them/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/06/api-cybersecurity-risks-623x432-1.jpg</image:loc><image:title>api-cybersecurity-risks-623x432-1</image:title></image:image><lastmod>2023-06-01T12:23:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/31/artificial-intelligence-could-lead-to-extinction-experts-warn/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/2023-ai.jpg</image:loc><image:title>2023-ai</image:title></image:image><lastmod>2023-05-31T10:38:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/31/5-free-osint-tools-for-social-media/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/herramientas-osint-redes-sociales-3.jpg</image:loc><image:title>herramientas-osint-redes-sociales-3</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2023-05-31T10:32:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/30/360m-records-exposed-in-free-vpn-data-breach/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/vpns-expose-user-data-623x432-1.jpg</image:loc><image:title>vpns-expose-user-data-623x432-1</image:title></image:image><lastmod>2023-05-30T11:48:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/30/tricks-of-the-trade-how-a-cybercrime-ring-operated-a-multi%e2%80%91level-fraud-scheme/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/cybercrime-ring-fraud.jpg</image:loc><image:title>cybercrime-ring-fraud</image:title></image:image><lastmod>2023-05-30T11:33:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/29/how-to-boost-childrens-creativity-with-ai/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/chatgpt-kids.jpg</image:loc><image:title>chatgpt-kids</image:title></image:image><lastmod>2023-05-29T10:32:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/26/phishers-use-encrypted-file-attachments-to-steal-microsoft-365-account-credentials/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/microsoft.jpg</image:loc><image:title>microsoft</image:title></image:image><lastmod>2023-05-26T10:48:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/26/digital-security-for-the-self%e2%80%91employed-staying-safe-without-an-it-team-to-help/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/cybersecurity-self-employed-sole-traders-623x432-1.jpg</image:loc><image:title>cybersecurity-self-employed-sole-traders-623x432-1</image:title></image:image><lastmod>2023-05-26T10:16:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/25/new-powerexchange-malware-backdoors-microsoft-exchange-servers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/microsoft-exchange-servers.jpg</image:loc><image:title>microsoft-exchange-servers</image:title></image:image><lastmod>2023-05-25T10:51:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/25/eset-research-reveals-new-analysis-of-acecryptor-used-by-crimeware-it-hits-computers-10000-times-every-month/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/acecrypter-analysis-malware-eset-623x432-1.jpg</image:loc><image:title>acecrypter-analysis-malware-eset-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2023-05-25T10:13:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/24/ireland-fines-facebook-owner-meta-e1-2bn-for-mishandling-user-information/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/meta-623x432-2.jpg</image:loc><image:title>meta-623x432-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/meta-623x432-1.jpg</image:loc><image:title>meta-623x432-1</image:title></image:image><lastmod>2023-05-24T11:39:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/23/legitimate-android-app-irecorder-turns-malicious-within-a-year-spies-on-its-users-eset-research-discovers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/android-app-ahmyth-rat-file-exfiltration-623x432-1.jpg</image:loc><image:title>android-app-ahmyth-rat-file-exfiltration-623x432-1</image:title></image:image><lastmod>2023-05-23T10:27:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/22/android-phones-are-vulnerable-to-fingerprint-brute-force-attacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/android-623x427-1.jpg</image:loc><image:title>android-623x427-1</image:title></image:image><lastmod>2023-05-22T10:29:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/19/5-useful-search-engines-for-internet%e2%80%91connected-devices-and-services/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/buscadores-dispositivos-servicios-conectados-internet.jpg</image:loc><image:title>buscadores-dispositivos-servicios-conectados-internet</image:title></image:image><lastmod>2023-05-19T09:26:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/18/new-google-zip-domains-spark-debate-among-cybersecurity-experts/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/google.jpg</image:loc><image:title>google</image:title></image:image><lastmod>2023-05-18T12:29:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/18/meet-ai-your-new-colleague-could-it-expose-your-companys-secrets/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/ai-chatbot-colleague-company-data-privacy-security-623x432-1.jpg</image:loc><image:title>ai-chatbot-colleague-company-data-privacy-security-623x432-1</image:title></image:image><lastmod>2023-05-18T11:12:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/17/you-may-not-care-where-you-download-software-from-but-malware-does/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/software-downloading-cybersecurity-623x432-1.jpg</image:loc><image:title>software-downloading-cybersecurity-623x432-1</image:title></image:image><lastmod>2023-05-17T12:19:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/16/microsoft-is-scanning-the-inside-of-password-protected-zip-files-for-malware/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/micro-623x415-1.jpg</image:loc><image:title>micro-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/microsoft_623x432.png</image:loc><image:title>microsoft_623x432</image:title></image:image><lastmod>2023-05-16T11:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/16/google-launching-tools-to-identify-misleading-and-ai-images/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/google-623x415-1.jpg</image:loc><image:title>google-623x415-1</image:title></image:image><lastmod>2023-05-16T10:27:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/15/how-is-chatgpt-revolutionising-communication-and-education/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/aikids-623x432-1.jpg</image:loc><image:title>aikids-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/aikids2-623x432-1.jpg</image:loc><image:title>aikids2-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/skoai4.jpg</image:loc><image:title>skoai4</image:title></image:image><lastmod>2023-05-15T11:23:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/12/why-you-need-parental-control-software-and-5-features-to-look-for/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/parental-control-software-features-cybersecurity-privacy-623x432-1.jpg</image:loc><image:title>parental-control-software-features-cybersecurity-privacy-623x432-1</image:title></image:image><lastmod>2023-05-12T11:08:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/11/turning-on-stealth-mode-5-simple-strategies-for-staying-under-the-radar-online/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/stealth-mode-staying-under-radar-online-623x432-1.jpg</image:loc><image:title>stealth-mode-staying-under-radar-online-623x432-1</image:title></image:image><lastmod>2023-05-11T10:20:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/10/eset-apt-activity-report-q4-2022-q1-2023/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/eset-apt-activity-report-q42022-q12023-623x432-1.jpg</image:loc><image:title>eset-apt-activity-report-q42022-q12023-623x432-1</image:title></image:image><lastmod>2023-05-10T09:13:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/09/microsoft-enforces-number-matching-to-fight-mfa-fatigue-attacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/laptop-5603790_640-623x427-1.jpg</image:loc><image:title>laptop-5603790_640-623x427-1</image:title></image:image><lastmod>2023-05-09T09:20:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/08/traveling-your-zero-trust-journey-with-eset/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/csm_zero_trust_banner_4db63091a6.jpg</image:loc><image:title>csm_zero_trust_banner_4db63091a6</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/zero_trust.png</image:loc><image:title>zero_trust</image:title></image:image><lastmod>2023-05-08T09:23:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/05/media-expresses-fears-hackers-could-take-british-coronation-broadcast-offline/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/cyber-coronation-623x416-1.jpg</image:loc><image:title>cyber-coronation-623x416-1</image:title></image:image><lastmod>2023-05-05T10:32:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/05/gmail-gets-blue-verification-checks-to-protect-against-spoofing-and-phishing/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/google-623x432-3.jpg</image:loc><image:title>google-623x432</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/google-623x432-2.jpg</image:loc><image:title>google-623x432-2</image:title></image:image><lastmod>2023-05-05T10:07:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/04/creating-strong-yet-user%e2%80%91friendly-passwords-tips-for-your-business-password-policy/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/organizations-password-policy-guidelines-623x432-1.jpg</image:loc><image:title>organizations-password-policy-guidelines-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-05-04T09:57:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/03/using-discord-dont-play-down-its-privacy-and-security-risks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/discord-security-privacy-risks-623x432-1.jpg</image:loc><image:title>discord-security-privacy-risks-623x432-1</image:title></image:image><lastmod>2023-05-03T11:27:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/02/rsa-conference-2023-how-ai-will-infiltrate-the-world/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/rsa-conference-2023-ai-artificial-intelligence-623x432-1.jpg</image:loc><image:title>rsa-conference-2023-ai-artificial-intelligence-623x432-1</image:title></image:image><lastmod>2023-05-02T13:43:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/05/02/ai-godfather-geoffrey-hinton-warns-of-dangers-as-he-quits-google/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/05/dgsk-623x432-1.jpg</image:loc><image:title>dgsk-623x432-1</image:title></image:image><lastmod>2023-05-02T13:43:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/21/eset-ireland-security-bsides-dublin-2023/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/righardz.jpg</image:loc><image:title>righardz</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/bsides.jpg</image:loc><image:title>bsides</image:title></image:image><lastmod>2023-04-21T09:14:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/21/the-eus-cyber-solidarity-act-security-operations-centers-to-the-rescue/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/cyber-solidarity-act-eu-soc-cybersecurity-2-copy-623x432-1.jpg</image:loc><image:title>cyber-solidarity-act-eu-soc-cybersecurity-2-copy-623x432-1</image:title></image:image><lastmod>2023-04-21T08:50:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/20/meet-wexford-gaas-live-updates-team-protected-by-eset-2/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/eset-gaa-wx.png</image:loc><image:title>eset-gaa-wx</image:title></image:image><lastmod>2023-04-20T09:24:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/20/discarded-not-destroyed-old-routers-reveal-corporate-secrets/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/corporate-it-router.jpg</image:loc><image:title>corporate-it-router</image:title></image:image><lastmod>2023-04-20T09:04:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/19/pc-running-slow-10-ways-you-can-speed-it-up/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/speed-up-slow-pc-623x432-1.jpg</image:loc><image:title>speed-up-slow-pc-623x432-1</image:title></image:image><lastmod>2023-04-19T10:41:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/18/lockbit-ransomware-targets-apple-silicon-macs-for-the-first-time/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/mac-623x432-1.jpg</image:loc><image:title>mac-623x432-1</image:title></image:image><lastmod>2023-04-18T11:08:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/17/google-issues-new-warning-for-3-billion-chrome-users/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/google623x415.jpg</image:loc><image:title>google623x415</image:title></image:image><lastmod>2023-04-17T10:43:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/14/safety-first-5-cybersecurity-tips-for-freelance-bloggers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/blogging-cybersecurity-privacy-risks-623x432-1.jpg</image:loc><image:title>blogging-cybersecurity-privacy-risks-623x432-1</image:title></image:image><lastmod>2023-04-14T11:35:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/13/linkedin-and-microsoft-entra-introduce-a-new-way-to-verify-your-workplace/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/linkedin-623x432-1.jpg</image:loc><image:title>linkedin-623x432-1</image:title></image:image><lastmod>2023-04-13T11:40:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/12/experts-warn-of-new-spyware-threat-targeting-journalists-and-political-figures/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/spyware2-623x432-1.jpg</image:loc><image:title>spyware2-623x432-1</image:title></image:image><lastmod>2023-04-12T11:18:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/12/what-are-the-cybersecurity-concerns-of-smbs-by-sector/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/smb-cybersecurity-digital-security-survey-sentiment-623x432-1.jpg</image:loc><image:title>smb-cybersecurity-digital-security-survey-sentiment-623x432-1</image:title></image:image><lastmod>2023-04-12T11:08:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/11/ftxs-cybersecurity-was-hilariously-bad/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/x-623x432-1.jpg</image:loc><image:title>x-623x432-1</image:title></image:image><lastmod>2023-04-11T10:29:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/11/10-things-to-look-out-for-when-buying-a-password-manager/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/password-managers-buyers-guide-623x432-1.jpg</image:loc><image:title>password-managers-buyers-guide-623x432-1</image:title></image:image><lastmod>2023-04-11T10:24:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/06/google-now-requires-android-apps-to-let-you-delete-your-account/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/google34234234.jpg</image:loc><image:title>google34234234</image:title></image:image><lastmod>2023-04-06T11:54:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/06/cleaning-up-your-social-media-and-passwords-what-to-trash-and-what-to-treasure/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/social-media-tipps-623x432-1.jpg</image:loc><image:title>social-media-tipps-623x432-1</image:title></image:image><lastmod>2023-04-06T11:33:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/05/why-you-should-spring-clean-your-home-network-and-audit-your-backups/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/smarthome-623x432-1.jpg</image:loc><image:title>smarthome-623x432-1</image:title></image:image><lastmod>2023-04-05T10:33:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/04/microsoft-tightens-onenote-security-by-auto-blocking-120-risky-file-extensions/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/mic5.jpg</image:loc><image:title>mic5</image:title></image:image><lastmod>2023-04-04T10:57:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/04/tidy-up-your-digital-life-like-a-pro/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/digital-spring-cleaning-laptop-smartphone-tablet-623x432-1.jpg</image:loc><image:title>digital-spring-cleaning-laptop-smartphone-tablet-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-04-04T10:05:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/04/03/avoiding-data-backup-failures/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/04/0-30.jpg</image:loc><image:title>0-30</image:title></image:image><lastmod>2023-04-03T12:35:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/31/world-backup-day-avoiding-a-data-disaster-is-a-forever-topic/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/data-world-backup-day-1-623x432-1.jpg</image:loc><image:title>data-world-backup-day-1-623x432-1</image:title></image:image><lastmod>2023-03-31T11:28:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/30/elon-musk-and-top-ai-researchers-call-for-pause-on-giant-ai-experiments/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/artificial-intelligence-623x415-1.jpg</image:loc><image:title>artificial-intelligence-623x415-1</image:title></image:image><lastmod>2023-03-30T11:46:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/29/pig-butchering-scams-the-anatomy-of-a-fast%e2%80%91growing-threat/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/pig-butchering-scam-investment-romance-fraud-623x432-1.png</image:loc><image:title>pig-butchering-scam-investment-romance-fraud-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/image-7.png</image:loc><image:title>image-7</image:title></image:image><lastmod>2023-03-29T12:00:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/28/staying-safe-on-onlyfans-the-naked-truth/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/onlyfans-privacy-security-623x432-1.jpg</image:loc><image:title>onlyfans-privacy-security-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2023-03-28T11:41:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/27/what-tiktok-knows-about-you-and-what-you-should-know-about-tiktok/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/tiktok-personal-data-congress-ceo-testimony-623x432-1.png</image:loc><image:title>tiktok-personal-data-congress-ceo-testimony-623x432-1</image:title></image:image><lastmod>2023-03-27T11:15:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/24/whats-in-store-for-msps-trends-for-2023/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/msp.jpg</image:loc><image:title>msp</image:title></image:image><lastmod>2023-03-24T10:03:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/23/oops-windows-screenshot-tool-may-be-saving-stuff-you-cropped-out-too/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/crop2.jpg</image:loc><image:title>crop2</image:title></image:image><lastmod>2023-03-23T12:24:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/23/understanding-managed-detection-and-response-and-what-to-look-for-in-an-mdr-solution/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/managed-detection-response-mdr-solution-1-623x432-1.png</image:loc><image:title>managed-detection-response-mdr-solution-1-623x432-1</image:title></image:image><lastmod>2023-03-23T11:56:