<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-01-26</lastmod>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/my-case-study-of-last-years-ambry-genetics-attack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-01-26</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1611681635130-3JUG7V4FFN3OKAWDZD8S/Slide3.jpg</image:loc>
      <image:title>Genomics Security - My Case Study of last year's Ambry Genetics Attack...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1611681760516-5BNK6O0W9FX5ZLSRGMKG/Slide5.jpg</image:loc>
      <image:title>Genomics Security - My Case Study of last year's Ambry Genetics Attack...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1611681605671-2MQB2R2HKTQDUKELU9ZK/Slide2.jpg</image:loc>
      <image:title>Genomics Security - My Case Study of last year's Ambry Genetics Attack...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1611681541020-O1YGQD517U59UWGZMS8X/Slide1.jpg</image:loc>
      <image:title>Genomics Security - My Case Study of last year's Ambry Genetics Attack...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1611681685499-T5UCTP8C1SWEY8P6DGLW/Slide4.jpg</image:loc>
      <image:title>Genomics Security - My Case Study of last year's Ambry Genetics Attack...</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1611681785999-CP5F74GPMBRK8T9RRU50/Slide6.jpg</image:loc>
      <image:title>Genomics Security - My Case Study of last year's Ambry Genetics Attack...</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/genomics-to-comply-in-the-cloud1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-07-17</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1594132077566-ID6S9VGJBU9PQI5V6YDH/cloudcomput3.jpg</image:loc>
      <image:title>Genomics Security - GENOMICS: To Comply in The Cloud Pt. 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1594165925131-CDNAS9ANBQW0H96J3OEE/cloudcomput1.jpg</image:loc>
      <image:title>Genomics Security - GENOMICS: To Comply in The Cloud Pt. 1</image:title>
      <image:caption>Essential characteristics &amp; benefits of The Cloud: On-demand self-service, Rapid Elasticity, Broad Network Access, Resource Pooling, and Measured Service.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1594252832613-3UJFQ7GV5D1VDDHR622H/cloudcomput4.jpg</image:loc>
      <image:title>Genomics Security - GENOMICS: To Comply in The Cloud Pt. 1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/the-unspoken-genetic-connection-of-covid-19</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-04-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1587507609300-KOFHG2P8HZDKFJBEBMT1/image-asset.jpeg</image:loc>
      <image:title>Genomics Security - The Genetic Connection of COVID-19....</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1587602171398-V92ZU93994U9C6IXV9RY/image-asset.jpeg</image:loc>
      <image:title>Genomics Security - The Genetic Connection of COVID-19....</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1587577998163-W9J4S8UVFI7D9W6I4XWV/image-asset.jpeg</image:loc>
      <image:title>Genomics Security - The Genetic Connection of COVID-19....</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/wholegenomesequencing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-11-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1573863403741-9NGEMSX4F794XGT0YSXR/WGS1.png</image:loc>
      <image:title>Genomics Security - Breach at Whole Genome Sequencing company Veritas Genetics...</image:title>
      <image:caption>Image of WGS- thanks to the National Human Genome Research Institute</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1573866078796-5UIKPC2SF9OWDC65ET8H/Sequencing_Cost_per_Genome_August2019.jpg</image:loc>
      <image:title>Genomics Security - Breach at Whole Genome Sequencing company Veritas Genetics...</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/the-doj-announces-interim-policy-on-forensic-genetic-genealogical-dna-anaylsis</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-09-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1569448839768-UCA5EPV89HR4EBYCTU4Y/image-asset.jpeg</image:loc>
      <image:title>Genomics Security - The DOJ Announces Interim Policy on Forensic Genetic Genealogy</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/the-big-little-lie-that-is-anonymized-data</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-08-24</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1566522527973-UWU76YAKJ0L3ZIHDV9K4/FullSizeRender+%285%29.jpg</image:loc>
      <image:title>Genomics Security - The Big Little Lie that is Anonymized Data Part 1</image:title>
      <image:caption>GEDmatch does not have any tools to allow you to compare Y-DNA. However, there are free tools available online that will allow you to upload Y-STRS (Short tandem repeats, which is what is used primarily with Y-DNA..it does have SNPs but these are a lot harder to use for genealogical purposes) My favorite free software is from a company called Fluxus Engineering. (I used their phylogenetic software to analyze the Y-DNA in the image above) Their software has a very steep learning curve for anyone who doesn’t have a background in genetics. An important thing to remember about Y-DNA is that it does not recombine the same way that autosomal DNA does..the average mutation rate is 0.4% per generation..this basically means that if you take a grandfather, his son, and his grandson and look at their Y chromosome it will be practically identical from one another. Keep in mind also that Y-DNA is only the male line so none of the matches will come from the maternal side of the family. If you do not know a male’s name and you upload his Y-DNA you will more than likely find out his surname, considering most of the matches will also have his last name. (Except in cases of adoption or false paternity) Looking at the image above you will