<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/feeds/tag/cyber-attacks" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro in Cyber-attacks ]]></title>
                <link>https://www.itpro.com/security/cyber-attacks</link>
        <description><![CDATA[ All the latest cyber-attacks content from the ITPro team ]]></description>
                                    <lastBuildDate>Fri, 24 Apr 2026 11:19:06 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/threat-actors-ditch-spray-and-pray-attacks-in-shift-to-targeted-exploitation</link>
                                                                            <description>
                            <![CDATA[ A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">aXZoaaEbmpsecTfCYFaZAL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 24 Apr 2026 11:19:06 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:description>                                                            <media:text><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:text>
                                <media:title type="plain"><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Beyond wipers: Iran-backed cyber attacks and the threat to businesses ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/beyond-wipers-iran-backed-cyber-attacks-and-the-threat-to-businesses</link>
                                                                            <description>
                            <![CDATA[ What’s the real risk to business in the US and UK during this critical situation? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ZSqjakTNDPMf7AhXB8NrHC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/VHuoRHN7D2BMLU3pbN3Xv4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:54:47 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Apr 2026 10:57:36 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/VHuoRHN7D2BMLU3pbN3Xv4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A stylized image showing a glowing red cyber attack warning on top of a reflective metal surface bearing the flag of Iran.]]></media:description>                                                            <media:text><![CDATA[A stylized image showing a glowing red cyber attack warning on top of a reflective metal surface bearing the flag of Iran.]]></media:text>
                                <media:title type="plain"><![CDATA[A stylized image showing a glowing red cyber attack warning on top of a reflective metal surface bearing the flag of Iran.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/VHuoRHN7D2BMLU3pbN3Xv4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Zephyr Energy hackers swiped £700,000 after redirecting a contractor payment ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/zephyr-energy-hackers-swiped-gbp700-000-after-redirecting-a-contractor-payment</link>
                                                                            <description>
                            <![CDATA[ Payment to a Zephyr Energy contractor was siphoned off, but the incident has been contained and new security measures implemented ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">m6aEtDpzcUUX6suSr8UbWg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:17:04 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Apr 2026 10:45:34 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:description>                                                            <media:text><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Everything we know about the Hasbro hack so far ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/everything-we-know-about-the-hasbro-hack-so-far</link>
                                                                            <description>
                            <![CDATA[ The toy-maker keeps running thanks to business continuity plans, but nature of attack remains unclear ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">pq7yt8ovg9sPv6isiVGHmW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/TtnikUHZqpREnPmBqPrYie-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 02 Apr 2026 11:55:20 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/TtnikUHZqpREnPmBqPrYie-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Illuminated Hasbro sign at Comic-Con International in San Diego, California.]]></media:description>                                                            <media:text><![CDATA[Illuminated Hasbro sign at Comic-Con International in San Diego, California.]]></media:text>
                                <media:title type="plain"><![CDATA[Illuminated Hasbro sign at Comic-Con International in San Diego, California.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/TtnikUHZqpREnPmBqPrYie-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘The build pipeline is becoming the new frontline’: Axios npm compromise highlights growing software supply chain risks, experts warn ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/the-build-pipeline-is-becoming-the-new-frontline-axios-npm-compromise-highlights-growing-software-supply-chain-risks-experts-warn</link>
                                                                            <description>
                            <![CDATA[ Cyber criminals exploited a hijacked maintainer account to compromise one of the world's most widely used JavaScript libraries ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">FtT83GNxmPjbmsmBPsDEnS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4XZYfjMuoUwrLG8MTcaQBi-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 01 Apr 2026 10:32:11 +0000</pubDate>                                                                                                                                <updated>Wed, 01 Apr 2026 14:13:01 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4XZYfjMuoUwrLG8MTcaQBi-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity concept image showing digital data storage modules with padlock symbols in a storage environment.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity concept image showing digital data storage modules with padlock symbols in a storage environment.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity concept image showing digital data storage modules with padlock symbols in a storage environment.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4XZYfjMuoUwrLG8MTcaQBi-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Russian sentenced to jail for his part in ransomware attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/russian-sentenced-to-jail-for-his-part-in-ransomware-attacks</link>
                                                                            <description>
                            <![CDATA[ Aleksei Volkov operated as an initial access broker, helping cybercrime groups, including the Yanluowang ransomware group ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">AnhsFhZvLzDoJ6zSYYPReP</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/KpS95oHnuSP6NJZBCVzd7N-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 24 Mar 2026 11:06:19 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/KpS95oHnuSP6NJZBCVzd7N-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Flag of russia]]></media:description>                                                            <media:text><![CDATA[Flag of russia]]></media:text>
                                <media:title type="plain"><![CDATA[Flag of russia]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/KpS95oHnuSP6NJZBCVzd7N-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Stryker hackers struck by FBI in domain seizure campaign ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/stryker-hackers-struck-by-fbi-in-domain-seizure-campaign</link>
                                                                            <description>
                            <![CDATA[ The domain seizures come hot on the heels of Handala's devastating attack on the medical tech firm ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">F32BN9VnmASzRxdGYHJNwD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 20 Mar 2026 11:45:23 +0000</pubDate>                                                                                                                                <updated>Fri, 20 Mar 2026 12:12:07 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:description>                                                            <media:text><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:text>
                                <media:title type="plain"><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Why cyber attacks on critical national infrastructure are such a huge threat ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/threat-posed-cyber-attacks-on-critical-national-infrastructure</link>