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/22/svbs-collapse-is-a-scammers-dream-dont-get-caught-out/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/svb-silicon-valley-bank-scams-fraud-623x432-1.jpg</image:loc><image:title>svb-silicon-valley-bank-scams-fraud-623x432-1</image:title></image:image><lastmod>2023-03-22T11:45:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/21/twitter-ends-free-sms-2fa-heres-how-you-can-protect-your-account-now/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/twitter-2fa-sms-account-security-623x432-1.jpg</image:loc><image:title>twitter-2fa-sms-account-security-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2023-03-21T12:58:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/16/cybercriminals-exploit-svb-collapse-to-steal-money-and-data/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/svb.jpg</image:loc><image:title>svb</image:title></image:image><lastmod>2023-03-16T11:57:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/15/students-from-all-over-the-world-can-apply-for-machine-learning-summer-school/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/machine-learning623x432.jpg</image:loc><image:title>machine-learning623x432</image:title></image:image><lastmod>2023-03-15T12:25:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/14/heart-device-maker-says-hack-affected-1-million-patients/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/medical-devices-hacking-heart623x432.jpg</image:loc><image:title>medical-devices-hacking-heart623x432</image:title></image:image><lastmod>2023-03-14T17:28:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/13/5-signs-youve-fallen-for-a-scam-and-what-to-do-next/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/signs-scams-victim-623x432-1.jpg</image:loc><image:title>signs-scams-victim-623x432-1</image:title></image:image><lastmod>2023-03-15T07:15:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/10/whatsapp-rather-be-blocked-in-uk-than-weaken-security/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/whatsapp-data-623x415-1.jpg</image:loc><image:title>whatsapp-data-623x415-1</image:title></image:image><lastmod>2023-03-10T12:51:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/10/common-whatsapp-scams-and-how-to-avoid-them/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/whatsapp-scams-avoiding-623x432-1.jpg</image:loc><image:title>whatsapp-scams-avoiding-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2023-03-11T08:24:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/09/forthcoming-eu-metaverse-policy-cannot-shy-away-from-cybersecurity-warn-experts/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/europe-cybersecurity-623x432-1.jpg</image:loc><image:title>europe-cybersecurity-623x432-1</image:title></image:image><lastmod>2023-03-09T11:44:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/08/a-woman-from-mars-life-in-the-pursuit-of-space-exploration/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/michaela-musilova-astrobiologist-623x432-1.jpg</image:loc><image:title>michaela-musilova-astrobiologist-623x432</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-03-08T10:47:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/07/eset-research-espionage-honey-trap-targets-officials-in-various-countries/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/transparent-tribe623x432.jpg</image:loc><image:title>transparent-tribe623x432</image:title></image:image><lastmod>2023-03-07T12:15:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/07/barcelonas-hospital-clinic-hit-by-ransomware-cyberattack/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/cybercrime_act-623x432-1.jpg</image:loc><image:title>cybercrime_act-623x432-1</image:title></image:image><lastmod>2023-03-07T11:35:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/06/what-does-5000-buy-you-on-a-hacking-forum/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/0-6.jpg</image:loc><image:title>0-6</image:title></image:image><lastmod>2023-03-06T12:17:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/03/major-new-crypto-wallet-phishing-campaign-targets-trezor-users/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/crypt623x427.jpg</image:loc><image:title>crypt623x427</image:title></image:image><lastmod>2023-03-03T11:30:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/02/eset-research-mustang-pandas-latest-backdoor-targets-europe-asia-and-australia/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/mqsttang-apt-mustang-panda-backdoor-623x432-1.jpg</image:loc><image:title>mqsttang-apt-mustang-panda-backdoor-623x432-1</image:title></image:image><lastmod>2023-03-02T11:33:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/03/01/eset-research-analyzes-blacklotus-a-uefi-bootkit-that-can-bypass-uefi-secure-boot-on-fully-patched-systems/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/03/blacklotus-uefi-bootkit-secure-boot-623x432-1.jpg</image:loc><image:title>blacklotus-uefi-bootkit-secure-boot-623x432-1</image:title></image:image><lastmod>2023-03-01T12:05:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/28/eset-podcast-ransomware-trashed-data-android-threats-soared-in-t3-2022/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/eset-research-podcast-rsa-623x416-1.png</image:loc><image:title>eset-research-podcast-rsa-623x416-1</image:title></image:image><lastmod>2023-02-28T11:28:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/27/linkedin-scammers-step-up-sophistication-of-online-attacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/linkedin-scams-jobs-phishing-email-623x416-1.jpg</image:loc><image:title>linkedin-scams-jobs-phishing-email-623x416-1</image:title></image:image><lastmod>2023-02-27T19:37:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/24/watch-what-you-wear-the-pitfalls-of-wearables-security/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/csm_wearables-cb-1080x1080__1__bb1edf822e.png</image:loc><image:title>csm_wearables-cb-1080x1080__1__bb1edf822e</image:title></image:image><lastmod>2023-02-24T11:14:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/23/eset-discovers-winordll64-backdoor-likely-part-of-the-lazarus-arsenal/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/lazarus-malware-north-korea-winordll64-backdoor-623x432-1.jpg</image:loc><image:title>lazarus-malware-north-korea-winordll64-backdoor-623x432-1</image:title></image:image><lastmod>2023-02-23T12:21:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/23/activision-confirms-data-breach-exposing-employee-and-game-info/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/acti.jpg</image:loc><image:title>acti</image:title></image:image><lastmod>2023-02-23T12:10:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/22/will-chatgpt-start-writing-killer-malware/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/chatgpt-cyberattacks-scams-phishing-623x432-1.jpg</image:loc><image:title>chatgpt-cyberattacks-scams-phishing-623x432-1</image:title></image:image><lastmod>2023-02-22T12:55:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/21/eset-smb-digital-security-sentiment-report-the-damaging-effects-of-a-breach/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/eset-smb-sentiment-report-2022-623x432-1.jpg</image:loc><image:title>eset-smb-sentiment-report-2022-623x432-1</image:title></image:image><lastmod>2023-02-21T11:28:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/20/instagram-and-facebook-to-get-paid-for-verification/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/igfb.jpg</image:loc><image:title>igfb</image:title></image:image><lastmod>2023-02-20T11:39:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/20/security-amidst-a-global-frost/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/security-defense-technology-war-cyber-kinetic-623x432-1.jpg</image:loc><image:title>security-defense-technology-war-cyber-kinetic-623x432-1</image:title></image:image><lastmod>2023-02-20T11:12:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/17/a-roadmap-for-msp-success-in-2023/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2023-02-17T12:03:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/16/confident-cybersecurity-means-fewer-headaches-for-smbs/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/smb-cybersecurity-digital-security-survey-sentiment-623x432-1.jpg</image:loc><image:title>smb-cybersecurity-digital-security-survey-sentiment-623x432-1</image:title></image:image><lastmod>2023-02-17T11:59:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/15/10-signs-that-scammers-have-you-in-their-sights/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/scams-warning-signs-red-flags-623x432-1.jpg</image:loc><image:title>scams-warning-signs-red-flags-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2023-02-15T13:37:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/14/chatgpt-will-you-be-my-valentine/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/chatbot-chatgpt-valentines-day-technology-623x432-1.jpg</image:loc><image:title>chatbot-chatgpt-valentines-day-technology-623x432-1</image:title></image:image><lastmod>2023-02-14T13:00:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/13/alexa-who-else-is-listening/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/alexa-smart-speaker-voice-assistant-listening-eavesdropping-623x432-1.jpg</image:loc><image:title>alexa-smart-speaker-voice-assistant-listening-eavesdropping-623x432-1</image:title></image:image><lastmod>2023-02-13T10:18:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/10/paypal-and-twitter-abused-in-turkey-relief-donation-scams-and-hackers-breach-reddit/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/ptr2-1.jpg</image:loc><image:title>ptr2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/ptr2.jpg</image:loc><image:title>ptr2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/ptr.jpg</image:loc><image:title>ptr</image:title></image:image><lastmod>2023-02-10T12:25:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/09/eset-threat-report-t3-2022/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/eset-threat-report-t3-2022-623x432-1.jpg</image:loc><image:title>eset-threat-report-t3-2022-623x432-1</image:title></image:image><lastmod>2023-02-09T11:24:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/08/into-the-void-your-tech-and-security-in-digital-darkness/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/tech-security-internet-disconnected-digital-vacuum-623x432-1.jpg</image:loc><image:title>tech-security-internet-disconnected-digital-vacuum-623x432-1</image:title></image:image><lastmod>2023-02-08T12:36:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/07/online-safety-laws-whats-in-store-for-childrens-digital-playgrounds/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/online-safety-privacy-data-laws-children-thumbnail-623x432-1.jpg</image:loc><image:title>online-safety-privacy-data-laws-children-thumbnail-623x432-1</image:title></image:image><lastmod>2023-02-07T10:31:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/03/is-that-survey-real-or-fake-how-to-spot-a-survey-scam/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/surveys-online-scams-safe-data-privacy-thumbnail-623x432-1.jpg</image:loc><image:title>surveys-online-scams-safe-data-privacy-thumbnail-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-02-04T06:20:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/02/malicious-email-campaign-uses-fake-docusign-messages-to-exfiltrate-login-credentials/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/login623x432.jpg</image:loc><image:title>login623x432</image:title></image:image><lastmod>2023-02-02T11:19:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/01/less-is-more-conquer-your-digital-clutter-before-it-conquers-you/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/online-clutter-digital-footprint-623x432-1.jpg</image:loc><image:title>online-clutter-digital-footprint-623x432-1</image:title></image:image><lastmod>2023-02-01T11:57:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/02/01/chatgpt-clone-apps-collecting-personal-data-on-ios-play-store/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/02/android623x410.jpg</image:loc><image:title>android623x410</image:title></image:image><lastmod>2023-02-01T11:47:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/31/eset-apt-activity-report-t3-2022/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/eset-t3-2022-apt-activity-report-623x432-1.jpg</image:loc><image:title>eset-t3-2022-apt-activity-report-623x432-1</image:title></image:image><lastmod>2023-01-31T13:15:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/30/swiftslicer-new-destructive-wiper-malware-strikes-ukraine/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/swiftslicer-destructive-wipermalware-ukraine-623x432-2.jpg</image:loc><image:title>swiftslicer-destructive-wipermalware-ukraine-623x432-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/swiftslicer-destructive-wipermalware-ukraine-623x432-1.jpg</image:loc><image:title>swiftslicer-destructive-wipermalware-ukraine-623x432-1</image:title></image:image><lastmod>2023-01-31T13:01:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/26/why-your-data-is-more-valuable-than-you-may-realise/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/personal-data-privacy-week-623x432-1.jpg</image:loc><image:title>personal-data-privacy-week-623x432-1</image:title></image:image><lastmod>2023-01-26T11:36:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/25/hackers-behind-riot-games-breach-stole-league-of-legends-source-code/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/lol.png</image:loc><image:title>lol</image:title></image:image><lastmod>2023-01-25T10:59:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/24/5-valuable-skills-your-children-can-learn-by-playing-video-games/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/gaming-video-games-children-skills-623x432-1.jpg</image:loc><image:title>gaming-video-games-children-skills-623x432-1</image:title></image:image><lastmod>2023-01-31T13:17:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/23/hybrid-play-leveling-the-playing-field-in-online-video-gaming-and-beyond/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/hybrid-work-lives-cybersecurity-trends-2023-thumbnail-623x432-1-2.jpg</image:loc><image:title>hybrid-work-lives-cybersecurity-trends-2023-thumbnail-623x432-1-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2023-01-24T12:15:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/20/tech-support-scammers-are-still-at-it-heres-what-to-look-out-for-in-2023/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/tech-support-scams-fraud-warning-623x432-1.jpg</image:loc><image:title>tech-support-scams-fraud-warning-623x432-1</image:title></image:image><lastmod>2023-01-31T13:40:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/17/top-10-venmo-scams-and-how-to-stay-safe/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/venmo-scams-fraud-payments-623x432-1.jpg</image:loc><image:title>venmo-scams-fraud-payments-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-01-18T12:20:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/18/ftx-says-415-million-lost-in-hack/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/crypto.jpg</image:loc><image:title>crypto</image:title></image:image><lastmod>2023-01-18T12:14:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/16/hybrid-commerce-blurring-the-lines-between-business-and-pleasure/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/hybrid-work-lives-cybersecurity-trends-2023-thumbnail-623x432-1-1.jpg</image:loc><image:title>hybrid-work-lives-cybersecurity-trends-2023-thumbnail-623x432-1-1</image:title></image:image><lastmod>2023-01-17T13:02:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/12/tiktok-trend-helps-thieves-hack-kia-hyundai-models/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/wls_tiktok-parental-control_unspl_fb-623x432-1.jpg</image:loc><image:title>wls_tiktok-parental-control_unspl_fb-623x432-1</image:title></image:image><lastmod>2023-01-15T07:50:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/13/cybersecurity-trends-2023-securing-our-hybrid-lives/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/cybersecurity-trends-2023-hybrid-lives-623x432-1.jpg</image:loc><image:title>cybersecurity-trends-2023-hybrid-lives-623x432-1</image:title></image:image><lastmod>2023-01-12T10:48:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/11/now-you-can-legally-repair-your-tech-sort-of/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/technology-devices-right-repair-legislation-623x432-1.jpg</image:loc><image:title>technology-devices-right-repair-legislation-623x432-1</image:title></image:image><lastmod>2023-01-11T15:12:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/10/windows-7-and-windows-8-will-stop-getting-critical-security-updates-in-one-week/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/8.jpg</image:loc><image:title>8</image:title></image:image><lastmod>2023-01-10T11:56:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/10/eset-research-discovers-strongpity-apt-groups-espionage-campaign-targeting-android-users-with-trojanized-telegram-app/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/strongpity-android-malware-backdoor-espionage-623x432-1.jpg</image:loc><image:title>strongpity-android-malware-backdoor-espionage-623x432-1</image:title></image:image><lastmod>2023-01-10T11:05:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/09/hybrid-work-turning-business-platforms-into-preferred-social-spaces/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/hybrid-work-lives-cybersecurity-trends-2023-thumbnail-623x432-1.jpg</image:loc><image:title>hybrid-work-lives-cybersecurity-trends-2023-thumbnail-623x432-1</image:title></image:image><lastmod>2023-01-09T13:40:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/06/ransomware-target-list/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/ransomware623x427.jpg</image:loc><image:title>ransomware623x427</image:title></image:image><lastmod>2023-01-06T10:39:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/05/gaming-how-much-is-too-much-for-our-children/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/gaming-children-screen-time-excessive-623x432-1.jpg</image:loc><image:title>gaming-children-screen-time-excessive-623x432-1</image:title></image:image><lastmod>2023-01-05T12:10:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/04/the-doctor-will-see-you-now-virtually-tips-for-a-safe-telehealth-visit/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/telehealth-privacy-security-online-thumbnail-623x432-1.jpg</image:loc><image:title>telehealth-privacy-security-online-thumbnail-623x432-1</image:title></image:image><lastmod>2023-01-04T11:58:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2023/01/03/the-worlds-most-common-passwords-what-to-do-if-yours-is-on-the-list/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/common-worst-passwords-623x432-1.jpg</