<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://blog.adv-ic.com/2023/09/29/que-es-malla-de-ciberseguridad-o-cybersecurity-mesh/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2023/09/pexels-christina-morillo-1181271.jpg</image:loc><image:title>pexels-christina-morillo-1181271</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2023/09/image.png</image:loc><image:title>image</image:title></image:image><lastmod>2023-09-29T18:51:11+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2020/04/11/medusalocker-activo-en-usuarios-de-teletrabajo/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2020/04/imagenes-medusalocker.jpg</image:loc><image:title>imagenes Medusalocker</image:title></image:image><lastmod>2021-08-09T10:50:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2019/11/04/ataque-masivo-de-ransomware-a-everis-prisa-entre-otros-en-espana/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2019/11/ioc_everis.png</image:loc><image:title>IoC_Everis</image:title></image:image><lastmod>2019-11-05T20:42:50+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2019/03/08/hoy-y-siempre-honramos-a-la-mujer/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2019/03/guadalupe-amor-2.jpg</image:loc><image:title>guadalupe-amor-2</image:title></image:image><lastmod>2019-03-08T15:12:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2019/02/22/se-completa-adquisicion-de-cylance-por-parte-de-blackberry/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2019/02/cylance_bb_logo_rgb_horz_black.png</image:loc><image:title>Cylance_BB_Logo_RGB_Horz_Black</image:title></image:image><lastmod>2019-02-22T18:34:37+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2018/10/17/identificado-malware-para-cve-2018-8453-reportado-el-martes-16-octubre-2018/</loc><lastmod>2018-10-17T13:15:44+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2018/10/15/casas-de-software-liberan-parches-importantes/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/10/parches-oct2018.png</image:loc><image:title>Parches Oct2018</image:title></image:image><lastmod>2018-10-16T03:05:42+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2018/10/04/nss-labs-enciende-polemica-en-las-pruebas-de-soluciones-de-seguridad/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/10/logonsslabs.png</image:loc><image:title>logoNsslabs</image:title></image:image><lastmod>2018-10-04T23:15:14+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2018/07/03/mineria-de-criptomonedas-el-nuevo-ransomware/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/07/monero.png</image:loc><image:title>Monero</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/07/crytocurrency.png</image:loc><image:title>crytocurrency</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/07/cryptojackingtitle.jpg</image:loc><image:title>cryptojackingtitle</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/07/cryptojackingminer.jpg</image:loc><image:title>CryptojackingMiner</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/07/cryptojackingsmart.jpg</image:loc><image:title>cryptojackingSmart</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/07/cryptojackingcpu.jpg</image:loc><image:title>CryptojackingCPU</image:title></image:image><lastmod>2018-07-03T13:43:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2018/05/31/cylance-si-te-roban-la-identidad-usa-inteligencia/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/05/robo_identidad.png</image:loc><image:title>Robo_identidad</image:title></image:image><lastmod>2018-05-31T13:41:56+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2018/05/15/1665/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/05/post_15_mayo_facebook.png</image:loc><image:title>Post_15_Mayo_Facebook</image:title></image:image><lastmod>2018-05-18T17:43:19+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2018/04/26/mexico-es-el-segundo-pais-con-mas-ataques-de-ramsonware/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/04/post26facebook.png</image:loc><image:title>Post26Facebook</image:title></image:image><lastmod>2018-05-07T14:43:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2018/05/04/un-perverso-mensaje-de-amor/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/05/wannacry.jpg</image:loc><image:title>wannacRY</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/05/virus_i_love_you-641x330.gif</image:loc><image:title>virus_I_love_you-641x330</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/05/i_love_bug.png</image:loc><image:title>i_love_bug</image:title></image:image><lastmod>2018-05-03T16:49:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2018/04/24/nss-labs-report-2018-advanced-endpoint-protection/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/04/aep-svm-2018-anonymized.png</image:loc><image:title>AEP-SVM-2018-Anonymized</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/04/smv-version-adv.png</image:loc><image:title>SMV version ADV</image:title></image:image><lastmod>2018-04-24T23:58:34+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2018/04/19/virus-melissa/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/04/post19linkedin_mesa-de-trabajo-1.png</image:loc><image:title>Post19LinkedIn_Mesa de trabajo 