                                                                            <description>
                            <![CDATA[ Cyber attacks targeting national infrastructure are becoming increasingly prevalent – what are the underlying goals behind these attacks and how damaging are they? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8jZojNPg4FWVV7YnuaHZci</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iMQq7qLmeZD4jQtCkC2btd-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 18 Mar 2026 13:21:01 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Peter Ray Allison ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iMQq7qLmeZD4jQtCkC2btd-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A digital display of the world map, in shades of blue and outlined in red with labels to denote threats, representing attacks on critical national infrastructure (CNI).]]></media:description>                                                            <media:text><![CDATA[A digital display of the world map, in shades of blue and outlined in red with labels to denote threats, representing attacks on critical national infrastructure (CNI).]]></media:text>
                                <media:title type="plain"><![CDATA[A digital display of the world map, in shades of blue and outlined in red with labels to denote threats, representing attacks on critical national infrastructure (CNI).]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iMQq7qLmeZD4jQtCkC2btd-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 'It's destructive, not ransomware': Security experts weigh in on motivation behind Stryker cyber attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/technology/artificial-intelligence/its-destructive-not-ransomware-security-experts-weigh-in-on-motivation-behind-stryker-cyber-attack</link>
                                                                            <description>
                            <![CDATA[ The attack on medical tech company Stryker has severely impacted operations globally ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">uAEPy85heifUdKbTPUHP9Y</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/So4cFobEWd4kjqH4MbFRyA-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Mar 2026 12:37:46 +0000</pubDate>                                                                                                                                <updated>Thu, 12 Mar 2026 12:38:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/So4cFobEWd4kjqH4MbFRyA-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of medical technology company Stryker pictured on a building facade in Warsaw, Poland.]]></media:description>                                                            <media:text><![CDATA[Logo of medical technology company Stryker pictured on a building facade in Warsaw, Poland.]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of medical technology company Stryker pictured on a building facade in Warsaw, Poland.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/So4cFobEWd4kjqH4MbFRyA-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The rise of PhaaS: what businesses should know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/the-rise-of-phaas-what-businesses-should-know</link>
                                                                            <description>
                            <![CDATA[ With phishing as a service (PhaaS) on the rise, which new kits should firms know about and how can leaders avoid being caught out? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ZJmDoSAx6ZaBbWr73hedmG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Vwb8TLBgSxGdDgEKAcxuKZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Mar 2026 12:35:15 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Vwb8TLBgSxGdDgEKAcxuKZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A cartoon graphic depicting phishing as a service, shown as bugs, keys, fingerprints, bitcoins, shields, eyes, etc surrounding a fish hook. All are placed on a light grey background.]]></media:description>                                                            <media:text><![CDATA[A cartoon graphic depicting phishing as a service, shown as bugs, keys, fingerprints, bitcoins, shields, eyes, etc surrounding a fish hook. All are placed on a light grey background.]]></media:text>
                                <media:title type="plain"><![CDATA[A cartoon graphic depicting phishing as a service, shown as bugs, keys, fingerprints, bitcoins, shields, eyes, etc surrounding a fish hook. All are placed on a light grey background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Vwb8TLBgSxGdDgEKAcxuKZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Salesforce issues customer alert as ShinyHunters group claims Experience Cloud breach  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/salesforce-issues-customer-alert-as-shinyhunters-group-claims-experience-cloud-breach</link>
                                                                            <description>
                            <![CDATA[ Threat actors are using a modified version of the AuraInspector tool, according to Salesforce ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">AP9dvCZ46ZYq4paqA5QGE9</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QbKo3kcYEzKDffRkPHvNzc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 10 Mar 2026 11:20:08 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QbKo3kcYEzKDffRkPHvNzc-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Salesforce logo illuminated on a sign on the company&#039;s exhibitor stall at the China International Import Expo.]]></media:description>                                                            <media:text><![CDATA[Salesforce logo illuminated on a sign on the company&#039;s exhibitor stall at the China International Import Expo.]]></media:text>
                                <media:title type="plain"><![CDATA[Salesforce logo illuminated on a sign on the company&#039;s exhibitor stall at the China International Import Expo.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QbKo3kcYEzKDffRkPHvNzc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cloudflare warns state-backed hackers are ‘weaponizing legitimate enterprise ecosystems’ as ‘living off the land’ attacks surge ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/cloudflare-warns-state-backed-hackers-are-weaponizing-legitimate-enterprise-ecosystems-as-living-off-the-land-attacks-surge</link>
                                                                            <description>
                            <![CDATA[ Chinese, North Korean, and Russian-backed threat groups now favor longer-term compromises over brute force attacks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tDHyWXyTh5PSUqWYrFAqbV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 04 Mar 2026 09:23:15 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Russian DDoS: what’s the threat to businesses? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/russian-ddos-whats-the-threat-to-businesses</link>
                                                                            <description>
                            <![CDATA[ The UK National Cyber Security Centre (NCSC) has issued a warning that Russian-aligned hacktivist groups are targeting organizations ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ccTmK5nKuUhmHLYMEQgLEd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WaAZGD2aJwzNdfFfUmokSn-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 03 Mar 2026 08:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/WaAZGD2aJwzNdfFfUmokSn-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Russian flag, overlaid on a glowing blue digital image of binary code.]]></media:description>                                                            <media:text><![CDATA[The Russian flag, overlaid on a glowing blue digital image of binary code.]]></media:text>
                                <media:title type="plain"><![CDATA[The Russian flag, overlaid on a glowing blue digital image of binary code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WaAZGD2aJwzNdfFfUmokSn-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerability ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/security-agencies-issue-warning-over-critical-cisco-catalyst-sd-wan-vulnerability</link>
                                                                            <description>