see that one of the yellow nodes is larger than the others, that indicates a perfect match. The lines leading to the other nodes are identified with the names of the markers that the matches do NOT share with our anon user. Comparing sex chromosomes for re-identification can be tricky, but it can be a powerful tool, especially when combined with other sources. Possibly the most alarming takeaway from the re-identification of genetic data is that even if you make the decision to NOT upload your raw data to public databases; if your family members do; it’s almost like your genetic data is out there as well. We can put together a genetic profile of someone without having their DNA as long as we have enough data of close family members. We have a lot of work to do to protect people’s genetic privacy..especially in the areas of law and security, but these companies can start by being more up front about the fact that they can truly not make the promise of anonymized data.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1566139701758-GEW1MZEONR68VL4W3RMF/FullSizeRender.jpg</image:loc>
      <image:title>Genomics Security - The Big Little Lie that is Anonymized Data Part 1</image:title>
      <image:caption>Note: A Centimorgan (cM) is a unit for measuring genetic linkage, it is used to imply a distance along a chromosome, however, it should be noted that databases like GEDMatch recommend (as I do) you only consider a threshold of segments that are 7 cM and larger because any smaller and you will get matches that are Identical By State (IBS) instead of matches that are Identical By Descent (IBD)..meaning the small matching segments are just indicative of individuals from a similar population group but does not imply any sort of relevance to relation.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1566605213718-ERMBSBMK0NV4WPQMUYZJ/FullSizeRender%2B%25286%2529.jpg</image:loc>
      <image:title>Genomics Security - The Big Little Lie that is Anonymized Data Part 1</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1566144025345-EU72M9J45C8F9IXOECF7/FullSizeRender+%281%29.jpg</image:loc>
      <image:title>Genomics Security - The Big Little Lie that is Anonymized Data Part 1</image:title>
      <image:caption>Notice the top match (which will always be your closest in terms of relation) shares 1,720 cM’s total with our user. That puts them in the close family range. (This individual turned out to be the user’s maternal grandmother) I omitted the columns with kit numbers, names, and email addresses for privacy. Their next closest match turned out to be their third cousin 1 time removed. This match took significantly longer to discover.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1566502486402-95O7SV01CZLNNAUHLELD/FullSizeRender+%284%29.jpg</image:loc>
      <image:title>Genomics Security - The Big Little Lie that is Anonymized Data Part 1</image:title>
      <image:caption>This is a 3D image showing matching segments on chromosome 8 of 5 different users. Two users share no segments with the other three, but the three who do sharing matching segments ended up being three generations.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1566502295965-MCR5VDMNT7K1PKATE0LC/FullSizeRender+%283%29.jpg</image:loc>
      <image:title>Genomics Security - The Big Little Lie that is Anonymized Data Part 1</image:title>
      <image:caption>On GEDmatch you can actually compare up to 10 kits with their chromosome browser. This allows you to be able to examine matching segments between many matches all at the same time. Overlapping and matching segments can quickly indicate if there is a single common ancestor.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1566515495416-M5NE1H8TFZO8BFEEN47J/FullSizeRender+%288%29.jpg</image:loc>
      <image:title>Genomics Security - The Big Little Lie that is Anonymized Data Part 1</image:title>
      <image:caption>Here is a 3D image of an anonymous female user and her top three female matches and her X-Chomosome. Why is this beneficial? We can see there are very large segments that match with our user and two of her matches and the chunks are almost identical; this would indicate a very close relation with a very high probability and also that these matches are coming from her maternal line. Our third match has some nice size segments that she shares with our anon user. However, she shares no matching segments with the other two matches. I predicted that this match was related to the anon user on her paternal line (remember we do get an X-chromosome from our father as well as our mother) Cross examining with autosomal DNA and other matches from the paternal side I was able to confirm this.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1566604775895-6EWCOPATST6L8PBI24QY/image-asset.jpeg</image:loc>
      <image:title>Genomics Security - The Big Little Lie that is Anonymized Data Part 1</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/d1wwejcs3r2xkaxlpjf378pwqsy7ml</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-07-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1563725985808-AC3FI86EXK5YBYOJDWI0/image-asset.jpeg</image:loc>
      <image:title>Genomics Security - Consumer Genetic Testing Companies Come Together to Form the Coalition for Genetic Data Protection</image:title>
      <image:caption>The main inspiration behind this coalition was all of the attention that Congress has recently placed on data privacy.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1563726783847-L275CKO8GKZISFU0CZAJ/image-asset.jpeg</image:loc>
      <image:title>Genomics Security - Consumer Genetic Testing Companies Come Together to Form the Coalition for Genetic Data Protection</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/researchers-discover-vulnerability-in-genomic-software-that-could-have-led-to-cyberattack</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-07-19</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1563499980409-4ZHOQ27S719VEQDI6ZT0/Man+In+Middle+Attack.jpg</image:loc>