image:loc><image:title>common-worst-passwords-623x432</image:title></image:image><lastmod>2023-01-03T11:34:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/10/press-clippings-2022/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/anygator-29.12.2022.jpg</image:loc><image:title>anygator-29.12.2022</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/anygator-21.12.2022.jpg</image:loc><image:title>anygator-21.12.2022</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/anygator-20.12.2022c.jpg</image:loc><image:title>anygator-20.12.2022c</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/anygator-20.12.2022b.jpg</image:loc><image:title>anygator-20.12.2022b</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/anygator-20.12.2022.jpg</image:loc><image:title>anygator-20.12.2022</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/anygator-15.12.2022b.jpg</image:loc><image:title>anygator-15.12.2022b</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/anygator-15.12.2022.jpg</image:loc><image:title>anygator-15.12.2022</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2023/01/anygator-14.12.2022.jpg</image:loc><image:title>anygator-14.12.2022</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/anygator-13.12.2022c.jpg</image:loc><image:title>anygator-13.12.2022c</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/anygator-13.12.2022b.jpg</image:loc><image:title>anygator-13.12.2022b</image:title></image:image><lastmod>2023-01-03T10:27:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/29/cybersecurity-trends-and-challenges-to-look-out-for-in-2023/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/cybersecurity-outlook2023-1200x628-1.png</image:loc><image:title>cybersecurity-outlook2023-1200x628</image:title></image:image><lastmod>2022-12-29T10:59:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/21/tis-the-season-for-gaming-keeping-children-safe-and-parents-sane/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/gaming-holiday-christmas-cybersecurity-privacy-kids-623x415-1.jpg</image:loc><image:title>gaming-holiday-christmas-cybersecurity-privacy-kids-623x415-1</image:title></image:image><lastmod>2022-12-21T11:34:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/20/tis-the-season-not-to-get-smished/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/fkarc0hwqaat2iu.png</image:loc><image:title>fkarc0hwqaat2iu</image:title></image:image><lastmod>2022-12-20T12:43:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/20/help-my-kid-has-asked-santa-for-a-smartphone/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/children-technology-smartphone-security-privacy-623x432-1.jpg</image:loc><image:title>children-technology-smartphone-security-privacy-623x432-1</image:title></image:image><lastmod>2022-12-20T12:06:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/20/how-to-set-up-parental-controls-on-your-childs-new-smartphone/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/children-smartphones-parental-controls-security-privacy-623x432-1.jpg</image:loc><image:title>children-smartphones-parental-controls-security-privacy-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2022-12-20T12:00:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/15/how-chatgpt-can-turn-anyone-into-a-ransomware-and-malware-threat-actor/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/ransomware.jpg</image:loc><image:title>ransomware</image:title></image:image><lastmod>2022-12-15T11:34:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/15/traveling-for-the-holidays-stay-cyber%e2%80%91safe-with-these-tips/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/holidays-travel-cybersecurity-tips-623x432-1.jpg</image:loc><image:title>holidays-travel-cybersecurity-tips-623x432-1</image:title></image:image><lastmod>2022-12-15T11:16:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/14/executives-are-four-times-more-likely-to-be-victims-of-phishing-than-workers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/ohno-1.jpg</image:loc><image:title>ohno</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/ohno.jpg</image:loc><image:title>ohno</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/exec-623x427-1.jpg</image:loc><image:title>exec-623x427-1</image:title></image:image><lastmod>2022-12-14T12:17:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/13/uber-says-third-party-responsible-for-latest-breach/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/uber623x410.jpg</image:loc><image:title>uber623x410</image:title></image:image><lastmod>2022-12-13T11:37:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/13/top-tips-for-security%e2%80%91-and-privacy%e2%80%91enhancing-holiday-gifts/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/holiday-gifts-technology-security-privacy-623x432-1.jpg</image:loc><image:title>holiday-gifts-technology-security-privacy-623x432-1</image:title></image:image><lastmod>2022-12-13T11:27:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/08/fake-investment-ads-persist-on-metas-social-networks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/meta-623x432-1.jpg</image:loc><image:title>meta-623x432-1</image:title></image:image><lastmod>2022-12-08T11:10:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/07/agrius-group-deploys-new-wiper-through-supply-chain-attack-in-diamond-industry-eset-research-discovers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/fantasy-agrius-wiper-supply-chain-cyberattack-623x432-1.jpg</image:loc><image:title>fantasy-agrius-wiper-supply-chain-cyberattack-623x432-1</image:title></image:image><lastmod>2022-12-07T11:16:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/06/tractors-vs-threat-actors-how-to-hack-a-farm/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/tractors-farms-hacking-digital-security-risks-623x432-1.jpg</image:loc><image:title>tractors-farms-hacking-digital-security-risks-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-12-06T10:40:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/01/top-tips-to-save-energy-used-by-your-electronic-devices/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/energy-saving-tips-623x432-1.jpg</image:loc><image:title>energy-saving-tips-623x432-1</image:title></image:image><lastmod>2022-12-01T11:57:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/12/01/warning-do-not-use-hive-social/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/12/hive.jpg</image:loc><image:title>hive</image:title></image:image><lastmod>2022-12-01T11:43:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/11/30/cyber-criminals-exploiting-naked-tiktok-challenge/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/tiktok-scams-avoid-623x415-1.jpg</image:loc><image:title>tiktok-scams-avoid-623x415-1</image:title></image:image><lastmod>2022-11-30T12:54:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/11/29/know-your-payment-options-how-to-shop-and-pay-safely-this-holiday-season/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/holiday-shopping-black-friday-cyber-monday-payments-safety-623x432-1.jpg</image:loc><image:title>holiday-shopping-black-friday-cyber-monday-payments-safety-623x432-1</image:title></image:image><lastmod>2022-11-29T12:31:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/11/24/10-tips-to-avoid-black-friday-and-cyber-monday-scams/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/black-friday-cyber-monday-sales-scams-623x432-1.jpg</image:loc><image:title>black-friday-cyber-monday-sales-scams-623x432-1</image:title></image:image><lastmod>2022-11-24T12:38:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/11/23/tor-vs-vpn-which-should-you-choose/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/tor-vpn-comparison-623x432-1.jpg</image:loc><image:title>tor-vpn-comparison-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2022-11-23T12:11:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/11/22/security-fatigue-is-real-heres-how-to-overcome-it/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/security-fatigue-employees-overload-information-623x432-1.jpg</image:loc><image:title>security-fatigue-employees-overload-information-623x432-1</image:title></image:image><lastmod>2022-11-22T12:20:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/11/17/open-banking-tell-me-what-you-buy-and-ill-tell-you-who-you-are/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/open-banking-privacy-data-personal-implications-623x432-1.jpg</image:loc><image:title>open-banking-privacy-data-personal-implications-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2022-11-17T11:39:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/11/14/eset-apt-activity-report-t2-2022/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/apt-activity-report-thumbnail2-623x432-1.jpg</image:loc><image:title>apt-activity-report-thumbnail2-623x432-1</image:title></image:image><lastmod>2022-11-14T11:32:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/11/10/toward-the-cutting-edge-smbs-contemplating-enterprise-security/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/eset-smb-sentiment-report-2022-623x432-1.jpg</image:loc><image:title>eset-smb-sentiment-report-2022-623x432-1</image:title></image:image><lastmod>2022-11-10T11:39:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/11/09/10-common-security-mistakes-and-how-to-avoid-them/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/cybersecurity-privacy-mistakes-avoid-623x432-1.jpg</image:loc><image:title>cybersecurity-privacy-mistakes-avoid-623x432-1</image:title></image:image><lastmod>2022-11-09T12:04:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/11/08/hacking-baby-monitors-can-be-childs-play-heres-how-to-stay-safe/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/baby-monitors-cybersecurity-privacy-risks-623x432-1.jpg</image:loc><image:title>baby-monitors-cybersecurity-privacy-risks-623x432-1</image:title></image:image><lastmod>2022-11-08T11:27:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/11/03/the-future-starts-now-10-major-challenges-facing-cybersecurity/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/desafios-ciberseguridad.jpg</image:loc><image:title>desafios-ciberseguridad</image:title></image:image><lastmod>2022-11-03T13:48:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/11/02/the-spy-who-rented-to-me-throwing-the-spotlight-on-hidden-cameras-in-airbnbs/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/hidden-cameras-airbnb-623x432-1.jpg</image:loc><image:title>hidden-cameras-airbnb-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/11/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-11-02T10:24:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/28/why-your-phone-is-slow-and-how-to-speed-it-up/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/phone-android-ios-iphone-slow-tips-speeding-up-copy-623x432-1.jpg</image:loc><image:title>phone-android-ios-iphone-slow-tips-speeding-up-copy-623x432-1</image:title></image:image><lastmod>2022-10-28T11:44:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/26/parcel-delivery-scams-are-on-the-rise-do-you-know-what-to-watch-out-for/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/parcel-delivery-scams-email-phishing-623x432-1.jpg</image:loc><image:title>parcel-delivery-scams-email-phishing-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2022-10-26T10:40:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/24/5-reasons-to-keep-your-software-and-devices-up-to-date/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/why-updates-software-devices-matter-623x432-1.jpg</image:loc><image:title>why-updates-software-devices-matter-623x432-1</image:title></image:image><lastmod>2022-10-24T10:49:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/21/masquerading-as-a-translation-app-furball-spyware-goes-after-iranian-citizens-eset-research-finds/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/domestic-kitten-apt-furball-malware-iran-623x432-1.jpg</image:loc><image:title>domestic-kitten-apt-furball-malware-iran-623x432-1</image:title></image:image><lastmod>2022-10-21T10:35:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/19/dont-get-scammed-when-buying-tickets-online/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/fake-online-tickets-scams-623x432-1.jpg</image:loc><image:title>fake-online-tickets-scams-623x432-1</image:title></image:image><lastmod>2022-10-19T11:45:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/17/5-steps-to-protect-your-school-from-cyberattacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/cybersecurity-schools-teachers-admins-623x415-1.jpg</image:loc><image:title>cybersecurity-schools-teachers-admins-623x415-1</image:title></image:image><lastmod>2022-10-17T11:03:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/14/strong-arm-tactics-to-keep-your-clients-safe/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/csm_arm-based-devices-for-msps_f1acbd4652.jpg</image:loc><image:title>csm_arm-based-devices-for-msps_f1acbd4652</image:title></image:image><lastmod>2022-10-14T10:49:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/13/how-scammers-target-zelle-users-and-how-you-can-stay-safe/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/zelle-scams-fraud-p2p-payment-apps-623x416-1.jpg</image:loc><image:title>zelle-scams-fraud-p2p-payment-apps-623x416-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2022-10-13T08:31:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/11/apt-group-polonium-targets-israel-with-creepy-malware/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/polonium-apt-group-malware-israel-targeted-623x415-1.jpg</image:loc><image:title>polonium-apt-group-malware-israel-targeted-623x415-1</image:title></image:image><lastmod>2022-10-11T10:46:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/10/steam-account-stolen-heres-how-to-get-it-back/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/robaron-cuneta-stem-como-recuperarla.jpg</image:loc><image:title>robaron-cuneta-stem-como-recuperarla</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-10-10T10:53:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/07/the-need-to-change-cybersecurity-for-the-next-generation/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/csam-cybersecurity-approach-future-623x415-1.jpg</image:loc><image:title>csam-cybersecurity-approach-future-623x415-1</image:title></image:image><lastmod>2022-10-07T11:28:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/06/eset-launches-dedicated-xdr-security-solutions-for-managed-service-providers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/msp.png</image:loc><image:title>msp</image:title></image:image><lastmod>2022-10-06T11:14:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/05/eset-threat-report-t2-2022/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/eset-threat-report-t2-2022-623x432-1.jpg</image:loc><image:title>eset-threat-report-t2-2022-623x432-1</image:title></image:image><lastmod>2022-10-05T10:31:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/28/protecting-teens-from-sextortion-what-parents-should-know/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/sextortion-teens-tips-parents-623x415-1.png</image:loc><image:title>sextortion-teens-tips-parents-623x415-1</image:title></image:image><lastmod>2022-10-05T09:51:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/10/04/8-questions-to-ask-yourself-before-getting-a-home-security-camera/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/security-camera-privacy-risks-623x415-2.jpg</image:loc><image:title>security-camera-privacy-risks-623x415</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/10/security-camera-privacy-risks-623x415-1.jpg</image:loc><image:title>security-camera-privacy-risks-623x415-1</image:title></image:image><lastmod>2022-10-04T11:48:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/30/lazarus-targets-aerospace-company-in-the-netherlands-and-political-journalist-in-belgium-to-steal-data/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/lazarus-apt-eset-research-amazon-netherlands-belgium-623x415-1.jpg</image:loc><image:title>lazarus-apt-eset-research-amazon-netherlands-belgium-623x415-1</image:title></image:image><lastmod>2022-09-30T11:20:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/27/what-happens-with-a-hacked-instagram-account-and-how-to-recover-it/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/instagram-account-hacked-recovery-623x415-1.jpg</image:loc><image:title>instagram-account-hacked-recovery-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-35.png</image:loc><image:title>image-35</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-34.png</image:loc><image:title>image-34</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-33.png</image:loc><image:title>image-33</image:title></image:image><lastmod>2022-09-27T10:27:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/26/5-tips-to-help-children-navigate-the-internet-safely/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/online-safety-children-768x432-1.jpg</image:loc><image:title>online-safety-children-768x432-1</image:title></image:image><lastmod>2022-09-26T11:49:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/23/how-does-biometric-authentication-work/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/biometric-authentication-how-works-pros-cons-623x415-1.jpg</image:loc><image:title>biometric-authentication-how-works-pros-cons-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-32.png</image:loc><image:title>image-32</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-31.png</image:loc><image:title>image-31</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-30.png</image:loc><image:title>image-30</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-29.png</image:loc><image:title>image-29</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-28.png</image:loc><image:title>image-28</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-27.png</image:loc><image:title>image-27</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-26.png</image:loc><image:title>image-26</image:title></image:image><lastmod>2022-09-23T10:51:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/22/eset-announces-its-inaugural-heroes-of-progress/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-25.png</image:loc><image:title>image-25</image:title></image:image><lastmod>2022-09-22T10:15:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/19/can-your-iphone-be-hacked-what-to-know-about-ios-security/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/iphone-ios-hacking-malware-removal-623x415-1.jpg</image:loc><image:title>iphone-ios-hacking-malware-removal-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/fresh1.jpg</image:loc><image:title>fresh1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-24.png</image:loc><image:title>image-24</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-23.png</image:loc><image:title>image-23</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-22.png</image:loc><image:title>image-22</image:title></image:image><lastmod>2022-09-19T10:54:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/15/third%e2%80%91party-cookies-how-they-work-and-how-to-stop-them-from-tracking-you-across-the-web/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/cookies-1080x1080-1.png</image:loc><image:title>cookies-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/cookies-1200x628-1.png</image:loc><image:title>cookies-1200x628-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-21.png</image:loc><image:title>image-21</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-20.png</image:loc><image:title>image-20</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-19.png</image:loc><image:title>image-19</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-18.png</image:loc><image:title>image-18</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-17.png</image:loc><image:title>image-17</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-16.png</image:loc><image:title>image-16</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-15.png</image:loc><image:title>image-15</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-14.png</image:loc><image:title>image-14</image:title></image:image><lastmod>2022-09-15T11:25:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/14/eset-uncovers-new-linux-backdoor-targeting-a-hong-kong-university/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/sidewalk-sparklinggoblin-malware-linux-623x415-1.jpg</image:loc><image:title>sidewalk-sparklinggoblin-malware-linux-623x415-1</image:title></image:image><lastmod>2022-09-14T11:15:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/13/why-is-my-wi%e2%80%91fi-slow-and-how-do-i-make-it-faster/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/wifi-speed-faster-623x415-1.png</image:loc><image:title>wifi-speed-faster-623x415-1</image:title></image:image><lastmod>2022-09-13T11:00:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/07/rdp-on-the-radar-an-up%e2%80%91close-view-of-evolving-remote-access-threats/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/rdp-remote-desktop-protocol-623x415-1.jpg</image:loc><image:title>rdp-remote-desktop-protocol-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2022-09-07T11:51:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/06/eset-research-uncovers-new-cyberespionage-group-worok-targeting-companies-governments-mostly-in-asia/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/worok-1200x628-1.png</image:loc><image:title>worok-1200x628-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/worok-1080x1080-1.png</image:loc><image:title>Worok 