                            <![CDATA[ Threat actors have been exploiting the vulnerability to achieve root access since 2023 ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">W3nhLCHBdhW9sQ8LSdtdbU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/tS8HTW7yrXNbExyfrJHDUN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 26 Feb 2026 10:12:05 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/tS8HTW7yrXNbExyfrJHDUN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of Cisco, developer of the Cisco ASA (Adaptive Security Appliance) device range, pictured at Mobile World Congress Barcelona 2023.]]></media:description>                                                            <media:text><![CDATA[Logo of Cisco, developer of the Cisco ASA (Adaptive Security Appliance) device range, pictured at Mobile World Congress Barcelona 2023.]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of Cisco, developer of the Cisco ASA (Adaptive Security Appliance) device range, pictured at Mobile World Congress Barcelona 2023.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/tS8HTW7yrXNbExyfrJHDUN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Vast majority of breaches enabled by preventable gaps, identity weaknesses says Palo Alto Networks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/vast-majority-breaches-enabled-preventable-gaps-identity-weaknesses-palo-alto-networks</link>
                                                                            <description>
                            <![CDATA[ Identity controls and better understanding of threat surface are key to rebuffing increasingly threatening cyber attacks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jMQGbFuJ3ArUEA5ehhEHbk</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/qqCnL6Mg4ATgEBpvadSuQi-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 17 Feb 2026 11:38:51 +0000</pubDate>                                                                                                                                <updated>Tue, 17 Feb 2026 12:03:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/qqCnL6Mg4ATgEBpvadSuQi-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A visualization of a green padlock surrounded by open orange padlocks, to represent identity attacks.]]></media:description>                                                            <media:text><![CDATA[A visualization of a green padlock surrounded by open orange padlocks, to represent identity attacks.]]></media:text>
                                <media:title type="plain"><![CDATA[A visualization of a green padlock surrounded by open orange padlocks, to represent identity attacks.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/qqCnL6Mg4ATgEBpvadSuQi-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security expert warns Salt Typhoon is becoming 'more dangerous' after Norwegian authorities lift lid on critical infrastructure hacking campaign ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/salt-typhoon-norway-cyber-espionage-warning</link>
                                                                            <description>
                            <![CDATA[ The Chinese state-backed hacking group has waged successful espionage campaigns against an array of organizations across Norway. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">5cKy9DBAE3N95B5r2F82im</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/uvuxUyoNcxZTsTdMdbPFKG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 09 Feb 2026 10:51:15 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/uvuxUyoNcxZTsTdMdbPFKG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Chinese hacker concept image symbolizing the Salt Typhoon threat group, with a man typing on keyboard with People&#039;s Republic of China (PRC) flag in background.]]></media:description>                                                            <media:text><![CDATA[Chinese hacker concept image symbolizing the Salt Typhoon threat group, with a man typing on keyboard with People&#039;s Republic of China (PRC) flag in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Chinese hacker concept image symbolizing the Salt Typhoon threat group, with a man typing on keyboard with People&#039;s Republic of China (PRC) flag in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/uvuxUyoNcxZTsTdMdbPFKG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google issues warning over ShinyHunters-branded vishing campaigns ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/google-issues-warning-over-shinyhunters-branded-vishing-campaigns</link>
                                                                            <description>
                            <![CDATA[ Related groups are stealing data through voice phishing  and fake credential harvesting websites ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zHr8MESTqLrM7FdPM6unGB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 04 Feb 2026 08:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:description>                                                            <media:text><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:text>
                                <media:title type="plain"><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Notepad++ hackers remained undetected and pushed malicious updates for six months – here’s who’s responsible, how they did it, and how to check if you’ve been affected ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/notepad-hackers-remained-undetected-and-pushed-malicious-updates-for-six-months-heres-whos-responsible-how-they-did-it-and-how-to-check-if-youve-been-affected</link>
                                                                            <description>
                            <![CDATA[ Hackers remained undetected for months and distributed malicious updates to Notepad++ users after breaching the text editor software – here's how to check if you've been affected. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Z8JWmAJVxKDr3msciCHySN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/T88XCMBKcwGSg5qaEXtdDR-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 03 Feb 2026 11:15:21 +0000</pubDate>                                                                                                                                <updated>Tue, 03 Feb 2026 11:15:35 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/T88XCMBKcwGSg5qaEXtdDR-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Chinese hackers concept image showing People&#039;s Republic of China (PRC) flag in background with shadowed hands typing on a laptop keyboard in foreground.]]></media:description>                                                            <media:text><![CDATA[Chinese hackers concept image showing People&#039;s Republic of China (PRC) flag in background with shadowed hands typing on a laptop keyboard in foreground.]]></media:text>
                                <media:title type="plain"><![CDATA[Chinese hackers concept image showing People&#039;s Republic of China (PRC) flag in background with shadowed hands typing on a laptop keyboard in foreground.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/T88XCMBKcwGSg5qaEXtdDR-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft warns of rising AitM phishing attacks on energy sector ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/microsoft-warns-of-rising-aitm-phishing-attacks-on-energy-sector</link>
                                                                            <description>
                            <![CDATA[ The campaign abused SharePoint file sharing services to deliver phishing payloads and altered inbox rules to maintain persistence ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Bt6xNvsN2W3SWsSesfhL95</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 23 Jan 2026 11:10:09 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:description>                                                            <media:text><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC names and shames pro-Russia hacktivist group amid escalating DDoS attacks on UK public services ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/ncsc-names-and-shames-pro-russia-hacktivist-group-amid-escalating-ddos-attacks-on-uk-public-services</link>
                                                                            <description>
                            <![CDATA[ Russia-linked hacktivists are increasingly trying to cause chaos for UK organizations ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jqeUd8AcbExEp3jjXdxNS4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 20 Jan 2026 10:55:05 +0000</pubDate>                                                                                                                                <updated>Tue, 20 Jan 2026 10:55:10 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:description>                                                            <media:text><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Scattered Spider evolved massively in 2025 – here’s what to expect in 2026 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/scattered-spider-evolved-massively-heres-what-to-expect</link>
