<?xml version="1.0" encoding="UTF-8"?>
<!-- This sitemap was dynamically generated on April 16, 2026 at 1:21 pm by All in One SEO v4.9.5.1 - the original SEO plugin for WordPress. -->

<?xml-stylesheet type="text/xsl" href="https://ilogomalaysia.com/default-sitemap.xsl"?>

<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
	<channel>
		<title>iLogo Malaysia</title>
		<link><![CDATA[https://ilogomalaysia.com]]></link>
		<description><![CDATA[iLogo Malaysia]]></description>
		<lastBuildDate><![CDATA[Tue, 04 Nov 2025 09:06:16 +0000]]></lastBuildDate>
		<docs>https://validator.w3.org/feed/docs/rss2.html</docs>
		<atom:link href="https://ilogomalaysia.com/sitemap.rss" rel="self" type="application/rss+xml" />
		<ttl><![CDATA[60]]></ttl>

		<item>
			<guid><![CDATA[https://ilogomalaysia.com/threatcop/tdmarc/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/threatcop/tdmarc/]]></link>
			<title>TDMARC</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 09:06:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/]]></link>
			<title>Home</title>
			<pubDate><![CDATA[Thu, 18 Sep 2025 04:14:23 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/contact-us/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/contact-us/]]></link>
			<title>Contact Us</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 08:33:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/what-you-need-to-know-about-cybersecurity-training-for-employees/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/what-you-need-to-know-about-cybersecurity-training-for-employees/]]></link>
			<title>What You Need to Know About Cybersecurity Training for Employees</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 04:12:11 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/online-scam-trends-in-2026/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/online-scam-trends-in-2026/]]></link>
			<title>Online Scam Trends in 2026: Deepfake Fraud, Fake Messages &#038; Emerging Cyber Threats</title>
			<pubDate><![CDATA[Wed, 04 Mar 2026 07:51:34 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/agentic-ai-in-cyber-defense-and-offense-entering-the-age-of-autonomous-security/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/agentic-ai-in-cyber-defense-and-offense-entering-the-age-of-autonomous-security/]]></link>
			<title>Agentic AI in Cyber Defense and Offense: Entering the Age of Autonomous Security</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 06:14:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/from-factories-to-finance-inside-akira-ransomware/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/from-factories-to-finance-inside-akira-ransomware/]]></link>
			<title>From Factories to Finance: Inside Akira Ransomware</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 06:13:58 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/what-are-multiple-nginx-vulnerabilities/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/what-are-multiple-nginx-vulnerabilities/]]></link>
			<title>What Are Multiple Nginx Vulnerabilities?</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 06:13:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/how-whatsapp-phishing-works-and-ways-to-protect-yourself/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/how-whatsapp-phishing-works-and-ways-to-protect-yourself/]]></link>
			<title>How WhatsApp Phishing Works and Ways to Protect Yourself</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 04:11:54 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/what-are-multiple-apache-vulnerabilities/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/what-are-multiple-apache-vulnerabilities/]]></link>
			<title>What Are Multiple Apache Vulnerabilities?</title>
			<pubDate><![CDATA[Tue, 03 Mar 2026 06:13:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/protect/cyber-security-protect/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/protect/cyber-security-protect/]]></link>
			<title>Cyber Security Protect</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 08:09:55 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/why-cybersecurity-awareness-training-is-essential-for-organizations/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/why-cybersecurity-awareness-training-is-essential-for-organizations/]]></link>
			<title>Why Cybersecurity Awareness Training Is Essential for Organizations</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 04:11:33 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/what-does-a-backdoor-attack-mean-in-cybersecurity/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/what-does-a-backdoor-attack-mean-in-cybersecurity/]]></link>
			<title>What Does a Backdoor Attack Mean in Cybersecurity?</title>
			<pubDate><![CDATA[Wed, 28 Jan 2026 04:04:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/what-is-a-ddos-attack-a-simple-guide-to-traffic-flooding-threats/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/what-is-a-ddos-attack-a-simple-guide-to-traffic-flooding-threats/]]></link>
			<title>What Is a DDoS Attack? A Simple Guide to Traffic Flooding Threats</title>
			<pubDate><![CDATA[Wed, 28 Jan 2026 04:03:46 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/three-common-mistakes-companies-make-when-implementing-dmarc/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/three-common-mistakes-companies-make-when-implementing-dmarc/]]></link>
			<title>Three Common Mistakes Companies Make When Implementing DMARC</title>
			<pubDate><![CDATA[Wed, 28 Jan 2026 04:03:09 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/7-tips-for-identifying-suspicious-emails-and-avoiding-phishing/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/7-tips-for-identifying-suspicious-emails-and-avoiding-phishing/]]></link>