1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/worok-apt-asia-malware-cyber-espionage-623x415-1.jpg</image:loc><image:title>worok-apt-asia-malware-cyber-espionage-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2022-09-06T10:15:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/05/kids-back-at-school-check-devices-protected-check/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/csm_bts-1080x1080_1__dee44abc2f.png</image:loc><image:title>csm_bts-1080x1080_1__dee44abc2f</image:title></image:image><lastmod>2022-09-05T10:07:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/09/02/digital-security-and-the-generations/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/csm_1080x1080_024badf42c.png</image:loc><image:title>csm_1080x1080_024badf42c</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-09-02T12:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/31/how-to-take-control-over-your-digital-legacy/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/digital-legacy-assets-facebook-instagram-google-623x415-1.jpg</image:loc><image:title>digital-legacy-assets-facebook-instagram-google-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/image-9.png</image:loc><image:title>image-9</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/image-6.png</image:loc><image:title>image-6</image:title></image:image><lastmod>2022-08-31T11:21:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/30/tikshock-dont-get-caught-out-by-these-5-tiktok-scams/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/tiktok-scams-avoid-623x415-1.jpg</image:loc><image:title>tiktok-scams-avoid-623x415-1</image:title></image:image><lastmod>2022-08-30T10:53:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/29/french-hospital-crippled-by-cyberattack/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/hospimage.jpg</image:loc><image:title>hospimage</image:title></image:image><lastmod>2022-08-29T10:47:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/25/what-is-doxing-and-how-to-protect-yourself/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/what-is-doxing-defense-623x415-1.jpg</image:loc><image:title>what-is-doxing-defense-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/image-4.png</image:loc><image:title>image-4</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2022-08-25T10:55:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/23/is-your-personal-data-all-over-the-internet-7-steps-to-cleaning-up-your-online-presence/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/clean-up-digital-footprint-1-623x415-1.jpg</image:loc><image:title>clean-up-digital-footprint-1-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/image-1.png</image:loc><image:title>image-1</image:title></image:image><lastmod>2022-08-23T10:37:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/19/a-step%e2%80%91by%e2%80%91step-guide-to-enjoy-linkedin-safely/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/linkedin623x418.jpg</image:loc><image:title>linkedin623x418</image:title></image:image><lastmod>2022-08-19T11:36:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/18/how-a-spoofed-email-passed-the-spf-check-and-landed-in-my-inbox/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/shutterstock_449510731-small.jpg</image:loc><image:title>Phishing,Attack,Computer,System</image:title></image:image><lastmod>2022-08-18T10:01:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/17/black-hat-usa-2022-burnout-a-significant-issue/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/shutterstock_1434785840-623x432-1.jpg</image:loc><image:title>shutterstock_1434785840-623x432-1</image:title></image:image><lastmod>2022-08-17T10:52:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/16/black-hat-windows-isnt-the-only-mass-casualty-platform-anymore/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/shutterstock_495781054-623x432-1.jpg</image:loc><image:title>shutterstock_495781054-623x432-1</image:title></image:image><lastmod>2022-08-16T10:08:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/15/safety-first-how-to-tweak-the-settings-on-your-dating-apps/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/dating_apps-1-623x432-1.jpg</image:loc><image:title>dating_apps-1-623x432-1</image:title></image:image><lastmod>2022-08-15T10:38:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/12/an-eighties-classic-zero-trust/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/shutterstock_1958585461-thumb-623x432-1.jpg</image:loc><image:title>shutterstock_1958585461-thumb-623x432-1</image:title></image:image><lastmod>2022-08-12T09:53:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/09/how-to-check-if-your-pc-has-been-hacked-and-what-to-do-next/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/hack-1080x1080-623x432-1.png</image:loc><image:title>hack-1080x1080-623x432-1</image:title></image:image><lastmod>2022-08-20T18:31:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/05/cash-app-fraud-10-common-scams-to-watch-out-for/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/cashapp-scams-fraud-623x415-1.jpg</image:loc><image:title>cashapp-scams-fraud-623x415-1</image:title></image:image><lastmod>2022-08-05T10:56:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/04/dont-get-singed-by-scammers-while-youre-carrying-the-torch-for-tinder/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/tinder-1080x1080-623x432-1.jpg</image:loc><image:title>tinder-1080x1080-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-08-04T10:38:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/03/start-as-you-mean-to-go-on-the-top-10-steps-to-securing-your-new-computer/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/1200x628-square-623x432-1.png</image:loc><image:title>1200x628-square-623x432-1</image:title></image:image><lastmod>2022-08-03T12:45:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/08/02/staying-safe-online-how-to-browse-the-web-securely/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/08/browse-web-safely-wls-1-623x432-1.png</image:loc><image:title>browse-web-safely-wls-1-623x432-1</image:title></image:image><lastmod>2022-08-02T11:08:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/07/20/eset-research-podcast-hot-security-topics-at-rsa-or-mostly-hype/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/07/eset-research-podcast-rsa-623x416-1.png</image:loc><image:title>eset-research-podcast-rsa-623x416-1</image:title></image:image><lastmod>2022-07-20T10:50:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/07/19/eset-research-discovers-new-threat-to-mac-users-cloudmensis-spies-on-them-in-targeted-operation/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/07/cloudmensis-macos-malware-spyware-backdoor-623x416-1.jpg</image:loc><image:title>cloudmensis-macos-malware-spyware-backdoor-623x416-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/07/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2022-07-19T12:52:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/07/14/api-security-moves-mainstream/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/07/api-security-software-623x432-1.jpg</image:loc><image:title>api-security-software-623x432-1</image:title></image:image><lastmod>2022-07-14T12:22:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/07/13/collaboration-and-knowledge-sharing-key-to-progress-in-cybersecurity/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/07/colaboracion-divulgacion-informacion-ciberseguridad.jpg</image:loc><image:title>colaboracion-divulgacion-informacion-ciberseguridad</image:title></image:image><lastmod>2022-07-13T11:47:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/07/12/play-it-safe-5-reasons-not-to-download-pirated-games/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/07/pirated-games-cybersecurity-privacy-risks-623x415-1.jpg</image:loc><image:title>pirated-games-cybersecurity-privacy-risks-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/07/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2022-07-12T10:44:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/07/11/avoid-travel-digital-disasters/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/07/0-12.jpg</image:loc><image:title>0-12</image:title></image:image><lastmod>2022-07-11T10:49:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/07/08/driving-to-france-this-summer-watch-out-for-scam-websites-before-you-go/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/07/driving-france-critair-stickers-scam-623x415-1.jpg</image:loc><image:title>driving-france-critair-stickers-scam-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/07/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/07/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-07-08T11:06:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/07/06/8-common-facebook-marketplace-scams-and-how-to-avoid-them/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/07/facebook-marketplace-scams-risks-623x415-1.jpg</image:loc><image:title>facebook-marketplace-scams-risks-623x415-1</image:title></image:image><lastmod>2022-07-06T11:39:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/07/04/cyberattacks-a-very-real-existential-threat-to-organizations/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/07/cyberattacks-real-existential-threat-623x415-1.jpg</image:loc><image:title>cyberattacks-real-existential-threat-623x415-1</image:title></image:image><lastmod>2022-07-04T12:10:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/30/costco-40th-anniversary-scam-targets-whatsapp-users/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/costco-40th-anniversary-whatsapp-scam-623x415-1.jpg</image:loc><image:title>costco-40th-anniversary-whatsapp-scam-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-26.png</image:loc><image:title>image-26</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-25.png</image:loc><image:title>image-25</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-24.png</image:loc><image:title>image-24</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-23.png</image:loc><image:title>image-23</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-22.png</image:loc><image:title>image-22</image:title></image:image><lastmod>2022-06-30T12:02:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/29/do-back-offices-mean-backdoors/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/shared-service-centers-cybersecurity-risks-623x415-1.jpg</image:loc><image:title>shared-service-centers-cybersecurity-risks-623x415-1</image:title></image:image><lastmod>2022-06-29T11:19:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/27/5-ways-cybercriminals-steal-credit-card-details/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/hackerscreditcards.jpg</image:loc><image:title>hackerscreditcards</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-21.png</image:loc><image:title>image-21</image:title></image:image><lastmod>2022-06-27T10:04:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/24/virtual-private-networks-5-common-questions-about-vpns-answered/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/vpn-faq-common-questions-answered-623x415-1.jpg</image:loc><image:title>vpn-faq-common-questions-answered-623x415-1</image:title></image:image><lastmod>2022-06-24T11:26:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/22/5-benefits-of-mobile-device-management/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/benefits-of-mdm-banner.jpg</image:loc><image:title>benefits-of-mdm-banner</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/mdm1.jpg</image:loc><image:title>mdm1</image:title></image:image><lastmod>2022-06-22T09:52:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/21/phishing-awareness-training-help-your-employees-avoid-the-hook/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/phishing-awareness-training-623x415-1.jpg</image:loc><image:title>phishing-awareness-training-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-20.png</image:loc><image:title>image-20</image:title></image:image><lastmod>2022-06-21T11:33:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/20/crypto-mixers-what-are-they-and-how-are-they-used/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/que-es-cripto-mixer-servicio-aninomato-transacciones.jpg</image:loc><image:title>que-es-cripto-mixer-servicio-aninomato-transacciones</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-19.png</image:loc><image:title>image-19</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-18.png</image:loc><image:title>image-18</image:title></image:image><lastmod>2022-06-20T10:41:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/16/how-emotet-is-changing-tactics-in-response-to-microsofts-tightening-of-office-macro-security/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/emotet-malware-botnet-macros-mark-web-623x415-1.jpg</image:loc><image:title>emotet-malware-botnet-macros-mark-web-623x415</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-17.png</image:loc><image:title>image-17</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-16.png</image:loc><image:title>image-16</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-15.png</image:loc><image:title>image-15</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-11.png</image:loc><image:title>image-11</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2022-06-16T11:12:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/15/industroyer-a-cyber%e2%80%91weapon-that-brought-down-a-power-grid/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/industroyer-blackout-anniverary-fifth-623x415-1.jpg</image:loc><image:title>industroyer-blackout-anniverary-fifth-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2022-06-15T10:57:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/14/introducing-eset-netprotect-fighting-threats-at-the-dns-level/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/blog-net-protect-1080x1080-2.png</image:loc><image:title>blog-net-protect-1080x1080-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/blog-net-protect-1200x628-2.png</image:loc><image:title>blog-net-protect-1200x628-2</image:title></image:image><lastmod>2022-06-14T10:59:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/13/rsa-apis-your-organizations-dedicated-backdoors/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/rsac2022-conference-api-security-thumbnail-623x417-1.jpg</image:loc><image:title>rsac2022-conference-api-security-thumbnail-623x417-1</image:title></image:image><lastmod>2022-06-13T11:57:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/10/why-you-shouldnt-post-childrens-photos-online/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/eset_children_photos_online.png</image:loc><image:title>eset_children_photos_online</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/csm_square_pic_be14e14534.png</image:loc><image:title>csm_square_pic_be14e14534</image:title></image:image><lastmod>2022-06-10T09:08:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/09/rsa-digital-healthcare-meets-security-but-does-it-really-want-to/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/rsac-2022-healthcare-devices-623x415-1.jpg</image:loc><image:title>rsac-2022-healthcare-devices-623x415-1</image:title></image:image><lastmod>2022-06-09T11:05:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/08/rsa-spot-the-real-fake/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/deepfakes-rsa-risks-privacy-623x415-1.jpg</image:loc><image:title>deepfakes-rsa-risks-privacy-623x415-1</image:title></image:image><lastmod>2022-06-08T09:22:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/07/cybersecurity-awareness-training-what-is-it-and-what-works-best/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/cybersecurity-awareness-training-employees-623x415-1.jpg</image:loc><image:title>cybersecurity-awareness-training-employees-623x415-1</image:title></image:image><lastmod>2022-06-07T11:01:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/03/eset-research-lazarus-attacks-aerospace-and-defense-contractors-worldwide-while-misusing-linkedin-and-whatsapp/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-3.png</image:loc><image:title>image-3</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-2.png</image:loc><image:title>image-2</image:title></image:image><lastmod>2022-06-03T10:31:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/02/eset-threat-report-t-1-2022/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