                                                                            <description>
                            <![CDATA[ If 2025 was the year of Scattered Spider, 2026 could see the hacking collective ramp up further ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">wvKg8w3jMgt3siVw6K8RsH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/EC3BuBnLtE6s8TqRFjZodG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 14 Jan 2026 12:01:32 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/EC3BuBnLtE6s8TqRFjZodG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A CGI render of a circuitboard lined with red lines in the shape of a spider, representing the Scattered Spider threat group.]]></media:description>                                                            <media:text><![CDATA[A CGI render of a circuitboard lined with red lines in the shape of a spider, representing the Scattered Spider threat group.]]></media:text>
                                <media:title type="plain"><![CDATA[A CGI render of a circuitboard lined with red lines in the shape of a spider, representing the Scattered Spider threat group.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/EC3BuBnLtE6s8TqRFjZodG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Are AI cyber threats overhyped? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/are-ai-cyber-threats-overhyped</link>
                                                                            <description>
                            <![CDATA[ As cyber teams turn to the threats posed by AI, rising attacks by state-sponsored groups and ransomware gangs remain the biggest threat ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vbrBVjY68ytrxbiJynqogD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/M7tM2QS8kMpFQQmqNhUnJg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 09 Jan 2026 12:26:14 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/M7tM2QS8kMpFQQmqNhUnJg-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The text &quot;Are AI cyber threats overhyped?&quot; against a stylized background of green dots representing code on a dark background. The words &quot;AI cyber threats&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:description>                                                            <media:text><![CDATA[The text &quot;Are AI cyber threats overhyped?&quot; against a stylized background of green dots representing code on a dark background. The words &quot;AI cyber threats&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:text>
                                <media:title type="plain"><![CDATA[The text &quot;Are AI cyber threats overhyped?&quot; against a stylized background of green dots representing code on a dark background. The words &quot;AI cyber threats&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/M7tM2QS8kMpFQQmqNhUnJg-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Salt Typhoon attack on US congressional email system ‘exposes how vulnerable core communications systems remain to nation-state actors’ ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/salt-typhoon-us-congress-email-cyber-attack</link>
                                                                            <description>
                            <![CDATA[ The Salt Typhoon campaign marks the latest in a string of attacks on US government communications networks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">pscbcTCeM42F4YCpbhU5i8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/76io5ZvXUvjqDygtAD726R-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 08 Jan 2026 12:49:29 +0000</pubDate>                                                                                                                                <updated>Thu, 08 Jan 2026 12:50:22 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/76io5ZvXUvjqDygtAD726R-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The US House of Representatives chamber pictured empty during a press tour.]]></media:description>                                                            <media:text><![CDATA[The US House of Representatives chamber pictured empty during a press tour.]]></media:text>
                                <media:title type="plain"><![CDATA[The US House of Representatives chamber pictured empty during a press tour.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/76io5ZvXUvjqDygtAD726R-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hacked London council warns 100,000 households at risk of follow-up scams ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/kensington-and-chelsea-council-cyber-attack-data-breach</link>
                                                                            <description>
                            <![CDATA[ The council is warning residents they may be at increased risk of phishing scams in the wake of the cyber attack. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">wZ7G9ZrPZjmFuj5WHFTupd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FAsuGpEyETVLrjxktBXe5B-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 08 Jan 2026 12:04:34 +0000</pubDate>                                                                                                                                <updated>Thu, 08 Jan 2026 13:55:21 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FAsuGpEyETVLrjxktBXe5B-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Fallen leaves pictured on the pavement outside residential townhouses in London&#039;s Kensington Gardens area, part of the Kensington and Chelsea Council district.]]></media:description>                                                            <media:text><![CDATA[Fallen leaves pictured on the pavement outside residential townhouses in London&#039;s Kensington Gardens area, part of the Kensington and Chelsea Council district.]]></media:text>
                                <media:title type="plain"><![CDATA[Fallen leaves pictured on the pavement outside residential townhouses in London&#039;s Kensington Gardens area, part of the Kensington and Chelsea Council district.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FAsuGpEyETVLrjxktBXe5B-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hacker offering US engineering firm data online after alleged breach ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/hacker-offering-us-engineering-firm-data-online-after-alleged-breach</link>
                                                                            <description>
                            <![CDATA[ Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jh9aTUhGsytBhJ5PDe8U6k</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dyefxvMjRzV26cLHKKchw3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 07 Jan 2026 14:15:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dyefxvMjRzV26cLHKKchw3-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a yellow-colored alert symbol pictured against a jet black background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a yellow-colored alert symbol pictured against a jet black background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a yellow-colored alert symbol pictured against a jet black background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dyefxvMjRzV26cLHKKchw3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Amazon says Russian-backed threat groups were responsible for five-year-long attacks on edge devices – and it shows a ‘clear evolution in tactics’ ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/amazon-says-russian-backed-threat-groups-were-responsible-for-five-year-long-attacks-on-edge-devices-and-it-shows-a-clear-evolution-in-tactics</link>
                                                                            <description>
                            <![CDATA[ Russian-backed hacker groups are exploiting misconfigured edge devices – now preferring that tactic over hunting down traditional vulnerabilities to gain access to company networks. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">KPvcf4K6R3rXxXStfbPF9H</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ZkuGfPqG9kpZRACFyAJBaT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 23 Dec 2025 00:05:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ZkuGfPqG9kpZRACFyAJBaT-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Amazon logo pictured against an orange backdrop at the Amazon corporate headquarters in Seattle, Washington state.]]></media:description>                                                            <media:text><![CDATA[Amazon logo pictured against an orange backdrop at the Amazon corporate headquarters in Seattle, Washington state.]]></media:text>