			<title>7 Tips for Identifying Suspicious Emails and Avoiding Phishing</title>
			<pubDate><![CDATA[Wed, 10 Dec 2025 07:32:18 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/must-follow-cybersecurity-standards-for-every-organization/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/must-follow-cybersecurity-standards-for-every-organization/]]></link>
			<title>Must-Follow Cybersecurity Standards for Every Organization</title>
			<pubDate><![CDATA[Wed, 10 Dec 2025 07:31:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/app-hijacking-on-android-how-cybercriminals-steal-money-and-how-you-can-stop-it/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/app-hijacking-on-android-how-cybercriminals-steal-money-and-how-you-can-stop-it/]]></link>
			<title>App Hijacking on Android: How Cybercriminals Steal Money — and How You Can Stop It</title>
			<pubDate><![CDATA[Wed, 05 Nov 2025 08:56:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/?elementskit_template=main-footer]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/?elementskit_template=main-footer]]></link>
			<title>Main Footer</title>
			<pubDate><![CDATA[Wed, 04 Feb 2026 10:46:26 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/10-key-solutions-for-more-effective-attack-surface-management/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/10-key-solutions-for-more-effective-attack-surface-management/]]></link>
			<title>10 Key Solutions for More Effective Attack Surface Management</title>
			<pubDate><![CDATA[Tue, 06 Jan 2026 10:18:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/breaking-down-the-revil-ransomware-threat/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/breaking-down-the-revil-ransomware-threat/]]></link>
			<title>Breaking Down the REvil Ransomware Threat</title>
			<pubDate><![CDATA[Tue, 06 Jan 2026 10:17:35 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/10-key-strategies-to-detect-and-respond-to-stealer-log-incidents/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/10-key-strategies-to-detect-and-respond-to-stealer-log-incidents/]]></link>
			<title>10 Key Strategies to Detect and Respond to Stealer Log Incidents</title>
			<pubDate><![CDATA[Tue, 06 Jan 2026 10:17:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/email-security-guide-implementing-dmarc-to-protect-your-business-communication/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/email-security-guide-implementing-dmarc-to-protect-your-business-communication/]]></link>
			<title>Email Security Guide: Implementing DMARC to Protect Your Business Communication</title>
			<pubDate><![CDATA[Mon, 17 Nov 2025 04:33:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/comply/cyber-security-maturity-assessment-csma/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/comply/cyber-security-maturity-assessment-csma/]]></link>
			<title>Cyber Security Maturity Assessment (CSMA)</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 08:07:12 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/why-modern-workplaces-rely-on-zero-trust-for-security/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/why-modern-workplaces-rely-on-zero-trust-for-security/]]></link>
			<title>Why Modern Workplaces Rely on Zero Trust for Security</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 04:11:14 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/penetration-testing-malaysia-secure-your-business-growth/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/penetration-testing-malaysia-secure-your-business-growth/]]></link>
			<title>Penetration Testing Malaysia: Secure Your Business Growth</title>
			<pubDate><![CDATA[Mon, 13 Apr 2026 06:58:56 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/why-zero-trust-has-become-critical-in-modern-workplaces/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/why-zero-trust-has-become-critical-in-modern-workplaces/]]></link>
			<title>Why Zero Trust Has Become Critical in Modern Workplaces</title>
			<pubDate><![CDATA[Thu, 02 Apr 2026 04:03:21 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/asses/social-engineering/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/asses/social-engineering/]]></link>
			<title>Social Engineering</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 08:05:28 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/asses/red-teaming/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/asses/red-teaming/]]></link>
			<title>Red Teaming</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 08:04:19 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/asses/penetration-testing/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/asses/penetration-testing/]]></link>
			<title>Penetration Testing</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 08:02:41 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/from-awareness-month-to-everyday-practice-building-lasting-cybersecurity-habits/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/from-awareness-month-to-everyday-practice-building-lasting-cybersecurity-habits/]]></link>
			<title>From Awareness Month to Everyday Practice: Building Lasting Cybersecurity Habits</title>
			<pubDate><![CDATA[Tue, 28 Oct 2025 08:45:27 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/celebrate-cybersecurity-awareness-month-2025-why-employee-cybersecurity-training-matters/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/celebrate-cybersecurity-awareness-month-2025-why-employee-cybersecurity-training-matters/]]></link>
			<title>Celebrate Cybersecurity Awareness Month 2025: Why Employee Cybersecurity Training Matters</title>