/threat-report-623x415-1.jpg</image:loc><image:title>threat-report-623x415-1</image:title></image:image><lastmod>2022-06-02T12:33:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/06/01/talking-to-children-about-the-internet-a-kids-perspective/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/children-parents-technology-internet-2-copy-623x415-1.jpg</image:loc><image:title>children-parents-technology-internet-2-copy-623x415-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/06/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-06-01T11:35:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/30/eset-named-an-overall-leader-in-kuppingercoles-report-for-its-endpoint-protection-detection-and-response-capabilities/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/kupi1200x1200.jpg</image:loc><image:title>kupi1200x1200</image:title></image:image><lastmod>2022-05-30T11:49:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/27/learning-by-playing-what-skills-can-your-children-develop-through-video-games/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/risk-kids.jpg</image:loc><image:title>risk-kids</image:title></image:image><lastmod>2022-05-27T10:13:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/26/5-reasons-why-gdpr-was-a-milestone-for-data-protection/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/gdpr-anniversary-privacy-legislation-623x415-1.jpg</image:loc><image:title>gdpr-anniversary-privacy-legislation-623x415-1</image:title></image:image><lastmod>2022-05-26T11:06:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/25/why-eset-is-a-leader-for-managed-service-providers-serving-smbs/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/jankech-quotecard-1080x1080-4.png</image:loc><image:title>jankech-quotecard-1080x1080-4</image:title></image:image><lastmod>2022-05-25T11:27:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/23/common-nft-scams-and-how-to-avoid-them/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/estafas-comunes-nft.jpg</image:loc><image:title>estafas-comunes-nft</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-17.png</image:loc><image:title>image-17</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-16.png</image:loc><image:title>image-16</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-15.png</image:loc><image:title>image-15</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-14.png</image:loc><image:title>image-14</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-13.png</image:loc><image:title>image-13</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-12.png</image:loc><image:title>image-12</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-11.png</image:loc><image:title>image-11</image:title></image:image><lastmod>2022-05-23T11:10:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/19/the-flip-side-of-the-coin-why-crypto-is-catnip-for-criminals/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/wls_cryptominingcybercrime_fhd_kl-623x432-1.jpg</image:loc><image:title>wls_cryptominingcybercrime_fhd_kl-623x432-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-10.png</image:loc><image:title>image-10</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-9.png</image:loc><image:title>image-9</image:title></image:image><lastmod>2022-05-19T11:23:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/18/fake-news-why-do-people-believe-it/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/fake-news-ukraine-623x415-1.jpg</image:loc><image:title>fake-news-ukraine-623x415-1</image:title></image:image><lastmod>2022-05-18T11:12:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/16/the-downside-of-debugging-ransomware/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/ransomware-decryptors-public-release-623x415-1.jpg</image:loc><image:title>ransomware-decryptors-public-release-623x415-1</image:title></image:image><lastmod>2022-05-16T10:28:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/13/opportunity-out-of-crisis-tapping-the-great-resignation-to-close-the-cybersecurity-skills-gap/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/great-resignation-cybersecurity-skills-gap-2-623x415-1.jpg</image:loc><image:title>great-resignation-cybersecurity-skills-gap-2-623x415-1</image:title></image:image><lastmod>2022-05-17T14:07:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/12/10-reasons-why-we-fall-for-scams/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/reasons-why-fall-scams-623x413-1.jpg</image:loc><image:title>reasons-why-fall-scams-623x413-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-8.png</image:loc><image:title>image-8</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-7.png</image:loc><image:title>image-7</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-6.png</image:loc><image:title>image-6</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-5.png</image:loc><image:title>image-5</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-4.png</image:loc><image:title>image-4</image:title></image:image><lastmod>2022-05-12T09:54:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/11/eset-launches-a-global-search-for-heroes-of-progress-looking-for-the-most-progressive-minds-of-the-21st-century/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/hop-1080x1080-1.jpg</image:loc><image:title>hop-1080x1080</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/hop-1200x628-1.jpg</image:loc><image:title>hop-1200x628-1</image:title></image:image><lastmod>2022-05-11T10:13:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/10/theres-no-sugarcoating-it-that-online-sugar-daddy-may-be-a-scammer/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/sugar-daddy-scams-dating-fraud-623x415-1.jpg</image:loc><image:title>sugar-daddy-scams-dating-fraud-623x415</image:title></image:image><lastmod>2022-05-10T10:31:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/09/common-linkedin-scams-beware-of-phishing-attacks-and-fake-job-offers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/linkedin-scams-jobs-phishing-email-623x416-1.jpg</image:loc><image:title>linkedin-scams-jobs-phishing-email-623x416-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-3.png</image:loc><image:title>image-3</image:title></image:image><lastmod>2022-05-09T11:08:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/05/3-most-dangerous-types-of-android-malware/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/lukas-stefanko-623x415-1.jpg</image:loc><image:title>lukas-stefanko-623x415-1</image:title></image:image><lastmod>2022-05-05T09:01:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/04/shields-up/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/csm_main_may4_1f598ca912.jpg</image:loc><image:title>csm_Main_May4_1f598ca912</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-2.png</image:loc><image:title>image-2</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image-1.png</image:loc><image:title>image-1</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2022-05-04T11:03:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/05/03/whats-behind-the-record%e2%80%91high-number-of-zero-days/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/05/zero-days-vulnerabilities-exploits-increase-623x415-1.jpg</image:loc><image:title>zero-days-vulnerabilities-exploits-increase-623x415-1</image:title></image:image><lastmod>2022-05-03T11:21:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/29/when-nft-is-the-creative-limit/</loc><lastmod>2022-04-29T10:56:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/28/a-lookback-under-the-ta410-umbrella-its-cyberespionage-ttps-and-activity/</loc><lastmod>2022-04-28T10:32:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/27/every-moment-secured-on-your-android/</loc><lastmod>2022-04-27T10:48:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/26/the-trouble-with-bec-how-to-stop-the-costliest-internet-scam/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/04/bec-attacks-scams-fraud-623x415-2.jpg</image:loc><image:title>bec-attacks-scams-fraud-623x415</image:title></image:image><lastmod>2022-04-26T11:24:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/25/webcam-hacking-how-to-know-if-someone-may-be-spying-on-you-through-your-webcam/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/04/webcam-hacking-spying-623x416-2.png</image:loc><image:title>webcam-hacking-spying-623x416</image:title></image:image><lastmod>2022-04-25T11:18:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/21/critical-infrastructure-under-cyberattack-for-longer-than-you-might-think/</loc><lastmod>2022-04-21T10:36:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/20/the-algorithms-that-suggest-your-kids-content/</loc><lastmod>2022-04-20T08:29:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/19/eset-research-discovers-vulnerabilities-in-lenovo-consumer-laptops-exposing-users-to-risk-of-uefi-malware-installation/</loc><lastmod>2022-04-19T11:05:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/12/industroyer2-industroyer-reloaded/</loc><lastmod>2022-04-12T10:17:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/11/coercion-trolling-and-abuse-keep-your-children-safe-when-theyre-meeting-people-online/</loc><lastmod>2022-04-11T10:13:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/08/how-secure-is-your-cloud-storage-mitigating-data-security-risks-in-the-cloud/</loc><lastmod>2022-04-08T11:19:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/07/new-windows-on-arm64-device-eset-protects-both-at-work-and-at-play/</loc><lastmod>2022-04-07T10:03:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/06/eset-research-warns-of-android-apps-on-the-prowl-for-banking-credentials/</loc><lastmod>2022-04-06T11:35:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/05/were-going-on-tor/</loc><lastmod>2022-04-05T09:37:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/04/eset-refreshes-product-portfolio-to-better-protect-businesses-on-their-digital-journey/</loc><lastmod>2022-04-04T10:25:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/04/01/cybersecurity-survival-tips-for-small-businesses-2022-edition/</loc><lastmod>2022-04-01T11:33:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/31/women-in-tech-unique-insights-from-a-lifelong-pursuit-of-innovation/</loc><lastmod>2022-03-31T10:22:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/30/eset-honoured-by-crn-5-star-rating-in-2022-partner-program-guide/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/03/fpb9tc3xmak_wry.jpg</image:loc><image:title>FPB9Tc3XMAk_WrY</image:title></image:image><lastmod>2022-03-30T09:56:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/29/europes-quest-for-energy-independence-and-how-cyber%e2%80%91risks-come-into-play/</loc><lastmod>2022-03-29T10:48:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/28/under-the-hood-of-wslinks-multilayered-virtual-machine/</loc><lastmod>2022-03-28T10:28:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/25/eset-research-discovers-scheme-to-steal-cryptocurrency-from-android-and-iphone-users/</loc><lastmod>2022-03-25T11:30:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/24/the-smb-cybercrime-sweet-spot-small-and-medium-in-both-size-and-protection/</loc><lastmod>2022-03-24T11:09:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/23/eset-research-discovers-mustang-pandas-hodur-cyberespionage-malware-old-tricks-new-korplug-variant/</loc><lastmod>2022-03-23T10:55:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/22/defending-the-data-center-the-time-to-act-is-now/</loc><lastmod>2022-03-22T11:26:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/21/addicted-to-the-news-doomscrolling-through-reality/</loc><lastmod>2022-03-21T14:29:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/16/eset-named-a-major-player-in-idc-marketscape/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/03/eset-idc.jpg</image:loc><image:title>eset-idc</image:title></image:image><lastmod>2022-03-16T10:28:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/15/caddywiper-new-wiper-malware-discovered-in-ukraine/</loc><lastmod>2022-03-15T13:06:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/14/a-first-look-at-threat-intelligence-and-threat-hunting-tools/</loc><lastmod>2022-03-14T12:26:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/11/true-or-false-how-to-spot-and-stop-fake-news/</loc><lastmod>2022-03-11T13:14:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/09/eset-recognized-as-a-top-player-in-radicatis-apt-protection-market-quadrant-for-the-third-year-in-a-row/</loc><lastmod>2022-03-09T13:26:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/08/instagram-and-teens-a-quick-guide-for-parents-to-keep-their-kids-safe-2/</loc><lastmod>2022-03-08T12:46:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/07/how-to-restrict-inappropriate-content-and-limit-screen-time-use-parental-control/</loc><lastmod>2022-03-07T12:41:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/04/eset-partners-with-intel-to-enhance-endpoint-security-with-hardware-based-ransomware-detection/</loc><lastmod>2022-03-04T13:13:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/03/eset-research-podcast-ukraines-past-and-present-cyberwar/</loc><lastmod>2022-03-03T12:43:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/02/shieldsup-now-is-the-time-to-double%e2%80%91check-cybersecurity-processes-and-operations/</loc><lastmod>2022-03-02T13:32:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/03/01/eset-research-ukraine-hit-by-destructive-attacks-before-and-during-the-russian-invasion-with-hermeticwiper-and-isaacwiper/</loc><lastmod>2022-03-01T14:06:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/28/beware-of-charity-scams-exploiting-war-in-ukraine/</loc><lastmod>2022-02-28T13:22:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/25/the-past-is-present-riffing-on-a-cybersecurityappropriate-tune-for-black-history-month/</loc><lastmod>2022-02-25T14:58:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/24/hermeticwiper-new-data%e2%80%91wiping-malware-hits-ukraine/</loc><lastmod>2022-02-24T11:52:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/23/technology-progress-and-climate/</loc><lastmod>2022-02-23T11:58:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/22/teenage-cybercrime-how-to-stop-kids-from-taking-the-wrong-path/</loc><lastmod>2022-02-22T12:12:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/21/beneficial-and-risky-a-look-at-augmented-reality-for-children/</loc><lastmod>2022-02-21T11:20:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/18/eset-earns-spot-on-g2s-2022-best-software-awards-for-security-products/</loc><lastmod>2022-02-18T11:40:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/17/questions-linger-after-irss-about%e2%80%91face-on-facial-recognition/</loc><lastmod>2022-02-17T12:13:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/15/put-your-phone-down-or-do-you-feel-fomo/</loc><lastmod>2022-02-15T11:55:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/14/from-the-back-office-to-the-till-cybersecurity-challenges-facing-global-retailers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/02/cybersecurity-retail-payments-eset-report-623x416-1.png</image:loc><image:title>cybersecurity-retail-payments-eset-report-623x416</image:title></image:image><lastmod>2022-02-14T13:15:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/11/when-love-hurts-watch-out-for-romance-scams-this-valentines-day/</loc><lastmod>2022-02-11T10:46:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/10/hidden-in-plain-sight-how-the-dark-web-is-spilling-onto-social-media/</loc><lastmod>2022-02-10T11:29:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/09/us-your-ai-has-to-explain-its-decisions/</loc><lastmod>2022-02-09T12:43:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/08/another-email-scam-as-gaeilge-is-doing-the-rounds/</loc><lastmod>2022-02-09T10:51:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/07/eset-threat-report-attempts-to-exploit-ms-exchange-and-massive-waves-of-password-guessing-were-the-most-frequent-intrusion-vectors/</loc><lastmod>2022-02-08T13:31:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/08/safer-internet-day-together-for-a-better-internet/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/02/safer-internet-day-square.png</image:loc><image:title>Safer Internet Day Square</image:title></image:image><lastmod>2022-02-08T11:00:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/07/eset-recognized-as-top-player-in-radicati-endpoint-security-market-quadrant/</loc><lastmod>2022-02-07T11:55:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/04/think-before-you-scan-how-fraudsters-can-exploit-qr-codes-to-steal-money/</loc><lastmod>2022-02-04T12:20:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/02/03/shoulder-surfing-watch-out-for-eagle%e2%80%91eyed-snoopers-peeking-at-your-phone/</loc><lastmod>2022-02-03T11:35:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/31/how-to-tell-if-your-phone-has-been-hacked/</loc><lastmod>2022-01-31T13:29:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/27/beyond-the-tick-box-what-to-consider-before-agreeing-to-a-privacy-policy/</loc><lastmod>2022-01-27T11:51:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/26/every-breath-you-take-every-move-you-make-do-fitness-trackers-pose-privacy-risks/</loc><lastmod>2022-01-26T13:16:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/25/eset-research-discovers-dazzlespy-macos-malware-spyware/</loc><lastmod>2022-01-25T13:24:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/24/how-i-hacked-my-friends-paypal-account/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2022/01/paypal-original-photo-1.jpg</image:loc><image:title>PayPal Original