                                <media:title type="plain"><![CDATA[Amazon logo pictured against an orange backdrop at the Amazon corporate headquarters in Seattle, Washington state.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ZkuGfPqG9kpZRACFyAJBaT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ UK government confirms October cyber breach: Everything we know so far ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/uk-government-confirms-october-cyber-breach-everything-we-know-so-far</link>
                                                                            <description>
                            <![CDATA[ Details around Foreign Office hack remain sparse and government says it's unclear who is behind the attack ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">irazv9nGQJrtXVwmYR45tN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/nYogShbW5e32t3rySKZUg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 22 Dec 2025 12:47:17 +0000</pubDate>                                                                                                                                <updated>Mon, 22 Dec 2025 12:48:07 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/nYogShbW5e32t3rySKZUg-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[House of Parliament at Westminster pictured at dawn with Big Ben clock tower and Thames River in foreground.]]></media:description>                                                            <media:text><![CDATA[House of Parliament at Westminster pictured at dawn with Big Ben clock tower and Thames River in foreground.]]></media:text>
                                <media:title type="plain"><![CDATA[House of Parliament at Westminster pictured at dawn with Big Ben clock tower and Thames River in foreground.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/nYogShbW5e32t3rySKZUg-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ CRINK attacks: which nation state hackers will be the biggest threat in 2026? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/crink-attacks-nation-state-hackers--threat-2026</link>
                                                                            <description>
                            <![CDATA[ The past year has seen a number of attacks performed by China, Russia, Iran and North Korea (CRINK) ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">7sUkhUJMjvtJhCpZTrpYRo</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/DLxjABjPkUcaH7dcPD3o2D-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 22 Dec 2025 08:30:00 +0000</pubDate>                                                                                                                                <updated>Mon, 22 Dec 2025 11:41:38 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/DLxjABjPkUcaH7dcPD3o2D-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An abstract map of the world overlaid with colorful geometric shapes, to represent the fractured regulatory landscape businesses face in 2025.]]></media:description>                                                            <media:text><![CDATA[An abstract map of the world overlaid with colorful geometric shapes, to represent the fractured regulatory landscape businesses face in 2025.]]></media:text>
                                <media:title type="plain"><![CDATA[An abstract map of the world overlaid with colorful geometric shapes, to represent the fractured regulatory landscape businesses face in 2025.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/DLxjABjPkUcaH7dcPD3o2D-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NHS supplier DXS International confirms cyber attack – here’s what we know so far ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/nhs-supplier-dxs-international-confirms-cyber-attack-heres-what-we-know-so-far</link>
                                                                            <description>
                            <![CDATA[ The NHS supplier says front-line clinical services are unaffected ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">CEoPtB9Ycevt6gaxLmi9Ei</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zoxC2QCJSmiHZA84Xve6qE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 19 Dec 2025 11:15:00 +0000</pubDate>                                                                                                                                <updated>Fri, 19 Dec 2025 11:15:50 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zoxC2QCJSmiHZA84Xve6qE-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[NHS logo displayed on a smartphone screen in white lettering on a blue background.]]></media:description>                                                            <media:text><![CDATA[NHS logo displayed on a smartphone screen in white lettering on a blue background.]]></media:text>
                                <media:title type="plain"><![CDATA[NHS logo displayed on a smartphone screen in white lettering on a blue background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zoxC2QCJSmiHZA84Xve6qE-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The future of threat detection ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/the-future-of-threat-detection</link>
                                                                            <description>
                            <![CDATA[ To fight sophisticated threats, cybersecurity teams will need to unify data like never before ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">kQ3sK7bL5MtDjLW4pmS3tG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/fFxVX9G7ChwSaaQBh3dmnk-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 19 Dec 2025 07:31:00 +0000</pubDate>                                                                                                                                <updated>Fri, 19 Dec 2025 16:10:11 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/fFxVX9G7ChwSaaQBh3dmnk-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The text &quot;The future of threat detection&quot; against a web of connected, red crosses on a dark grey background. The word &quot;threat detection&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:description>                                                            <media:text><![CDATA[The text &quot;The future of threat detection&quot; against a web of connected, red crosses on a dark grey background. The word &quot;threat detection&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:text>
                                <media:title type="plain"><![CDATA[The text &quot;The future of threat detection&quot; against a web of connected, red crosses on a dark grey background. The word &quot;threat detection&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/fFxVX9G7ChwSaaQBh3dmnk-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cisco says Chinese hackers are exploiting an unpatched AsyncOS zero-day flaw – here's what we know so far ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/cisco-says-chinese-hackers-are-exploiting-an-unpatched-asyncos-zero-day-flaw-heres-what-we-know-so-far</link>
                                                                            <description>
                            <![CDATA[ The zero-day vulnerability affects Cisco's Secure Email Gateway and Secure Email and Web Manager appliances – here's what we know so far. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">5LMxwYAnxTREWwNiSWa9Zf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Wjkyryzytyf6eV4b3zSVee-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 18 Dec 2025 11:51:54 +0000</pubDate>                                                                                                                                <updated>Thu, 18 Dec 2025 11:53:24 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Wjkyryzytyf6eV4b3zSVee-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cisco logo and branding pictured at the networking company&#039;s vendor stall at Mobile World Congress (MWC) 2023.]]></media:description>                                                            <media:text><![CDATA[Cisco logo and branding pictured at the networking company&#039;s vendor stall at Mobile World Congress (MWC) 2023.]]></media:text>
                                <media:title type="plain"><![CDATA[Cisco logo and branding pictured at the networking company&#039;s vendor stall at Mobile World Congress (MWC) 2023.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Wjkyryzytyf6eV4b3zSVee-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Researchers claim Salt Typhoon masterminds learned their trade at Cisco Network Academy ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/researchers-claim-salt-typhoon-masterminds-learned-their-trade-at-cisco-network-academy</link>
