<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet type="text/xsl" href="//vantico.maatz.com.br/main-sitemap.xsl"?>
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd http://www.google.com/schemas/sitemap-image/1.1 http://www.google.com/schemas/sitemap-image/1.1/sitemap-image.xsd" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9">
	<url>
		<loc>https://vantico.maatz.com.br/o-que-sao-known-exploited-vulnerabilities-kevs/</loc>
		<lastmod>2023-06-19T18:34:59+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/06/vantico_thumbnail_Known-Exploited-Vulnerabilities.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/06/MicrosoftTeams-image-3.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/pentest-automatizado-conheca-vantagens-desvantagens/</loc>
		<lastmod>2023-06-12T20:49:08+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/06/vantico_thumbnail_pentest-automatizado.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/06/Pentest-automatizado-Recovered.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/quais-normas-de-seguranca-exigem-o-pentest/</loc>
		<lastmod>2023-06-05T20:46:55+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/06/vantico_thumbnail_normas-de-seguranca.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/06/Normas-de-seguranca.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/apresentando-reports-de-seguranca-para-a-diretoria/</loc>
		<lastmod>2023-05-22T17:52:55+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/05/vantico_thumbnail_Como-reforcar-o-papel-da-ciberseguranca-para-gestores-e-diretores.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/05/Como-reforcar-o-papel-da-ciberseguranca-para-gestores-e-diretores-ilustracao-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/quais-sao-os-padroes-de-seguranca-criptomoedas-ccss/</loc>
		<lastmod>2023-05-15T16:43:40+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/05/vantico_thumbnail_Processo-de-Auditoria-do-CCSS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/05/Padroes-de-Seguranca-para-Criptomoedas.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/smart-contracts-auditoria-de-contratos-inteligentes/</loc>
		<lastmod>2023-05-08T20:13:19+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/05/vantico_thumbnail_Vulnerabilidades-em-Smart-Contract.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/05/Vulnerabilidades-em-Smart-Contract.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/simulacao-de-ameacas-avancadas-o-que-e-5-beneficios/</loc>
		<lastmod>2023-04-24T21:00:09+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/04/vantico_thumbnail_avaliacao-de-comprometimento.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/04/Avaliacao-de-Comprometimento.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/5-maiores-ciberataques-a-corretoras-de-criptomoedas/</loc>
		<lastmod>2023-04-17T18:43:26+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/04/vantico_thumbnailE-possivel-hackear-criptomoedaspng.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/04/E-possivel-hackear-criptomoedas-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/importancia-pentest-para-api-como-funciona-o-teste/</loc>
		<lastmod>2023-03-20T20:26:29+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/03/vantico_thumbnail_metodologia-importancia-do-pentest-direcionado-apenas-para-APIs.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/03/Pentest-para-APIs.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/epss-priorizacao-de-vulnerabilidades-3-beneficios/</loc>
		<lastmod>2023-03-06T20:59:47+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/03/vantico_thumbnail_EPSS.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/03/O-que-e-EPSS-e-como-utilizar.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/red-team-pentest-conheca-4-principais-diferencas/</loc>
		<lastmod>2023-01-16T17:09:30+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/01/Senki_thumbnailRed-Teaming-x-Pentest.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/confiabilidade-pentest-tradicional-ou-ptaas/</loc>
		<lastmod>2023-01-10T14:39:05+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/01/Senki_thumbnail_Como-saber-se-meu-pentest-esta-sendo-foi-eficaz.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/o-que-e-pentest-para-que-serve-e-4-beneficios/</loc>
		<lastmod>2023-01-03T19:45:02+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/01/Senki_thumbnail_base-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/guia-priorizacao-vulnerabilidades-ciberseguranca/</loc>
		<lastmod>2022-12-19T19:16:45+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/12/Senki_thumbnail_Guia-para-a-priorizacao-de-vulnerabilidades.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/12/owasp-risk-calc.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/02/vantico_ilustracao05-Detalhes-da-vulnerabilidade.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/fintechs-5-principais-riscos-ciberseguranca/</loc>
		<lastmod>2022-12-12T17:17:18+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/12/Fintechs-conheca-os-5-principais-riscos-de-ciberseguranca.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/o-que-e-bug-bounty-qual-a-diferenca-pentest/</loc>