Photo</image:title></image:image><lastmod>2022-01-24T11:33:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/21/eset-named-a-strategic-leader-in-2021-av-comparatives-endpoint-prevention-and-response-test-2/</loc><lastmod>2022-01-21T11:15:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/20/how-to-know-if-your-email-has-been-hacked/</loc><lastmod>2022-01-20T12:00:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/19/eset-research-investigates-donot-team-cyberespionage-targeting-military-governments/</loc><lastmod>2022-01-19T12:06:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/18/eset-awarded-for-its-advanced-threat-protection-solutions/</loc><lastmod>2022-01-18T12:26:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/17/social-media-in-the-workplace-cybersecurity-dos-and-donts-for-employees/</loc><lastmod>2022-01-17T11:37:28+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/14/tips-for-setting-healthy-tech-boundaries/</loc><lastmod>2022-01-14T11:09:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/13/making-loyalty-pay-how-to-keep-your-loyalty-rewards-safe-from-scams/</loc><lastmod>2022-01-13T12:52:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/12/cryptocurrency-scams-what-to-know-and-how-to-protect-yourself/</loc><lastmod>2022-01-12T11:25:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/11/ces-2022-the-anyone-can-make-an-electric-car-edition/</loc><lastmod>2022-01-11T11:22:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/10/ces-2022-space-security-no-more-flying-blind/</loc><lastmod>2022-01-10T12:32:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/14/press-clippings-2021-cont/</loc><lastmod>2022-01-10T12:27:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/07/ces-2022-more-sensors-than-people/</loc><lastmod>2022-01-07T11:55:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/06/what-your-kids-can-access-on-the-internet/</loc><lastmod>2022-01-06T12:16:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/05/5-ways-hackers-steal-passwords-and-how-to-stop-them/</loc><lastmod>2022-01-05T12:50:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/04/instagram-and-teens-a-quick-guide-for-parents-to-keep-their-kids-safe/</loc><lastmod>2022-01-04T12:12:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/04/breaking-the-habit-top-10-bad-cybersecurity-habits-to-shed-in-2022/</loc><lastmod>2022-01-04T12:00:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2022/01/04/22-cybersecurity-statistics-to-know-for-2022/</loc><lastmod>2022-01-04T11:55:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/12/23/this-holiday-season-give-your-children-the-gift-of-cybersecurity-awareness/</loc><lastmod>2021-12-23T11:01:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/12/22/eset-research-latin-american-banking-trojans-spread-to-europe-at-the-height-of-activity/</loc><lastmod>2021-12-22T10:54:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/12/21/log4shell-eset-blocks-hundreds-of-thousands-of-attack-attempts/</loc><lastmod>2021-12-21T11:03:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/12/20/dont-forget-to-unplug-your-devices-before-you-leave-for-the-holidays/</loc><lastmod>2021-12-20T11:13:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/12/16/what-every-business-leader-needs-to-know-about-log4shell/</loc><lastmod>2021-12-16T11:34:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/12/15/5-warning-signs-your-identity-has-been-stolen/</loc><lastmod>2021-12-15T12:57:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/12/14/log4shell-vulnerability-what-we-know-so-far/</loc><lastmod>2021-12-15T12:37:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/12/09/snaphack-watch-out-for-those-who-can-hack-into-anyones-snapchat/</loc><lastmod>2021-12-09T13:00:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/12/08/securing-the-hybrid-workplace-demands-dynamic-defense/</loc><lastmod>2021-12-08T12:26:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/12/08/looking-to-protect-a-fleet-of-windows-on-arm-pcs-look-no-further-than-eset-endpoint-security/</loc><lastmod>2021-12-08T12:14:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/12/07/5-common-gift-card-scams-and-how-to-spot-them/</loc><lastmod>2021-12-07T11:49:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/12/02/launching-eset-research-podcast-a-peek-behind-the-scenes-of-eset-discoveries/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/12/eset-research-code-logo-thumbnail-623x432-3.png</image:loc><image:title>eset-research-code-logo-thumbnail-623x432</image:title></image:image><lastmod>2021-12-02T12:11:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/12/01/eset-presents-plans-for-eset-campus-innovation-and-technology-hub-in-the-heart-of-europe/</loc><lastmod>2021-12-01T11:22:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/30/more-than-1000-arrested-in-global-crackdown-on-online-fraud/</loc><lastmod>2021-11-30T12:16:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/25/the-triangle-of-holiday-shopping-scams-social-media-and-supply-chain-woes/</loc><lastmod>2021-11-25T11:34:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/24/avoiding-the-shopping-blues-how-to-shop-online-safely-this-holiday-season/</loc><lastmod>2021-11-24T12:02:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/23/what-to-do-if-you-receive-a-data-breach-notice/</loc><lastmod>2021-11-23T12:27:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/18/my-bank-account-was-in-a-shambles-the-ordeal-of-an-identity-theft-victim/</loc><lastmod>2021-11-18T13:01:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/17/eset-research-discovers-watering-hole-attacks-on-websites-in-the-middle-east-with-links-to-candiru-spyware/</loc><lastmod>2021-11-17T10:03:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/16/fbi-systems-compromised-to-send-out-fake-attack-alerts/</loc><lastmod>2021-11-16T12:14:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/11/google-scores-big-win-as-court-blocks-iphone-tracking-lawsuit/</loc><lastmod>2021-11-11T11:15:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/10/robinhood-data-breach-affects-7-million-people/</loc><lastmod>2021-11-10T12:14:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/09/passwordless-authentication-is-your-company-ready-to-move-beyond-passwords/</loc><lastmod>2021-11-09T12:34:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/08/eset-examines-supply-chain-attacks-with-enisa-and-other-high-profile-eu-institutions/</loc><lastmod>2021-11-08T10:01:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/10/eset-named-a-major-player-in-two-modern-endpoint-security-idc-marketscape-reports/</loc><lastmod>2021-11-08T09:46:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/05/google-squashes-android-zero%e2%80%91day-bug-exploited-in-targeted-attacks/</loc><lastmod>2021-11-05T09:27:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/04/win-one-for-privacy-swiss-providers-dont-have-to-talk/</loc><lastmod>2021-11-04T13:31:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/03/whats-it-like-to-work-as-a-malware-researcher-10-questions-answered/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/11/eset-antimalware-day-cybersecurity-pros-malware-researcher-1-623x432-1.png</image:loc><image:title>eset-antimalware-day-cybersecurity-pros-malware-researcher-1-623x432</image:title></image:image><lastmod>2021-11-03T12:25:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/02/a-comprehensive-security-ecosystem-is-essential-for-every-home/</loc><lastmod>2021-11-02T12:38:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/11/01/boss-level-hybrid-worker-home-admins-please-apply/</loc><lastmod>2021-11-01T12:10:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/28/dark-huntor-150-arrested-31-million-seized-in-major-dark-web-bust/</loc><lastmod>2021-10-28T10:44:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/27/wslink-unique-and-undocumented-malicious-loader-that-runs-as-a-server/</loc><lastmod>2021-10-27T10:49:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/26/putting-cybersecurity-first-why-secure%e2%80%91by%e2%80%91design-must-be-the-norm/</loc><lastmod>2021-10-26T11:47:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/22/brave-browser-replaces-google-with-its-own-search-engine/</loc><lastmod>2021-10-22T09:44:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/21/a-recipe-for-failure-predictably-poor-passwords/</loc><lastmod>2021-10-21T11:07:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/20/5-2-billion-worth-of-bitcoin-transactions-possibly-tied-to-ransomware/</loc><lastmod>2021-10-20T09:50:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/19/virus-bulletin-old-malware-never-dies-it-just-gets-more-targeted/</loc><lastmod>2021-10-19T11:14:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/15/employee-offboarding-why-companies-must-close-a-crucial-gap-in-their-security-strategy/</loc><lastmod>2021-10-15T10:07:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/14/dont-get-phished-how-to-be-the-one-that-got-away/</loc><lastmod>2021-10-14T11:38:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/13/microsoft-thwarts-record%e2%80%91breaking-ddos-attack/</loc><lastmod>2021-10-13T09:27:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/12/ransomware-cost-us-companies-almost-21-billion-in-downtime-in-2020/</loc><lastmod>2021-10-12T11:20:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/11/eset-earns-a-2021-tech-cares-award-from-trustradius/</loc><lastmod>2021-10-11T09:33:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/08/eset-research-uncovers-fontonlake-targeted-malware-attacking-linux/</loc><lastmod>2021-10-08T11:41:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/07/google-to-turn-on-2fa-by-default-for-150-million-users-2-million-youtubers/</loc><lastmod>2021-10-07T10:19:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/06/eset-research-discovers-especter-a-bootkit-for-cyberespionage/</loc><lastmod>2021-10-06T08:29:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/04/hackers-could-force-locked-iphones-to-make-contactless-payments/</loc><lastmod>2021-10-04T11:30:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/10/01/october-is-cybersecurity-awareness-month-why-being-cyber%e2%80%91smart-matters/</loc><lastmod>2021-10-01T11:29:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/30/eset-threat-report-t2-2021/</loc><lastmod>2021-10-01T11:24:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/28/google-releases-emergency-fix-to-plug-zero%e2%80%91day-hole-in-chrome/</loc><lastmod>2021-09-28T11:11:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/27/what-is-cybercrime/</loc><lastmod>2021-09-27T10:56:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/24/bug-in-macos-finder-allows-remote-code-execution/</loc><lastmod>2021-09-24T11:32:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/23/plugging-the-holes-how-to-prevent-corporate-data-leaks-in-the-cloud/</loc><lastmod>2021-09-23T10:27:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/22/european-police-dismantle-cybercrime-ring-with-ties-to-italian-mafia/</loc><lastmod>2021-09-22T11:01:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/21/smartphone-trends-for-schoolchildren/</loc><lastmod>2021-09-21T11:08:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/20/what-is-spam-a-complete-guide/</loc><lastmod>2021-09-20T12:39:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/09/european-cybersecurity-index-ireland-among-the-worst-european-countries-in-cybersecurity/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/08/cybersecurity_review1-623x432-1.jpg</image:loc><image:title>cybersecurity_review1-623x432-1</image:title></image:image><lastmod>2021-09-20T12:22:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/17/microsoft-patch-tuesday-fixes-actively-exploited-zero%e2%80%91day-and-85-other-flaws/</loc><lastmod>2021-09-17T12:42:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/16/whatsapp-announces-end%e2%80%91to%e2%80%91end-encrypted-backups/</loc><lastmod>2021-09-16T09:44:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/15/what-is-a-cyberattack-surface-and-how-can-you-reduce-it/</loc><lastmod>2021-09-15T12:48:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/14/beware-of-these-5-common-scams-you-can-encounter-on-instagram/</loc><lastmod>2021-09-14T09:48:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/13/victims-duped-out-of-us1-8-million-by-romance-and-bec-scam-ring/</loc><lastmod>2021-09-13T08:43:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/10/protonmail-forced-to-log-users-ip-address-after-an-order-from-swiss-authorities/</loc><lastmod>2021-09-10T09:34:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/09/a-parents-guide-to-smartphone-security/</loc><lastmod>2021-09-09T08:19:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/02/vaccine-passport-flaw-analysis/</loc><lastmod>2021-09-02T11:39:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/09/01/dont-use-single%e2%80%91factor-authentication/</loc><lastmod>2021-09-01T10:58:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/31/vaccine-passports-is-your-personal-data-in-safe-hands/</loc><lastmod>2021-08-31T12:24:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/30/beyond-the-pandemic-why-are-data-breach-costs-at-an-all%e2%80%91time-high/</loc><lastmod>2021-08-30T12:10:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/27/man-impersonates-apple-support-steals-620000-photos-from-icloud-accounts/</loc><lastmod>2021-08-27T12:12:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/25/microsoft-power-apps-misconfiguration-exposes-millions-of-records/</loc><lastmod>2021-08-25T11:45:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/24/dumpster-diving-is-a-filthy-business/</loc><lastmod>2021-08-24T12:12:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/23/hackers-swipe-almost-100-million-from-major-cryptocurrency-exchange/</loc><lastmod>2021-08-23T11:00:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/20/health-authorities-in-40-countries-targeted-by-covid%e2%80%9119-vaccine-scammers/</loc><lastmod>2021-08-20T11:21:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/19/are-you-the-customer-the-one-paying-the-ransomware-demand/</loc><lastmod>2021-08-19T11:03:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/18/nearly-2-million-records-from-terrorist-watchlist-exposed-online/</loc><lastmod>2021-08-18T11:04:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/17/examining-threats-to-device-security-in-the-hybrid-workplace/</loc><lastmod>2021-08-17T11:07:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/11/deepfakes-the-bot-made-me-do-it/</loc><lastmod>2021-08-11T11:23:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/10/ransomware-runs-rampant-so-how-can-you-combat-this-threat/</loc><lastmod>2021-08-10T11:38:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/06/is-your-personal-information-being-abused/</loc><lastmod>2021-08-06T13:01:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/05/why-cloud-security-is-the-key-to-unlocking-value-from-hybrid-working/</loc><lastmod>2021-08-05T10:29:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/04/on-course-for-a-good-hacking/</loc><lastmod>2021-08-04T11:02:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/08/03/watch-out-for-these-scams-targeting-amazon-customers/</loc><lastmod>2021-08-03T09:57:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/30/most-twitter-users-havent-enabled-2fa-yet-report-reveals/</loc><lastmod>2021-07-30T11:26:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/29/booking-your-next-holiday-watch-out-for-these-airbnb-scams/</loc><lastmod>2021-07-29T11:22:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/28/apple-releases-patch-for-zero%e2%80%91day-flaw-in-ios-ipados-and-macos/</loc><lastmod>2021-07-28T11:36:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/27/protecting-the-hybrid-workplace-through-zero-trust-security/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/07/shutterstock_1823288303-thumbnail-623x432-1.jpg</image:loc><image:title>shutterstock_1823288303-thumbnail-623x432</image:title></image:image><lastmod>2021-07-27T11:57:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/26/eset-cements-its-champion-status-in-the-canalys-global-cybersecurity-leadership-matrix-2021/</loc><lastmod>2021-07-26T12:40:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/23/popular-wi%e2%80%91fi-routers-still-using-default-passwords-making-them-susceptible-to-attacks/</loc><lastmod>2021-07-23T11:36:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/22/cybercriminals-may-target-2020-tokyo-olympics-fbi-warns/</loc><lastmod>2021-07-22T11:23:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/21/the-ecso-cybersecurity-made-in-europe-label-awarded-to-eset-the-leading-endpoint-protection-platform-vendor-headquartered-in-europe/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/07/cybersecurity-made-in-europe-square.png</image:loc><image:title>Cybersecurity Made in Europe Square</image:title></image:image><lastmod>2021-07-21T11:29:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/20/some-url-shortener-services-distribute-android-malware-including-banking-or-sms-trojans/</loc><lastmod>2021-07-20T12:38:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/19/vacationing-how-to-avoid-the-cybersecurity-blues/</loc><lastmod>2021-07-19T12:25:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/16/microsoft-patch-tuesday-fixes-13-critical-flaws-including-4-under-active-attack/</loc><lastmod>2021-07-16T11:22:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/15/sports-events-and-online-streaming-prepare-your-cybersecurity/</loc><lastmod>2021-07-15T11:59:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/14/choosing-your-msp-what-the-kaseya-incident-tells-us-about-third%e2%80%91party-cyber-risk/</loc><lastmod>2021-07-14T10:23:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/13/the-hybrid-workplace-what-does-it-mean-for-cybersecurity/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/07/hybrid-workplace-1-623x432-1.jpg</image:loc><image:title>Hybrid-workplace-1-623x432</image:title></image:image><lastmod>2021-07-13T10:39:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/12/ransomware-to-pay-or-not-to-pay-legal-or-illegal-these-are-the-questions/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/07/ransomware-pay-not-pay-legal-illegal-623x415-1.jpg</image:loc><image:title>ransomware-pay-not-pay-legal-illegal-623x415</image:title></image:image><lastmod>2021-07-12T10:43:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/09/microsoft-issues-patch-to-fix-printnightmare-zero%e2%80%91day-bug/</loc><lastmod>2021-07-09T10:19:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/07/eset-research-discovers-bandidos-a-new-spying-campaign-in-venezuela/</loc><lastmod>2021-07-07T11:02:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/06/what-is-the-zero-trust-security-model-and-why-is-its-adoption-growing/</loc><lastmod>2021-07-06T11:09:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/05/twitter-now-lets-users-set-security-keys-as-the-only-2fa-method/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/07/twitter-security-key-2fa-method-623x415-1.jpg</image:loc><image:title>twitter-security-key-2fa-method-623x415</image:title></image:image><lastmod>2021-07-05T12:03:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/02/global-police-shut-down-vpn-service-favored-by-cybercriminals/</loc><lastmod>2021-07-02T10:58:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/07/01/data-for-700-million-linkedin-users-up-for-grabs-on-hacker-forum/</loc><lastmod>2021-07-01T11:02:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/30/common-facebook-scams-and-how-to-avoid-them/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/06/facebook-scams-hot-to-avoid-623x415-1.jpg</image:loc><image:title>facebook-scams-hot-to-avoid-623x415</image:title></image:image><lastmod>2021-06-30T09:43:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/29/eset-joins-ranks-as-a-cve-numbering-authority-cna/</loc><lastmod>2021-06-29T09:45:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/24/brave-launches-its-own-privacy%e2%80%91focused-search-engine/</loc><lastmod>2021-06-24T09:58:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/23/how-to-tell-if-a-website-is-safe/</loc><lastmod