                                                                            <description>
                            <![CDATA[ The Salt Typhoon hacker group has targeted telecoms operators and US National Guard networks in recent years ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Am6HNf8ik5gcq9y2cMVkiN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/uvuxUyoNcxZTsTdMdbPFKG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 11 Dec 2025 12:10:22 +0000</pubDate>                                                                                                                                <updated>Fri, 12 Dec 2025 08:05:08 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/uvuxUyoNcxZTsTdMdbPFKG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Chinese hacker concept image symbolizing the Salt Typhoon threat group, with a man typing on keyboard with People&#039;s Republic of China (PRC) flag in background.]]></media:description>                                                            <media:text><![CDATA[Chinese hacker concept image symbolizing the Salt Typhoon threat group, with a man typing on keyboard with People&#039;s Republic of China (PRC) flag in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Chinese hacker concept image symbolizing the Salt Typhoon threat group, with a man typing on keyboard with People&#039;s Republic of China (PRC) flag in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/uvuxUyoNcxZTsTdMdbPFKG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The Scattered Lapsus$ Hunters group is targeting Zendesk customers – here’s what you need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/the-scattered-lapsus-usd-hunters-group-is-targeting-zendesk-customers-heres-what-you-need-to-know</link>
                                                                            <description>
                            <![CDATA[ The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">yA82eDy5m43beT5ptyrzhG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/KfsCD25eUDMdmZevdnb6rU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 27 Nov 2025 11:45:15 +0000</pubDate>                                                                                                                                <updated>Thu, 27 Nov 2025 11:46:02 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/KfsCD25eUDMdmZevdnb6rU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Zendesk logo and branding pictured on a smartphone screen. ]]></media:description>                                                            <media:text><![CDATA[Zendesk logo and branding pictured on a smartphone screen. ]]></media:text>
                                <media:title type="plain"><![CDATA[Zendesk logo and branding pictured on a smartphone screen. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/KfsCD25eUDMdmZevdnb6rU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposed ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/impact-of-asahi-cyber-attack-laid-bare-as-company-confirms-1-5-million-customers-exposed</link>
                                                                            <description>
                            <![CDATA[ No ransom has been paid, said president and group CEO Atsushi Katsuki, and the company is restoring its systems ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">XcX6ActjP2bh9LDh65xnZR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/aDBAN7h4XVnMEMPqko7mef-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 27 Nov 2025 10:50:40 +0000</pubDate>                                                                                                                                <updated>Thu, 27 Nov 2025 15:00:21 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/aDBAN7h4XVnMEMPqko7mef-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Asahi logo pictured outside the Asahi Kanagawa Brewery in Minamiashigara, Kanagawa, Japan.]]></media:description>                                                            <media:text><![CDATA[Asahi logo pictured outside the Asahi Kanagawa Brewery in Minamiashigara, Kanagawa, Japan.]]></media:text>
                                <media:title type="plain"><![CDATA[Asahi logo pictured outside the Asahi Kanagawa Brewery in Minamiashigara, Kanagawa, Japan.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/aDBAN7h4XVnMEMPqko7mef-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC called in as London councils grapple with cyber attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/ncsc-called-in-as-london-councils-grapple-with-cyber-attacks</link>
                                                                            <description>
                            <![CDATA[ In what looks likely to be a supply chain attack, councils are warning residents of service disruption ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Evahj8EE68meXXhpQuCLDK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 26 Nov 2025 12:49:01 +0000</pubDate>                                                                                                                                <updated>Wed, 26 Nov 2025 12:49:48 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ If you're not taking insider threats seriously, then the CrowdStrike incident should be a big wake up call ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/crowdstrike-insider-attack-wake-up-call</link>
                                                                            <description>
                            <![CDATA[ CrowdStrike has admitted an insider took screenshots of systems and shared them with hackers, and experts say it should serve as a wake up call for enterprises globally. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sg57L2N3Jffd7tBdAh3enX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ug3cSrYJ2LaGPZUpLwQk5Z-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 25 Nov 2025 16:05:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ug3cSrYJ2LaGPZUpLwQk5Z-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[CrowdStrike logo and branding pictured on a tablet screen in red lettering on a black background, with logo on smartphone screen in foreground in red lettering with white background.]]></media:description>                                                            <media:text><![CDATA[CrowdStrike logo and branding pictured on a tablet screen in red lettering on a black background, with logo on smartphone screen in foreground in red lettering with white background.]]></media:text>
                                <media:title type="plain"><![CDATA[CrowdStrike logo and branding pictured on a tablet screen in red lettering on a black background, with logo on smartphone screen in foreground in red lettering with white background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ug3cSrYJ2LaGPZUpLwQk5Z-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Shai-Hulud malware is back with a vengeance and has hit more than 19,000 GitHub repositories so far — here's what developers need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/shai-hulud-malware-is-back-with-a-vengeance-and-hit-more-than-19-000-github-repositories-so-far-heres-what-developers-need-to-know</link>
                                                                            <description>
                            <![CDATA[ The malware has compromised more than 700 widely-used npm packages, and is spreading fast ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">REg52qhZmQHgZURnJGdGi8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/S2kXYxtTBgGXo79HoNmvZZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 25 Nov 2025 10:38:18 +0000</pubDate>                                                                                                                                <updated>Tue, 25 Nov 2025 12:55:53 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/S2kXYxtTBgGXo79HoNmvZZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Dune Shai-Hulud concept image showing man standing on rock with giant sandworm breaching out of the sand. ]]></media:description>                                                            <media:text><![CDATA[Dune Shai-Hulud concept image showing man standing on rock with giant sandworm breaching out of the sand. ]]></media:text>
                                <media:title type="plain"><![CDATA[Dune Shai-Hulud concept image showing man standing on rock with giant sandworm breaching out of the sand. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/S2kXYxtTBgGXo79HoNmvZZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Wall Street giants warned of data exposure following supply chain attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/wall-street-giants-warned-of-data-exposure-following-supply-chain-attack</link>