			<pubDate><![CDATA[Wed, 08 Oct 2025 07:30:31 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/ddos-protection-guide-2026-effective-ways-to-stop-attacks/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/ddos-protection-guide-2026-effective-ways-to-stop-attacks/]]></link>
			<title>DDoS Protection Guide 2026: Effective Ways to Stop Attacks</title>
			<pubDate><![CDATA[Thu, 05 Feb 2026 08:46:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/october-and-cybersecurity-awareness-month-what-it-really-means/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/october-and-cybersecurity-awareness-month-what-it-really-means/]]></link>
			<title>October and Cybersecurity Awareness Month: What It Really Means</title>
			<pubDate><![CDATA[Tue, 28 Oct 2025 08:45:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/threatcop/tpir/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/threatcop/tpir/]]></link>
			<title>TPIR</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 08:00:06 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/threatcop/tlms/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/threatcop/tlms/]]></link>
			<title>TLMS</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 07:59:16 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/threatmon/attack-surface-intelligence/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/threatmon/attack-surface-intelligence/]]></link>
			<title>Attack Surface Intelligence</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 07:57:02 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/threatmon/cyber-threat-intelligence/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/threatmon/cyber-threat-intelligence/]]></link>
			<title>Cyber Threat Intelligence</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 07:56:44 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/threatmon/dark-web-intelligence/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/threatmon/dark-web-intelligence/]]></link>
			<title>Dark Web Intelligence</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 07:56:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/threatmon/threatmon-ai/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/threatmon/threatmon-ai/]]></link>
			<title>Threatmon AI</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 07:51:25 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/threatmon/fraud-intelligence/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/threatmon/fraud-intelligence/]]></link>
			<title>Fraud Intelligence</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 07:51:22 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/threatmon/security-score-matrix/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/threatmon/security-score-matrix/]]></link>
			<title>Security Score Matrix</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 07:51:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/threatcop/tsat/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/threatcop/tsat/]]></link>
			<title>TSAT</title>
			<pubDate><![CDATA[Tue, 04 Nov 2025 07:41:45 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/blog/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/blog/]]></link>
			<title>Blog</title>
			<pubDate><![CDATA[Mon, 22 Sep 2025 03:29:53 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/elementskit-content/dynamic-content-megamenu-menuitem1380/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/elementskit-content/dynamic-content-megamenu-menuitem1380/]]></link>
			<title>dynamic-content-megamenu-menuitem1380</title>
			<pubDate><![CDATA[Mon, 03 Nov 2025 04:50:42 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/types-of-attacks-that-can-be-tested-in-network-penetration-testing/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/types-of-attacks-that-can-be-tested-in-network-penetration-testing/]]></link>
			<title>Types of Attacks That Can Be Tested in Network Penetration Testing</title>
			<pubDate><![CDATA[Sun, 21 Sep 2025 14:36:40 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/why-penetration-testing-is-a-must-have-investment-for-modern-cybersecurity/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/why-penetration-testing-is-a-must-have-investment-for-modern-cybersecurity/]]></link>
			<title>Why Penetration Testing Is a Must-Have Investment for Modern Cybersecurity</title>
			<pubDate><![CDATA[Sun, 21 Sep 2025 14:29:20 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/when-is-it-time-to-upgrade-your-firewall-recognize-5-signs-your-company-needs-it/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/when-is-it-time-to-upgrade-your-firewall-recognize-5-signs-your-company-needs-it/]]></link>
			<title>When Is It Time to Upgrade Your Firewall? Recognize 5 Signs Your Company Needs It!</title>
			<pubDate><![CDATA[Sun, 21 Sep 2025 14:18:47 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/what-is-siem-an-essential-solution-for-cyber-threat-detection-and-response/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/what-is-siem-an-essential-solution-for-cyber-threat-detection-and-response/]]></link>
			<title>What is SIEM? An Essential Solution for Cyber Threat Detection and Response</title>
			<pubDate><![CDATA[Fri, 19 Sep 2025 10:40:01 +0000]]></pubDate>
		</item>
					<item>
			<guid><![CDATA[https://ilogomalaysia.com/whatsapp-phishing-malaysia-common-scams-prevention/]]></guid>
			<link><![CDATA[https://ilogomalaysia.com/whatsapp-phishing-malaysia-common-scams-prevention/]]></link>
			<title>WhatsApp Phishing in Malaysia: Common Scams and Prevention Strategies for Businesses</title>
			<pubDate><![CDATA[Fri, 13 Feb 2026 10:03:39 +0000]]></pubDate>
		</item>
				</channel>
</rss>