		<lastmod>2022-12-05T18:31:05+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/12/Senki_thumbnail_Bug-Bounty.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/previsoes-de-ciberseguranca-para-2023/</loc>
		<lastmod>2022-11-29T14:51:46+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/11/Senki_thumbnail_Previsoes-da-ciberseguranca-para-2023.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/pentest-diligencia-previa-em-fusao-e-aquisicao/</loc>
		<lastmod>2022-11-07T17:12:57+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/11/Senki_thumbnail_case-de-sucesso-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/minha-empresa-precisa-do-pentest-3-dicas/</loc>
		<lastmod>2022-10-24T18:02:50+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/10/Senki_thumbnail_A-minha-empresa-precisa-realizar-pentest.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/a-importancia-do-pentest-para-as-healthtechs/</loc>
		<lastmod>2022-10-18T14:19:55+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/10/Senki_thumbnail_Por-que-as-healthtechs-precisam-do-pentest.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/10/Captura-de-tela-2022-10-18-104852-Editado.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/pentest-iot-dispositivos-sistema-embarcado/</loc>
		<lastmod>2022-09-26T16:56:04+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/09/Senki_thumbnail_-IoT-Dispositivos-conectados.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/02/vantico_ilustracao05-Detalhes-da-vulnerabilidade.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/fintech-tudo-sobre-seguranca-pentest-pcidss/</loc>
		<lastmod>2022-09-12T19:01:49+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/09/Senki_thumbnail_-Pentest-para-fintechs-1.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/compliance-o-que-e-por-que-o-pentest-e-essencial/</loc>
		<lastmod>2022-09-05T17:47:17+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/09/Senki_thumbnail.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/importancia-pentest-processo-fusao-e-aquisicao/</loc>
		<lastmod>2022-08-30T15:05:29+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/08/Senki_thumbnail_vestigios-digitais.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/por-que-o-mobile-pentest-ainda-e-tao-necessario/</loc>
		<lastmod>2022-08-08T17:28:05+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/08/Senki_thumbnail_pentest-mobile.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/pentest-web-o-que-e-por-que-fazer-e-as-5-fases/</loc>
		<lastmod>2022-07-25T17:25:43+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/07/Senki_thumbnail_web-teste.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/02/vantico_ilustracao05-Detalhes-da-vulnerabilidade.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/pentest-as-a-service-4-motivos-para-escolher/</loc>
		<lastmod>2022-07-19T17:36:54+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/07/Senki_thumbnail_as-service.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/02/vantico_ilustracao01.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/02/dashboard_ilustracao06-sumario.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/api-o-que-sao-3-possiveis-ameacas-ciberseguranca/</loc>
		<lastmod>2022-07-18T19:44:55+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/07/Senki_thumbnail_API.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/6-fases-do-pentest-e-como-o-tornam-mais-eficaz/</loc>
		<lastmod>2022-07-14T17:53:59+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/07/Senki_thumbnail_-6-fases-do-pentest_13jul22.png</image:loc>
		</image:image>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2023/02/dashboard_ilustracao06-sumario.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/criptomoedas-transacoes-blockchain-sao-seguras/</loc>
		<lastmod>2022-06-24T18:44:14+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/06/Sentnella_thumbnail_institucional_25maio22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/nuvem-pode-estar-vulneravel-5-maneiras-proteger/</loc>
		<lastmod>2022-06-20T17:56:05+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/06/Sentnella_thumbnail_como-proteger-a-sua-nuvem_16jun22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/entendendo-a-lgpd-e-o-papel-da-ciberseguranca/</loc>
		<lastmod>2022-06-13T17:54:42+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/06/Sentnella_thumbnail_LGP_11jun22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/pentest-por-onde-comecar-3-testes-de-intrusao/</loc>
		<lastmod>2022-06-06T19:41:15+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/06/Sentnella_thumbnail_PENTEST-COMO-DEVE-SER_06JUN22.png</image:loc>
		</image:image>
	</url>
	<url>
		<loc>https://vantico.maatz.com.br/evolucao-pentest-3-motivos-seguranca-cibernetica/</loc>
		<lastmod>2022-05-30T15:10:45+00:00</lastmod>
		<image:image>
			<image:loc>https://vantico.maatz.com.br/wp-content/uploads/2022/05/THUMBNAIL-ARTIGO-1.png</image:loc>
		</image:image>
	</url>
</urlset>
<!-- XML Sitemap generated by Rank Math SEO Plugin (c) Rank Math - rankmath.com -->