                                                                            <description>
                            <![CDATA[ SitusAMC data including accounting records and legal agreements were stolen by unknown attacker ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">FHPtg4SB2pzpccxKDf5iZJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Y8WW2bmDMTQSn6TUJooweD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 24 Nov 2025 16:37:19 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Y8WW2bmDMTQSn6TUJooweD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A top-down view of traders at the New York Stock Exchange, on Wall Street.]]></media:description>                                                            <media:text><![CDATA[A top-down view of traders at the New York Stock Exchange, on Wall Street.]]></media:text>
                                <media:title type="plain"><![CDATA[A top-down view of traders at the New York Stock Exchange, on Wall Street.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Y8WW2bmDMTQSn6TUJooweD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Thousands of ASUS routers are being hijacked in a state-sponsored cyber espionage campaign ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/thousands-of-asus-routers-are-being-hijacked-in-a-state-sponsored-cyber-espionage-campaign</link>
                                                                            <description>
                            <![CDATA[ Researchers believe that Operation WrtHug is being carried out by Chinese state-sponsored hackers ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tBFZfxArvGBrV4Y4isv5qg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/U4fD8kp5nMyf2Vv865UTg6-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 19 Nov 2025 11:59:24 +0000</pubDate>                                                                                                                                <updated>Wed, 19 Nov 2025 12:00:08 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/U4fD8kp5nMyf2Vv865UTg6-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ASUS logo displayed at a promotional stall in a store in Hong Kong.]]></media:description>                                                            <media:text><![CDATA[ASUS logo displayed at a promotional stall in a store in Hong Kong.]]></media:text>
                                <media:title type="plain"><![CDATA[ASUS logo displayed at a promotional stall in a store in Hong Kong.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/U4fD8kp5nMyf2Vv865UTg6-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Logitech says zero-day attack saw hackers copy 'certain data' from internal IT systems ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/logitech-says-zero-day-attack-saw-hackers-copy-certain-data-from-internal-it-systems</link>
                                                                            <description>
                            <![CDATA[ The incident is believed to have formed part of a campaign by the Clop extortion group that targeted customers of Oracle’s E-Business Suite ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">X6eaqZzc7Useq6moPNTgUd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FNyPFqqTEv3ASE2LEsLayk-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 17 Nov 2025 10:48:01 +0000</pubDate>                                                                                                                                <updated>Mon, 17 Nov 2025 10:48:46 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FNyPFqqTEv3ASE2LEsLayk-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logitech logo pictured on a sign at the company&#039;s vendor booth at ISE 2025 in Barcelona, Spain.]]></media:description>                                                            <media:text><![CDATA[Logitech logo pictured on a sign at the company&#039;s vendor booth at ISE 2025 in Barcelona, Spain.]]></media:text>
                                <media:title type="plain"><![CDATA[Logitech logo pictured on a sign at the company&#039;s vendor booth at ISE 2025 in Barcelona, Spain.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FNyPFqqTEv3ASE2LEsLayk-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cyber insurance payouts are skyrocketing ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/cyber-insurance-payouts-are-skyrocketing</link>
                                                                            <description>
                            <![CDATA[ While more companies are taking out cyber insurance, experts warn that not everything is always covered ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">EnsbP6jbw6kgruu9tctDFc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/EpgLkF9hLowxLST8shybif-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 11 Nov 2025 11:54:45 +0000</pubDate>                                                                                                                                <updated>Tue, 11 Nov 2025 11:55:29 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/EpgLkF9hLowxLST8shybif-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Graph vector image showing upward trends denoting an increase in cybersecurity spending practices in 2025.]]></media:description>                                                            <media:text><![CDATA[Graph vector image showing upward trends denoting an increase in cybersecurity spending practices in 2025.]]></media:text>
                                <media:title type="plain"><![CDATA[Graph vector image showing upward trends denoting an increase in cybersecurity spending practices in 2025.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/EpgLkF9hLowxLST8shybif-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ M&S reveals massive financial hit from cyber attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/m-and-s-reveals-massive-financial-hit-from-cyber-attack</link>
                                                                            <description>
                            <![CDATA[ Statutory profit before tax was almost wiped out by the incident ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ny2dkG2JW7vLbBkd2FqeYn</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/aMsMu5LvrpDS6f9Gc4EPFa-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 06 Nov 2025 11:25:13 +0000</pubDate>                                                                                                                                <updated>Thu, 06 Nov 2025 11:25:56 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/aMsMu5LvrpDS6f9Gc4EPFa-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Pedestrians pictured walking past a Marks &amp; Spencer (M&amp;S) store front on Oxford Street, London.]]></media:description>                                                            <media:text><![CDATA[Pedestrians pictured walking past a Marks &amp; Spencer (M&amp;S) store front on Oxford Street, London.]]></media:text>
                                <media:title type="plain"><![CDATA[Pedestrians pictured walking past a Marks &amp; Spencer (M&amp;S) store front on Oxford Street, London.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/aMsMu5LvrpDS6f9Gc4EPFa-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A notorious ransomware group is spreading fake Microsoft Teams ads to snare victims ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/a-notorious-ransomware-group-is-spreading-fake-microsoft-teams-ads-to-snare-victims</link>
                                                                            <description>
                            <![CDATA[ The Rhysida ransomware group is leveraging Trusted Signing from Microsoft to lend plausibility to its activities ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ypMyi8ZbGGmjf5agPHZQnD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/G9Dv79E7SBGG2hp8n8G7Dc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 04 Nov 2025 16:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/G9Dv79E7SBGG2hp8n8G7Dc-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft Teams app for macOS pictured on a MacBook device screen.]]></media:description>                                                            <media:text><![CDATA[Microsoft Teams app for macOS pictured on a MacBook device screen.]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft Teams app for macOS pictured on a MacBook device screen.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/G9Dv79E7SBGG2hp8n8G7Dc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ US telco confirms hackers breached systems in stealthy state-backed cyber campaign – and remained undetected for nearly a year ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/us-telco-confirms-hackers-breached-systems-in-stealthy-state-backed-cyber-campaign-and-remained-undetected-for-nearly-a-year</link>