1</image:title></image:image><lastmod>2018-04-19T16:51:53+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2018/01/16/microsoft-martes-de-parcheo-56-fallas-de-seguridad-incluyendo-dia-cero/</loc><lastmod>2018-01-16T15:18:27+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2018/01/08/spectre-y-meltdown-vulnerabilidades-de-arquitectura-de-procesadores/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2018/01/meltdown_spectre.png</image:loc><image:title>Meltdown_spectre</image:title></image:image><lastmod>2018-01-09T14:23:24+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/11/30/ingenieria-social-podemos-prepararnos/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/11/dia_internacional_segu_info-e1512057596749.jpeg</image:loc><image:title>Dia_Internacional_Segu_Info</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/11/logo-intel-e1512027650741.jpg</image:loc><image:title>logo-intel</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/11/ml-e1512027471633.jpg</image:loc><image:title>ML</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/11/ai1.jpg</image:loc><image:title>AI</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/11/ml-e1512027105984.png</image:loc><image:title>ML</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/11/logo-stacked.png</image:loc><image:title>logo-stacked</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/11/medidas-empresas.jpg</image:loc><image:title>medidas-empresas</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/11/sentido-comun.png</image:loc><image:title>sentido-comun</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/11/ciberbullying.jpg</image:loc><image:title>ciberbullying</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/11/cibercriminales.jpg</image:loc><image:title>cibercriminales</image:title></image:image><lastmod>2017-11-30T18:28:01+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/10/26/inteligencia-artificial-vs-bad-rabbit/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/video-cylance.png</image:loc><image:title>video cylance</image:title></image:image><lastmod>2017-10-26T16:59:03+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/10/24/bad-rabbit-nuevo-ataque-de-ransomware/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/batrabbit-note.png</image:loc><image:title>Batrabbit note</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/fake-adboe-installer.png</image:loc><image:title>fake adboe installer</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/badrabbit-btc.png</image:loc><image:title>BadRabbit BTC</image:title></image:image><lastmod>2017-10-25T04:07:43+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/10/17/boletin-de-vulnerabilidad-krackwpa2/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/krack-wifi-vulnerability.png</image:loc><image:title>krack-wifi-vulnerability</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/kracks2.jpg</image:loc><image:title>kracks2</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/kracks.jpg</image:loc><image:title>kracks</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/windows-parche-krack-wpa2.png</image:loc><image:title>Windows-parche-KRACK-WPA2</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/table1.jpg</image:loc><image:title>Table1</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/krack-logo.png</image:loc><image:title>Krack-logo</image:title></image:image><lastmod>2017-10-19T23:56:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/10/10/cuando-todo-lo-demas-falla-respaldo-y-recuperacion/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/arcserve-backup-graphic.png</image:loc><image:title>backup-graphic</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/backup_to_nas.jpg</image:loc><image:title>backup_to_nas</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/rpo-rto-esquema-p-e1507662236297.jpg</image:loc><image:title>RPO-RTO</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/cloud1-e1507662586162.jpg</image:loc><image:title>Cloud.jpg</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/online-backup.jpg</image:loc><image:title>online-backup</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/backup-1.jpg</image:loc><image:title>backup-1</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/backup1.jpg</image:loc><image:title>backup</image:title></image:image><lastmod>2017-10-11T11:29:17+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/10/02/iniciando-el-mes-de-la-ciberseguridad-cinco-sencillos-pasos-para-mantenerte-seguro/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/socialeng3.jpg</image:loc><image:title>Social Engineering</image:title><image:caption>Thief with mask red with a phone call</image:caption></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/socialeng2.jpg</image:loc><image:title>SocialEng2</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/updates.jpg</image:loc><image:title>Updates</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/socialeng.jpg</image:loc><image:title>SocialEng</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/passwd.jpg</image:loc><image:title>Password</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/cybersec2.jpg</image:loc><image:title>Cyber security concept with lock</image:title><image:caption>Cyber security concept with