>2021-06-23T11:54:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/22/a-safer-internet-for-children-a-parentsguide/</loc><lastmod>2021-06-22T12:00:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/21/most-health-apps-engage-in-unhealthy-data%e2%80%91harvesting-habits/</loc><lastmod>2021-06-21T10:07:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/18/5-essential-things-to-do-before-ransomware-strikes/</loc><lastmod>2021-06-18T11:11:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/17/microsoft-takes-down-large%e2%80%91scale-bec-operation/</loc><lastmod>2021-06-17T10:39:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/16/endpoint-detection-and-response-the-path-to-security-maturity-starts-with-visibility/</loc><lastmod>2021-06-16T11:13:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/15/vishing-what-is-it-and-how-do-i-avoid-getting-scammed/</loc><lastmod>2021-06-15T12:34:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/14/tracking-ransomware-cryptocurrency-payments-what-now-for-bitcoin/</loc><lastmod>2021-06-14T10:16:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/11/google-fixes-actively-exploited-chrome-zero%e2%80%91day/</loc><lastmod>2021-06-11T10:35:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/10/gelsemium-when-threat-actors-go-gardening/</loc><lastmod>2021-06-10T10:55:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/09/hundreds-of-suspected-criminals-arrested-after-being-tricked-into-using-fbi%e2%80%91run-chat-app/</loc><lastmod>2021-06-09T10:40:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/08/hacking-space-how-to-pwn-a-satellite/</loc><lastmod>2021-06-08T10:33:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/04/zero%e2%80%91day-in-popular-wordpress-plugin-exploited-to-take-over-websites/</loc><lastmod>2021-06-04T12:58:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/03/eset-threat-report-t1-2021/</loc><lastmod>2021-06-03T12:05:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/06/01/5-common-scams-targeting-teens-and-how-to-stay-safe/</loc><lastmod>2021-06-01T12:12:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/31/dont-feed-the-trolls-and-other-tips-for-avoiding-online-drama/</loc><lastmod>2021-05-31T11:30:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/28/i-hacked-my-friends-website-after-a-sim-swap-attack/</loc><lastmod>2021-05-28T12:23:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/27/bluetooth-bugs-could-allow-attackers-to-impersonate-devices/</loc><lastmod>2021-05-27T10:21:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/26/apple-fixes-macos-zero%e2%80%91day-bug-that-let-malware-take-secret-screenshots/</loc><lastmod>2021-05-26T10:30:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/25/know-your-enemy-mitre-engenuitys-attck-evaluations-show-the-need-for-balanced-approach-to-edr-use/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/05/code-mitre-header-623x432-2.jpg</image:loc><image:title>code-mitre-header-623x432</image:title></image:image><lastmod>2021-05-25T11:13:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/24/rom%e2%80%91con-how-romance-fraud-targets-older-people-and-how-to-avoid-it/</loc><lastmod>2021-05-24T11:08:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/21/android-12-will-give-you-more-control-over-how-much-data-you-share-with-apps/</loc><lastmod>2021-05-21T11:00:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/20/colonial-pipeline-attack-hacking-the-physical-world/</loc><lastmod>2021-05-20T09:41:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/19/what-can-we-learn-from-the-hse-and-department-of-health-ransomware-attacks/</loc><lastmod>2021-05-19T09:27:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/18/take-action-now-flubot-malware-may-be-on-its-way/</loc><lastmod>2021-05-18T12:31:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/17/android-stalkerware-threatens-victims-further-and-exposes-snoopers-themselves/</loc><lastmod>2021-05-17T12:18:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/14/european-police-bust-major-online-investment-fraud-ring/</loc><lastmod>2021-05-14T09:46:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/13/1-million-risky-apps-rejected-or-removed-from-apples-app-store-in-2020/</loc><lastmod>2021-05-13T11:02:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/12/whatsapp-will-limit-features-for-users-who-dont-accept-new-data%e2%80%91sharing-rules/</loc><lastmod>2021-05-12T10:49:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/11/does-your-young-gamer-play-it-safe-six-tips-that-will-keep-them-well-protected/</loc><lastmod>2021-05-11T10:37:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/10/eset-research-into-latin-american-banking-trojans-continues/</loc><lastmod>2021-05-10T11:06:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/07/popular-routers-found-vulnerable-to-hacker-attacks/</loc><lastmod>2021-05-07T12:10:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/06/fantastic-passwords-and-where-your-children-can-find-them/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/05/wls-password-day-square.png</image:loc><image:title>WLS - Password Day Square</image:title></image:image><lastmod>2021-05-06T10:21:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/05/microsoft-will-soon-remove-flash-player-from-windows-10-devices/</loc><lastmod>2021-05-05T09:53:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/05/04/interpol-aims-to-deal-a-blow-to-digital-piracy/</loc><lastmod>2021-05-04T08:55:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/30/fbi-teams-up-with-have-i-been-pwned-to-alert-emotet-victims/</loc><lastmod>2021-04-30T12:38:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/29/prime-targets-governments-shouldnt-go-it-alone-on-cybersecurity/</loc><lastmod>2021-04-29T11:56:31+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/28/apple-patches-severe-macos-security-flaw/</loc><lastmod>2021-04-28T09:53:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/27/4-common-ways-scammers-use-celebrity-names-to-lure-victims/</loc><lastmod>2021-04-27T11:06:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/26/how-are-businesses-of-different-sizes-using-fintech-solutions/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/04/1.jpg</image:loc><image:title>1</image:title></image:image><lastmod>2021-04-26T10:48:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/26/instagram-rolls-out-new-features-to-help-prevent-cyberbullying/</loc><lastmod>2021-04-26T09:59:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/23/airdrop-flaws-could-leak-phone-numbers-email-addresses/</loc><lastmod>2021-04-23T10:43:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/21/whatsapp-pink-watch-out-for-this-fake-update/</loc><lastmod>2021-04-21T11:35:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/20/how-are-businesses-around-the-world-using-fintech/</loc><lastmod>2021-04-20T12:31:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/19/spring-cleaning-dont-forget-about-your-digital-footprint/</loc><lastmod>2021-04-19T11:39:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/16/one-in-six-people-use-pets-name-as-password/</loc><lastmod>2021-04-16T10:20:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/15/authorities-remove-web-shells-from-compromised-exchange-servers/</loc><lastmod>2021-04-15T11:46:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/14/whatsapp-flaw-lets-anyone-lock-you-out-of-your-account/</loc><lastmod>2021-04-14T09:58:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/13/clubhouse-in-the-spotlight-after-user-records-posted-online/</loc><lastmod>2021-04-13T13:15:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/12/38-million-worth-of-gift-cards-stolen-and-sold-on-dark-web/</loc><lastmod>2021-04-12T11:03:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/09/does-data-stolen-in-a-data-breach-expire/</loc><lastmod>2021-04-09T10:46:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/21/press-clippings-2021/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/01/eolas-01.04.2021.jpg</image:loc><image:title>Eolas 01.04.2021</image:title><image:caption>Eolas 01.04.2021</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/01/anygator-29.03.2021.jpg</image:loc><image:title>Anygator 29.03.2021</image:title><image:caption>Anygator 29.03.2021</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/01/anygator-28.03.2021.jpg</image:loc><image:title>Anygator 28.03.2021</image:title><image:caption>Anygator 28.03.2021</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/01/anygator-27.03.2021.jpg</image:loc><image:title>Anygator 27.03.2021</image:title><image:caption>Anygator 27.03.2021</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/01/anygator-24.03.2021.jpg</image:loc><image:title>Anygator 24.03.2021</image:title><image:caption>Anygator 24.03.2021</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/01/the-irish-sun-24.03.2021.jpg</image:loc><image:title>The Irish Sun 24.03.2021</image:title><image:caption>The Irish Sun 24.03.2021</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/01/anygator-23.03.2021.jpg</image:loc><image:title>Anygator 23.03.2021</image:title><image:caption>Anygator 23.03.2021</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/01/teknologiia-22.03.2021.jpg</image:loc><image:title>Teknologiia 22.03.2021</image:title><image:caption>Teknologiia 22.03.2021</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/01/psbe-22.03.2021.jpg</image:loc><image:title>PSBE 22.03.2021</image:title><image:caption>PSBE 22.03.2021</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/01/intelligence-quest-22.03.2021.jpg</image:loc><image:title>Intelligence Quest 22.03.2021</image:title><image:caption>Intelligence Quest 22.03.2021</image:caption></image:image><lastmod>2021-04-08T11:22:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/07/supply%e2%80%91chain-attacks-when-trust-goes-wrong-try-hope/</loc><lastmod>2021-04-07T10:26:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/06/eset-research-uncovers-janeleiro-a-new-banking-trojan-attacking-corporate-users-in-brazil/</loc><lastmod>2021-04-06T10:28:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/04/01/is-your-dishwasher-trying-to-kill-you/</loc><lastmod>2021-04-01T12:30:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/31/are-you-prepared-to-prevent-data-loss/</loc><lastmod>2021-03-31T10:51:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/30/what-does-a-cybersecurity-first-approach-really-mean-for-businesses-using-new-fintech-solutions/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/03/evilnum-malware-apt-group-analysis-623x432-1.jpg</image:loc><image:title>Evilnum-malware-APT-group-analysis-623x432</image:title></image:image><lastmod>2021-03-30T11:07:05+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/30/apple-rushes-to-patch-zero%e2%80%91day-flaw-in-ios-ipados/</loc><lastmod>2021-03-30T10:59:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/26/warning-issued-over-scams-touting-fake-covid%e2%80%9119-vaccines-asking-for-bitcoin/</loc><lastmod>2021-03-26T11:16:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/25/eset-named-top-playerin-radicati-apt-protection-market-quadrant-2021/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/03/1080x1080_wta1.jpg</image:loc><image:title>1080x1080_WTA1</image:title></image:image><lastmod>2021-03-25T10:48:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/25/vengeful-it-worker-gets-jail-time-for-deleting-companys-microsoft-user-accounts/</loc><lastmod>2021-03-25T09:24:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/24/5-reasons-why-not-only-financial-companies-struggle-with-cybersecurity/</loc><lastmod>2021-03-24T12:58:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/23/when-repairing-things-you-own-may-make-you-an-outlaw/</loc><lastmod>2021-03-23T12:02:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/22/trust-your-surveillance-why-hacked-cameras-are-very-bad/</loc><lastmod>2021-03-22T12:12:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/19/beware-android-trojan-posing-as-clubhouse-app/</loc><lastmod>2021-03-19T09:52:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/18/google-fixes-chrome-zero%e2%80%91day-bug-exploited-in-the-wild/</loc><lastmod>2021-03-18T09:44:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/16/paypal-fraud-what-merchants-should-know/</loc><lastmod>2021-03-16T10:33:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/15/world-consumer-rights-day-protecting-consumers-rights-online/</loc><lastmod>2021-03-15T11:14:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/12/sex-in-the-digital-era-how-secure-are-smart-sex-toys/</loc><lastmod>2021-03-12T11:29:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/11/eset-survey-finds-americans-use-digital-banking-and-fintech-apps-more-often-cryptocurrency-use-on-the-rise-since-start-of-pandemic/</loc><lastmod>2021-03-11T10:21:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/11/exchange-servers-under-siege-from-at-least-10-apt-groups/</loc><lastmod>2021-03-11T10:11:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/10/online-health-security-when-opt-out-isnt-an-option/</loc><lastmod>2021-03-10T11:09:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/09/women-in-cybersecurity-gender-gap-narrows-but-not-enough/</loc><lastmod>2021-03-09T11:28:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/08/how-esets-work-on-safetynet-helps-protect-children-online/</loc><lastmod>2021-03-08T11:18:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/05/cybersecurity-risks-and-challenges-facing-the-financial-industry/</loc><lastmod>2021-03-05T10:50:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/04/not-all-cybercriminals-are-sophisticated/</loc><lastmod>2021-03-04T10:35:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/03/safeguarding-children-against-cyberbullying-in-the-age-of-covid%e2%80%9119/</loc><lastmod>2021-03-03T11:18:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/02/popular-password-manager-in-the-spotlight-over-web-trackers/</loc><lastmod>2021-03-02T11:21:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/03/01/oxford-university-covid%e2%80%9119-lab-hacked/</loc><lastmod>2021-03-01T10:02:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/26/81-of-business-leaders-believe-covid-has-increased-the-need-for-improved-security-of-finances/</loc><lastmod>2021-02-26T11:06:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/25/less-than-a-third-of-consumers-worldwide-feel-very-secure-when-shopping-online-yet-more-than-half-are-doing-so-more-frequently-than-pre-pandemic-eset-reveals/</loc><lastmod>2021-02-25T10:37:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/24/clubhouse-chats-streamed-to-third%e2%80%91party-website/</loc><lastmod>2021-02-24T09:01:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/23/brave-browsers-tor-mode-exposed-users-dark-web-activity/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/02/brave-tor-bug-privacy-623x432-1.jpg</image:loc><image:title>brave-tor-bug-privacy-623x432</image:title></image:image><lastmod>2021-02-23T11:52:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/22/telephony-denial-of-service-attacks-could-cost-lives/</loc><lastmod>2021-02-22T11:15:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/19/malware-authors-already-taking-aim-at-apple-m1-macs/</loc><lastmod>2021-02-19T12:29:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/18/attacks-targeting-it-firms-stir-concern-controversy/</loc><lastmod>2021-02-18T12:43:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/17/romance-scams-in-2020-breaking-hearts-wallets-and-records/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/02/romance-scams-dating-losses-2020-623x428-1.jpg</image:loc><image:title>romance-scams-dating-losses-2020-623x428</image:title></image:image><lastmod>2021-02-17T11:49:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/16/record%e2%80%91breaking-number-of-vulnerabilities-reported-in-2020/</loc><lastmod>2021-02-16T10:11:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/12/protecting-the-water-supply-hacker-edition/</loc><lastmod>2021-02-12T12:59:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/11/microsoft-patches-actively-exploited-windows-kernel-flaw/</loc><lastmod>2021-02-11T11:35:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/10/hacker-attempts-to-poison-florida-citys-water-supply/</loc><lastmod>2021-02-10T13:04:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/09/google-better-patching-could-have-prevented-1-in-4-zero%e2%80%91days-last-year/</loc><lastmod>2021-02-09T11:48:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/08/eset-threat-report-q4-2020/</loc><lastmod>2021-02-08T12:01:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/04/identity-theft-spikes-amid-pandemic/</loc><lastmod>2021-02-04T12:16:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/03/eset-discovers-kobalos-tiny-yet-complex-linux-threat-attacking-supercomputers/</loc><lastmod>2021-02-03T12:23:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/02/eset-uncovers-operation-nightscout-cyberespionage-supply-chain-attack-on-gamers-in-asia/</loc><lastmod>2021-02-02T11:48:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/02/01/42-of-global-consumers-use-a-free-fintech-application-but-half-dont-know-if-the-app-sells-their-data-eset-survey-reveals/</loc><lastmod>2021-02-01T09:11:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/29/emotet-botnet-disrupted-in-global-operation/</loc><lastmod>2021-01-29T09:07:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/28/data-privacy-day-top-tips-for-safe-remote-learning/</loc><lastmod>2021-01-28T12:00:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/27/wormable-android-malware-spreads-via-whatsapp-messages/</loc><lastmod>2021-01-27T11:47:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/26/eset-internet-security-recognized-with-outstanding-product-award-by-av-comparatives/</loc><lastmod>2021-01-26T10:46:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/25/why-do-we-fall-for-sms-phishing-scams-so-easily/</loc><lastmod>2021-01-25T11:49:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/22/vadokrist-a-wolf-in-sheeps-clothing/</loc><lastmod>2021-01-22T08:32:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/21/dnspooq-bugs-expose-millions-of-devices-to-dns-cache-poisoning/</loc><lastmod>2021-01-21T10:39:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/20/eset-discovers-operation-spalax-colombian-government-and-industry-sector-under-targeted-attack/</loc><lastmod>2021-01-20T08:42:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/19/whatsapp-delays-privacy-policy-update-after-confusion-backlash/</loc><lastmod>2021-01-19T09:00:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/18/car-spying-your-insurance-company-is-watching-you/</loc><lastmod>2021-01-18T10:37:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/15/whats-your-attitude-to-parental-controls/</loc><lastmod>2021-01-15T10:59:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/14/hackers-leak-stolen-covid%e2%80%9119-vaccine-documents/</loc><lastmod>2021-01-14T10:55:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/13/whatsapp-updates-privacy-policy-to-enable-sharing-more-data-with-facebook/</loc><lastmod>2021-01-13T10:23:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/12/5-common-scams-and-how-to-avoid-them/</loc><lastmod>2021-01-12T10:35:32+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/11/would-you-take-the-bait-take-our-phishing-quiz-to-find-out/</loc><lastmod>2021-01-11T10:37:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/08/eset-named-a-strategic-leader-in-rigorous-new-av-comparatives-endpoint-prevention-and-response-test/</loc><lastmod>2021-01-08T10:31:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/07/what-have-we-learned-about-mobile-security-in-2020/</loc><lastmod>2021-01-07T11:37:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/06/7-ways-malware-can-get-into-your-device/</loc><lastmod>2021-01-06T11:04:15+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/05/smart-tech-gifts-how-to-keep-your-kids-and-family-safe/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/01/protecting_kidsonline-623x432-1.jpg</image:loc><image:title>Protecting_KidsOnline-623x432</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2021/01/smart-conencted-iot-technology-gits-christmas-securing-623x415-1.png</image:loc><image:title>smart-conencted-iot-technology-gits-christmas-securing-623x415</image:title></image:image><lastmod>2021-01-05T12:28:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/01/09/press-clippings-2020/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/01/webopedia-27.12.2020.jpg</image:loc><image:title>Webopedia 