      <image:title>Genomics Security - Researchers Discover Vulnerability in Genomic Software That Could have Led to CyberAttack..</image:title>
      <image:caption>Graphic by Brent Haglund</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/consumer-dna-testing-company-vitagene-inc-left-3000-users-private-info-exposed-for-years</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-07-16</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1563298513864-4MNEF1DYS0D8FW4D82T2/image-asset.jpeg</image:loc>
      <image:title>Genomics Security - Consumer DNA-testing company Vitagene left 3,000 user’s private info exposed for years...</image:title>
      <image:caption>This is one of the first breaches we are aware of involving Genetic Consumer testing companies where the actual Genetic data itself has been exposed..in the past the breaches with these companies have all been tied to the exposure of credit card information or other personal information.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/privacy-preserving-string-searching</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1558141473174-FTJG0YBHDOHMYJDI91AA/bwt.png</image:loc>
      <image:title>Genomics Security - Privacy-Preserving String Searching...</image:title>
      <image:caption>This image shows the BWT transform for banana$.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1558199510637-K5X1Z2IEC6DRHR8IVN20/image-asset.jpeg</image:loc>
      <image:title>Genomics Security - Privacy-Preserving String Searching...</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/2019/genetictestingconcerns2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-07-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1556825977546-RAETILY4H0C1Y0YWXS6A/regulation-3246979_960_720.jpg</image:loc>
      <image:title>Genomics Security - Consumer Genetic Testing and Privacy Concerns Part 2. &lt;strong&gt;Updated July 14th&lt;/strong&gt;</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/2019/genetictestingconcerns1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-28</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1558653153686-MD7D3Q8AMQ9AIOWRBK2V/image-asset.jpeg</image:loc>
      <image:title>Genomics Security - Consumer Genetic Testing and Privacy Concerns Part 1.</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/secure-read-mapping</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1557448597636-4I6LJ9C2SWGRVPHVAXGC/hacker-1944688_960_720.jpg</image:loc>
      <image:title>Genomics Security - Secure Read Mapping...</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/2019/bioinformaticssec</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2019-05-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1556825353623-A4LQHQSETSB19P4VJEVX/bioinformatics.png</image:loc>
      <image:title>Genomics Security - Intro to Bioinformatics and Security</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/category/Cyber+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/category/Law</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/category/Cloud+Computing</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/category/Genomics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/category/Information+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/category/OSINT</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/genomicssecurity/category/Bioinformatics</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/research</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-07-23</lastmod>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2019-05-05</lastmod>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/wilderness-of-mirrors</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2023-01-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1666653202717-PUG97UIIEWO4DEWMGOQ9/unsplash-image-hsg538WrP0Y.jpg</image:loc>
      <image:title>Wilderness of Mirrors - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/operationaurora</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-11-01</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1667342976261-AH5F0MD74SBGQ007IKGX/unsplash-image-M8foSPAy1gI.jpg</image:loc>
      <image:title>Wilderness of Mirrors: Operation Aurora - Make it stand out</image:title>
      <image:caption>According to McAfee the main goal of the attack was to gain access to and possibly alter the source code repositories at these large American companies. Many companies were unwilling to attribute Operation Aurora to China, something Google publicly did. It led Google to cease its operations in China, but it does continue to operate a localized version of its search engine in Hong Kong.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/casestudyofglassrat</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-11-07</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1667781797927-R5SHDW78ZUM8RHOGQ180/unsplash-image-m1-7Foy3CX8.jpg</image:loc>
      <image:title>Wilderness of Mirrors: Case Study of GlassRAT - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/476c7a7b-f999-4f86-9b45-828105ad3e9b/zerodetect-24112015-big.jpg</image:loc>
      <image:title>Wilderness of Mirrors: Case Study of GlassRAT - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/aptspotlightlazarusgroup</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-11-15</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1668479245592-DAB3HG73H9YVC406DDDR/unsplash-image-DHAN73puUjA.jpg</image:loc>
      <image:title>APT Spotlight: Lazarus Group - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/apt-spotlight-red-apolloapt10</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-11-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/be66009f-d3f0-4639-ac6c-3f4a4727d943/48a2_Blog_APT10_Ver02.jpg</image:loc>