lock</image:caption></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/backup.jpg</image:loc><image:title>backup</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/av3.jpg</image:loc><image:title>AV3</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/av2.jpg</image:loc><image:title>AV2</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/10/av.jpg</image:loc><image:title>AV</image:title></image:image><lastmod>2017-10-02T21:14:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/09/15/dos-vulnerabilidades-criticas-de-adobe-flash-player/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/09/adobefit1.jpg</image:loc><image:title>adobefit</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/09/adobefit.jpg</image:loc><image:title>adobefit</image:title></image:image><lastmod>2017-09-19T12:10:35+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/09/10/ataques-ransomware-mongodb/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/09/mongodb-ransomware-2-jpg.png</image:loc><image:title>mongodb-ransomware-2.jpg</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/09/tabla-mongodb.png</image:loc><image:title>Tabla-MongoDB</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/09/mongodb-ransomware.jpg</image:loc><image:title>mongodb-ransomware</image:title></image:image><lastmod>2017-09-10T00:12:29+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/08/31/una-mirada-al-ecosistema-de-malware-en-smartphones/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/08/3-contenido-small-fusob.jpg</image:loc><image:title>3-contenido-small-fusob</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/08/2-contenido-rnsmw_gen_app.png</image:loc><image:title>2-contenido-rnsmw_gen_app</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/08/1-titulo.jpg</image:loc><image:title>1-Titulo</image:title></image:image><lastmod>2017-09-01T04:51:33+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/06/27/vienen-mas-y-llegaron-petya-ransomware/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/06/petya-ransomware.png</image:loc><image:title>Petya Ransomware</image:title></image:image><lastmod>2017-06-28T13:01:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/06/14/todos-a-parchear-microsoft-libera-parches-para-96-vulnerabilidades-de-seguridad-y-deben-ser-aplicadas-ya/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/06/microsoftpatch.png</image:loc><image:title>MicrosoftPatch</image:title></image:image><lastmod>2017-06-16T13:20:08+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/05/18/malware-adylkuzz-un-heroe-anonimo/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/05/crytocurrency.png</image:loc><image:title>crytocurrency</image:title></image:image><lastmod>2017-05-18T13:49:16+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/05/17/wannacry-la-punta-de-iceberg/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/05/theshadowbrokers.png</image:loc><image:title>theshadowbrokers</image:title></image:image><lastmod>2017-05-17T17:24:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/05/15/todo-lo-que-debes-saber-del-ransomware-wannacry/</loc><lastmod>2017-05-17T17:23:54+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/05/12/telefonica-espana-atacada-por-wannacry/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/05/icos.png</image:loc><image:title>ICOS</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/05/wcry.png</image:loc><image:title>Wcry</image:title></image:image><lastmod>2017-05-12T21:52:46+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2017/03/01/uso-seguro-de-aplicaciones-moviles/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2017/03/aplicaciones-moviles.jpg</image:loc><image:title>aplicaciones-moviles</image:title></image:image><lastmod>2021-07-29T06:20:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/contacto/</loc><lastmod>2017-02-01T16:23:18+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.adv-ic.com/2016/11/29/endpoint-protection-and-response-edr-en-3-minutos/</loc><lastmod>2016-11-29T01:28:30+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2016/11/14/el-eslabon-mas-debil-quien-ataco-a-dyn/</loc><lastmod>2016-11-14T15:32:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2016/10/17/malware-malware-y-mas-malware-que-dicen-los-fabricantes-de-ciberseguridad/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2016/10/malware.jpg</image:loc><image:title>malware</image:title></image:image><lastmod>2016-10-18T14:33:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2016/10/12/microsoft-publica-10-boletines-de-seguridad-y-soluciona-cinco-0-days/</loc><lastmod>2016-10-12T17:49:09+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/2016/10/06/ransomware-new-targets-of-attacks/</loc><lastmod>2016-10-06T13:00:40+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://blog.adv-ic.com/acerca-de/ransomware-nuevo-foco-de-ataques/</loc><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2016/10/adv_logo_102x72.jpg</image:loc><image:title>adv_logo_102x72</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2016/10/logo-adv-600x400.png</image:loc><image:title>logo-adv-600x400</image:title></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2016/10/adv_logo_new.jpg</image:loc><image:title>adv_logo_new</image:title><image:caption>Logo ADV IC</image:caption></image:image><image:image><image:loc>https://blog.adv-ic.com/wp-content/uploads/2016/10/adv_logo_200x1501.png</image:loc><image:title>adv_logo_200x150</image:title></image:image><lastmod>2016-10-05T15:22:45+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.adv-ic.com/acerca-de/</loc><lastmod>2016-10-03T14:02:20+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://blog.adv-ic.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-09-29T18:51:11+00:00</lastmod></url></urlset>