27.12.2020</image:title><image:caption>Webopedia 27.12.2020</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/01/anygator-23.12.2020.jpg</image:loc><image:title>Anygator 23.12.2020</image:title><image:caption>Anygator 23.12.2020</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/01/daybreak-development-corporation-18.12.2020.jpg</image:loc><image:title>Daybreak Development Corporation 18.12.2020</image:title><image:caption>Daybreak Development Corporation 18.12.2020</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/01/limerick-post-19.12.2020.jpg</image:loc><image:title>Limerick Post 19.12.2020</image:title><image:caption>Limerick Post 19.12.2020</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/01/killarney-advertiser-18.12.2020.jpg</image:loc><image:title>Killarney Advertiser 18.12.2020</image:title><image:caption>Killarney Advertiser 18.12.2020</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/01/anygator-17.12.2020.jpg</image:loc><image:title>Anygator 17.12.2020</image:title><image:caption>Anygator 17.12.2020</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/01/anygator-16.12.2020.jpg</image:loc><image:title>Anygator 16.12.2020</image:title><image:caption>Anygator 16.12.2020</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/01/anygator-15.12.2020.jpg</image:loc><image:title>Anygator 15.12.2020</image:title><image:caption>Anygator 15.12.2020</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/01/anygator-10.12.2020.jpg</image:loc><image:title>Anygator 10.12.2020</image:title><image:caption>Anygator 10.12.2020</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/01/nearfm-02.12.2020.jpg</image:loc><image:title>NearFM 02.12.2020</image:title><image:caption>NearFM 02.12.2020</image:caption></image:image><lastmod>2021-01-04T11:49:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2021/01/04/google-chrome-and-eset-collaborate-in-fight-against-online-threats/</loc><lastmod>2021-01-04T10:47:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/12/23/cybersecurity-advent-calendar-stay-aware-stay-safe/</loc><lastmod>2020-12-23T14:49:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/12/18/how-scammers-target-paypal-users-and-how-you-can-stay-safe/</loc><lastmod>2020-12-18T11:33:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/12/17/cybersecurity-advent-calendar-stay-close-to-one-another-safely/</loc><lastmod>2020-12-17T12:41:06+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/12/16/medical-scans-of-millions-of-patients-exposed-online/</loc><lastmod>2020-12-16T11:58:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/12/15/expecting-a-christmas-gift-package-careful-with-the-latest-an-post-scam/</loc><lastmod>2020-12-15T12:28:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/12/10/cybersecurity-advent-calendar-tips-for-buying-gifts-and-not-receiving-coal/</loc><lastmod>2020-12-10T13:48:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/12/09/cybersecurity-advent-calendar-let-santa-in-keep-hackers-out/</loc><lastmod>2020-12-09T12:20:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/12/08/eset-predicts-ransomware-and-fileless-malware-to-present-increased-threat-in-2021/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/12/trends_2021b.jpg</image:loc><image:title>Trends_2021b</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/12/trends_2021-1.jpg</image:loc><image:title>Trends_2021</image:title></image:image><lastmod>2020-12-08T10:32:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/12/08/the-dangers-to-cryptocurrency-wallets-and-how-to-fend-them-off/</loc><lastmod>2020-12-08T10:20:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/12/03/cybersecurity-trends-2021-staying-secure-in-uncertain-times/</loc><lastmod>2020-12-03T11:51:21+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/12/02/cyberattackers-could-trick-scientists-into-producing-dangerous-substances/</loc><lastmod>2020-12-02T11:58:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/12/01/mobile-payment-apps-how-to-stay-safe-when-paying-with-your-phone/</loc><lastmod>2020-12-01T11:28:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/11/26/sim-swap-scam-what-it-is-and-how-to-protect-yourself/</loc><lastmod>2020-11-26T13:40:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/11/25/up-to-350000-spotify-accounts-hacked-in-credential-stuffing-attacks/</loc><lastmod>2020-11-25T09:27:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/11/24/the-worst-passwords-of-2020-is-it-time-to-change-yours/</loc><lastmod>2020-11-24T12:12:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/11/19/bumble-bugs-could-have-exposed-personal-data-of-all-users/</loc><lastmod>2020-11-19T13:48:45+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/11/18/anti-bullying-week-united-against-bullying-online/</loc><lastmod>2020-11-18T11:56:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/11/17/anti-bullying-week-2020-why-we-must-unite-to-prevent-cyberbullying/</loc><lastmod>2021-03-01T15:48:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/11/11/data-on-millions-of-hotel-guests-exposed-in-cloud-storage-leak/</loc><lastmod>2020-11-11T10:24:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/11/10/gaming-company-capcom-hit-by-cyberattack/</loc><lastmod>2020-11-10T13:07:18+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/11/05/google-squashes-two-more-chrome-bugs-under-active-attacks/</loc><lastmod>2020-11-05T12:21:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/11/04/eset-launches-eset-cloud-office-security-to-provide-advanced-protection-for-microsoft-365/</loc><lastmod>2020-11-04T13:05:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/11/03/a-career-in-cybersecurity-is-it-for-you/</loc><lastmod>2020-11-03T11:45:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/11/02/iot-security-are-we-finally-turning-the-corner/</loc><lastmod>2020-11-02T13:07:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/30/5-scary-data-breaches-that-shook-the-world/</loc><lastmod>2020-10-30T10:56:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/29/eset-threat-report-q3-2020/</loc><lastmod>2020-10-29T11:14:02+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/28/fraudsters-crave-loyalty-points-amid-covid%e2%80%9119/</loc><lastmod>2020-10-28T10:41:49+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/27/european-cybersecurity-month-2020-cyber-skills-for-a-digitalized-world/</loc><lastmod>2020-10-27T11:28:07+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/27/securing-medical-devices-can-a-hacker-break-your-heart/</loc><lastmod>2020-10-27T10:59:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/22/google-patches-chrome-zero%e2%80%91day-under-attack/</loc><lastmod>2020-10-22T10:17:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/21/microsoft-issues-two-emergency-windows-patches/</loc><lastmod>2020-10-21T10:28:10+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/20/how-safe-is-your-usb-drive/</loc><lastmod>2020-10-20T11:51:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/19/5-things-you-can-do-to-secure-your-home-office-without-hiring-an-expert/</loc><lastmod>2020-10-19T11:24:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/15/50000-home-cameras-reportedly-hacked-footage-posted-online/</loc><lastmod>2020-10-15T11:04:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/14/55-security-flaws-found-in-various-apple-services/</loc><lastmod>2020-10-14T10:40:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/13/nobel-laureate-kip-thorne-chairs-the-eset-science-award-international-jury-in-2020/</loc><lastmod>2020-10-15T15:44:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/12/eset-takes-part-in-global-operation-to-disrupt-trickbot/</loc><lastmod>2020-10-12T11:21:13+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/09/so-you-thought-your-personal-data-was-deleted-not-so-fast/</loc><lastmod>2020-10-09T10:35:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/08/working-from-a-hotel-beware-the-dangers-of-public-wi%e2%80%91fi/</loc><lastmod>2020-10-08T11:35:47+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/07/us-govt-warns-against-paying-off-ransomware-attackers/</loc><lastmod>2020-10-07T10:40:36+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/06/had-your-face-stolen-lately/</loc><lastmod>2020-10-06T10:32:20+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/05/5-steps-to-secure-your-connected-devices/</loc><lastmod>2020-10-05T11:08:12+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/02/cyber-security-awareness-month-is-here/</loc><lastmod>2020-10-02T10:00:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/10/01/why-european-cybersecurity-month-is-more-important-than-ever-before/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/10/european-cybersecurity-month-2020_some_1080x1080.jpg</image:loc><image:title>European-Cybersecurity-Month-2020_SoMe_1080x1080</image:title></image:image><lastmod>2020-10-01T11:38:59+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/30/eset-research-uncovers-apt-c-23-groups-new-android-spyware-masked-as-threema-and-telegram/</loc><lastmod>2020-09-30T10:38:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/29/learning-to-recognize-malware-and-its-dirty-tricks/</loc><lastmod>2020-09-29T10:45:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/28/scams-designed-to-target-home-office-workers-in-irish-mailboxes/</loc><lastmod>2020-09-28T10:44:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/25/5-tips-for-better-google-drive-security/</loc><lastmod>2020-09-25T12:03:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/24/179-arrested-in-massive-dark-web-bust/</loc><lastmod>2020-09-24T11:49:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/23/new-tool-helps-companies-assess-why-employees-click-on-phishing-emails/</loc><lastmod>2020-09-23T15:30:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/22/mozilla-fixes-flaw-that-let-attackers-hijack-firefox-for-android-via-wi%e2%80%91fi/</loc><lastmod>2020-09-22T12:23:38+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/21/emotet-strikes-quebecs-department-of-justice-an-eset-analysis/</loc><lastmod>2020-09-21T12:34:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/18/5-ways-cybercriminals-can-try-to-extort-you/</loc><lastmod>2020-09-18T12:33:57+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/17/plugging-in-a-strange-usb-drive-what-could-possibly-go-wrong/</loc><lastmod>2020-09-17T13:35:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/16/sports-data-for-ransom-its-not-all-just-fun-and-games-anymore/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/09/csm_untitled-2_eb68291314-768x349-1.png</image:loc><image:title>csm_Untitled-2_eb68291314-768x349</image:title><image:caption>Figure 1. The SRM Training System first reached market in 1988, reaching professional cycling in 1991 and by 2003/4 could transmit data in real-time.
Source: http://www.srm.de/fileadmin/_processed_/csm_Untitled-2_eb68291314.png</image:caption></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/09/345018-zwift-photo-cycling-05-241c24-original-1581356760-1-768x513-1.jpg</image:loc><image:title>345018-zwift-photo-cycling-05-241c24-original-1581356760-1-768x513</image:title></image:image><lastmod>2020-09-16T13:32:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/15/zoom-makes-2fa-available-for-all-its-users/</loc><lastmod>2020-09-15T11:06:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/14/eset-launches-version-6-of-eset-mobile-security-for-android/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/09/ems_6.0_some.jpg</image:loc><image:title>EMS_6.0_SoMe</image:title></image:image><lastmod>2020-09-14T12:21:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/11/portland-passes-the-strictest-facial-recognition-technology-ban-in-the-us-yet/</loc><lastmod>2020-09-11T13:08:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/10/uk-university-suffers-cyberattack-ransomware-gang-claims-responsibility/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/09/newcastleu-2-623x410-1.jpg</image:loc><image:title>NewcastleU-2-623x410</image:title></image:image><lastmod>2020-09-10T13:18:22+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/09/lead%e2%80%91offering-business-booming-as-usual-but-there-are-no-conferences-or-exhibitions/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/09/fake-leads-offering-business-scams-scammers-fraud-623x424-1.jpg</image:loc><image:title>fake-leads-offering-business-scams-scammers-fraud-623x424</image:title></image:image><lastmod>2020-09-09T13:01:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/08/protect-the-privacy-of-your-children-and-cover-their-webcams/</loc><lastmod>2020-09-08T11:47:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/07/tiktok-family-pairing-curate-your-childrens-content-and-more/</loc><lastmod>2020-09-07T11:39:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/04/microsoft-debuts-deepfake-detection-tool/</loc><lastmod>2020-09-04T11:40:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/03/norways-parliament-struck-by-hackers/</loc><lastmod>2020-09-03T11:43:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/02/houseparty-should-i-stay-or-should-i-go-now/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/09/houseparty_no_logo.png</image:loc><image:title>Houseparty_no_logo</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/09/1.jpg</image:loc><image:title>1</image:title></image:image><lastmod>2020-09-02T13:19:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/09/01/security-flaw-allows-bypassing-pin-verification-on-visa-contactless-payments/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/09/security-flaw-pin-bypass-visa-contactless-cards-623x415-1.jpg</image:loc><image:title>Security-flaw-PIN-bypass-Visa-contactless-cards-623x415</image:title></image:image><lastmod>2020-09-01T10:53:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/08/31/back-to-school-2020-stay-safe-online-with-eset-internet-security/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/bts.png</image:loc><image:title>bts</image:title></image:image><lastmod>2020-08-31T11:58:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/08/28/ddos-extortion-campaign-targets-financial-firms-retailers/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/financial-services-targeted-by-ddos-extortionists-623x415-1.jpg</image:loc><image:title>financial-services-targeted-by-DDoS-extortionists-623x415</image:title></image:image><lastmod>2020-08-28T11:54:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/08/27/new-chrome-firefox-versions-fix-security-bugs-bring-productivity-features/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/chrome-firefox-new-versions-security-fixes-productivity-tools-623x432-1.jpg</image:loc><image:title>chrome-firefox-new-versions-security-fixes-productivity-tools-623x432</image:title></image:image><lastmod>2020-08-27T11:43:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/08/26/fbi-cisa-warn-of-spike-in-voice-phishing-attacks/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/fbi-cisa-warn-vishing-attacks-covid19-remote-work-623x427-1.jpg</image:loc><image:title>FBI-CISA-warn-vishing-attacks-covid19-remote-work-623x427</image:title></image:image><lastmod>2020-08-26T11:24:39+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/08/25/cyber-attacks-several-canadian-government-services-disrupted/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/canada-cyberattacks-government-services-disrupted-623x432-1.jpg</image:loc><image:title>canada-cyberattacks-government-services-disrupted-623x432</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/capture-decran-cyberattaque-canadatwitter-en-80.jpg</image:loc><image:title>capture-décran-cyberattaque-CanadaTwitter-EN-80</image:title></image:image><lastmod>2020-08-25T11:30:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/08/24/how-to-secure-your-tiktok-account/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/how-to-secure-your-tiktok-account-623x427-1.jpg</image:loc><image:title>how-to-secure-your-tiktok-account-623x427</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/figure-4-1.jpg</image:loc><image:title>Figure-4-1</image:title></image:image><lastmod>2020-08-24T11:07:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie/2020/08/21/grandoreiro-banking-trojan-impersonates-spains-tax-agency/</loc><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/grandoreiro-banking-trojan-impersonating-spain-tax-agency-623x432-1.jpg</image:loc><image:title>Grandoreiro-banking-trojan-impersonating-spain-tax-agency-623x432</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/figure-5-768x315-1.png</image:loc><image:title>Figure-5-768x315</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/figure-4-768x173-1.png</image:loc><image:title>Figure-4-768x173</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/figure-3.png</image:loc><image:title>Figure-3</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/figure-2-768x386-1.png</image:loc><image:title>Figure-2-768x386</image:title></image:image><image:image><image:loc>https://blog.eset.ie/wp-content/uploads/2020/08/figure-1-1.jpg</image:loc><image:title>Figure-1-1</image:title></image:image><lastmod>2020-08-21T12:07:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.eset.ie</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2025-01-23T12:06:40+00:00</lastmod></url></urlset>