      <image:title>APT Spotlight: Red Apollo/APT10 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/apt-spotlight-hexane</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-11-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1669765912762-JDP96GRUAFBMMSH2M2IB/unsplash-image-9SoCnyQmkzI.jpg</image:loc>
      <image:title>APT Spotlight: HEXANE - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/thesolarwindshackapt29</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-12-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1670985699685-MAUS2XJU7I5MXR0HU91U/unsplash-image-lVF2HLzjopw.jpg</image:loc>
      <image:title>The SolarWinds Hack &amp; APT 29 - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/9aeb3bf4-675c-44b2-bca8-03dfd3c9bb61/Solar_Winds_Backdoor.jpg</image:loc>
      <image:title>The SolarWinds Hack &amp; APT 29 - Make it stand out</image:title>
      <image:caption>The SolarWinds hackers (who would later be identified as APT 29) compromised a digitally signed SolarWinds Orion network monitoring component, opening a backdoor into the networks of thousands of SolarWinds enterprise and government customers.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/sandwormteam</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2022-12-21</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1671582397871-BYZ8FBHILRYJBZR7VX58/unsplash-image-dR3Fb6dBEc0.jpg</image:loc>
      <image:title>APT Spotlight: Sandworm Team - Make it stand out</image:title>
      <image:caption>U.S. Cyber Intelligence firm iSight Partners announced in January of 2016 that Sandworm was responsible for the unprecedented power outage in Ukraine. They came to this conclusion based on analysis of the malicious software known as BlackEnergy 3 &amp; KillDisk, which were used in the attack.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/equation-group</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-01-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/ce45c2a2-d851-4489-a0f4-44526818e645/EGcountries.png</image:loc>
      <image:title>Equation Group - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1673141495332-M5HJIWM0GCUG6TTY3PDC/unsplash-image-9SoCnyQmkzI.jpg</image:loc>
      <image:title>Equation Group - Make it stand out</image:title>
      <image:caption>All the C &amp; C domains the Equation Group appear to use have been registered through the same two major registrars, using “Domains by Proxy” to make the registrant’s information legit. Their C &amp; C infrastructure includes over 300 domains and more than 100 servers. The servers are hosted in several different countries, including: the U.S., the UK, Italy, Germany, Netherlands, Panama, Costa Rica, Malaysia, Colombia, and the Czech Republic.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/stuxnet</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2023-01-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1673143361233-JZWGWIW3YMMPAMR61127/unsplash-image-6vEqcR8Icbs.jpg</image:loc>
      <image:title>STUXNET - Make it stand out</image:title>
      <image:caption>Stuxnet specifically targets Programmable Logic Controllers (PCLs) which in the case of gas centrifuges for separating nuclear material, they allow the automation of the electromechanical processes. Stuxnet exploited four zero-days flaws. It functions by targeting machines using the Microsoft Windows OS &amp; Networks, then seeking out Siemens Step7 software. Stuxnet then compromised Iranian PLCs collecting information on Industrial Systems &amp; causing the fast-spinning centrifuges to self-destruct. Reportedly Stuxnet ruined almost one-fifth of Iran’s centrifuges. Since it targeted ICS, the worm infected over 200,000 computers &amp; caused 1,000 machines to physically degrade.</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.bentleybiosec.com/how-to-comply-in-the-world-of-artificial-intelligence</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2025-03-25</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1742164297533-JQKANV2LLW4Y6IIA59A0/unsplash-image--0xMiYQmk8g.jpg</image:loc>
      <image:title>How to Comply in the Ever Evolving World of AI - Make it stand out</image:title>
      <image:caption>Whatever it is, the way you tell your story online can make all the difference.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1741994717626-0B8N32QNO86U0OPEM5V5/unsplash-image-2EJCSULRwC8.jpg</image:loc>
      <image:title>How to Comply in the Ever Evolving World of AI - Make it stand out</image:title>
      <image:caption>Artificial Intelligence has been around a lot longer than most people realize. It was founded as an academic discipline in 1956.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1742160897879-GMBH7S9IYJQS25DSWOA0/unsplash-image-PsoSMPgEuzs.jpg</image:loc>
      <image:title>How to Comply in the Ever Evolving World of AI - Make it stand out</image:title>
      <image:caption>On January 23, 2025 President Trump signed an executive order to remove barriers to American leadership in Artificial Intelligence…”This order revokes certain existing AI policies and directives that act as barriers to American AI innovation, clearing a path for the United States to act decisively to retain global leadership in artificial intelligence.”</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5cb7c705d74562e0f23a3920/1741996875553-SQQ29DWG0II3R1CTXAJA/unsplash-image-ZPOoDQc8yMw.jpg</image:loc>
      <image:title>How to Comply in the Ever Evolving World of AI - Make it stand out</image:title>
      <image:caption>Some examples of how AI is used: Data Analysis, Language Translation, Medical Imaging, Voice Recognition Fraud Detection.</image:caption>
    </image:image>
  </url>
</urlset>