                                                                            <description>
                            <![CDATA[ The hackers remained undetected in the Ribbon Communications’ systems for months ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">CDyuN6Tnvhk4ZagVxLKmaD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/VLRkVzMHkpyQEwkuXz7kWU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 31 Oct 2025 11:48:42 +0000</pubDate>                                                                                                                                <updated>Fri, 31 Oct 2025 11:49:25 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/VLRkVzMHkpyQEwkuXz7kWU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ribbon Communications logo and branding pictured at the company&#039;s vendor stall at Mobile World Congress (MWC) 2023.]]></media:description>                                                            <media:text><![CDATA[Ribbon Communications logo and branding pictured at the company&#039;s vendor stall at Mobile World Congress (MWC) 2023.]]></media:text>
                                <media:title type="plain"><![CDATA[Ribbon Communications logo and branding pictured at the company&#039;s vendor stall at Mobile World Congress (MWC) 2023.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/VLRkVzMHkpyQEwkuXz7kWU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are using these malicious npm packages to target developers on Windows, macOS, and Linux systems – here’s how to stay safe ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/hackers-are-using-these-malicious-npm-packages-to-target-developers-windows-macos-and-linux-systems-heres-how-to-stay-safe</link>
                                                                            <description>
                            <![CDATA[ Security experts have issued a warning to developers after ten malicious npm packages were found to deliver infostealer malware across Windows, Linux, and macOS systems. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">QPudZTpdftQoXU8Cq9PzxC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RZkY82LLq5627rxcbWkaVb-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 30 Oct 2025 12:20:13 +0000</pubDate>                                                                                                                                <updated>Thu, 30 Oct 2025 12:55:04 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RZkY82LLq5627rxcbWkaVb-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware concept image showing malicious npm packages contained in a red highlighted file surrounded by legitimate folders.]]></media:description>                                                            <media:text><![CDATA[Malware concept image showing malicious npm packages contained in a red highlighted file surrounded by legitimate folders.]]></media:text>
                                <media:title type="plain"><![CDATA[Malware concept image showing malicious npm packages contained in a red highlighted file surrounded by legitimate folders.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RZkY82LLq5627rxcbWkaVb-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Former NCSC head says the Jaguar Land Rover attack was the 'single most financially damaging cyber event ever to hit the UK' as impact laid bare ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/jaguar-land-rover-cyber-attack-financial-impact-cyber-monitoring-centre</link>
                                                                            <description>
                            <![CDATA[ Researchers said they place the UK financial impact of the attack on Jaguar Land Rover at around £1.9 billion. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">CgYB5U3EbrCe6EpQ2heMcZ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RdHFh4c6z5Yd6QCQuivaQk-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 22 Oct 2025 09:55:52 +0000</pubDate>                                                                                                                                <updated>Wed, 22 Oct 2025 10:02:08 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RdHFh4c6z5Yd6QCQuivaQk-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Production line on the factory floor of the Jaguar Land Rover assembly plant in Solihull, England.]]></media:description>                                                            <media:text><![CDATA[Production line on the factory floor of the Jaguar Land Rover assembly plant in Solihull, England.]]></media:text>
                                <media:title type="plain"><![CDATA[Production line on the factory floor of the Jaguar Land Rover assembly plant in Solihull, England.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RdHFh4c6z5Yd6QCQuivaQk-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Threat actors are exploiting flaws more quickly – here's what business leaders should do ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/threat-actors-exploiting-quickly-what-business-leaders-should-do</link>
                                                                            <description>
                            <![CDATA[ Without proactive patch management, businesses are vulnerable to attacks on overlooked weaknesses ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eukbh7suyYfepcpSFwskrY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/A8UToEpaC2VJSVq9UG3BmU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 21 Oct 2025 12:09:48 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/A8UToEpaC2VJSVq9UG3BmU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A CGI render showing a red clock surrounded by hazard floor signs, on a pale blue background.]]></media:description>                                                            <media:text><![CDATA[A CGI render showing a red clock surrounded by hazard floor signs, on a pale blue background.]]></media:text>
                                <media:title type="plain"><![CDATA[A CGI render showing a red clock surrounded by hazard floor signs, on a pale blue background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/A8UToEpaC2VJSVq9UG3BmU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cyber experts have been warning about AI-powered DDoS attacks – now they’re becoming a reality ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/cyber-experts-have-been-warning-about-ai-powered-ddos-attacks-now-theyre-becoming-a-reality</link>
                                                                            <description>
                            <![CDATA[ DDoS attackers are flocking to AI tools and solutions to power increasingly devastating attacks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">B2jdh5ChJ9b6rGwrcaiwfi</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/JNx6cDAorJmPFmr2saspoG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 21 Oct 2025 10:36:58 +0000</pubDate>                                                                                                                                <updated>Tue, 21 Oct 2025 10:37:37 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/JNx6cDAorJmPFmr2saspoG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[DDoS attack concept image showing data terminals distributed in several different global locations, all interlinked with red glowing lights.]]></media:description>                                                            <media:text><![CDATA[DDoS attack concept image showing data terminals distributed in several different global locations, all interlinked with red glowing lights.]]></media:text>
                                <media:title type="plain"><![CDATA[DDoS attack concept image showing data terminals distributed in several different global locations, all interlinked with red glowing lights.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/JNx6cDAorJmPFmr2saspoG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft issues warning over “opportunistic” cyber criminals targeting big business ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/microsoft-issues-warning-over-opportunistic-cyber-criminals-targeting-big-business</link>
                                                                            <description>
                            <![CDATA[ Microsoft has called on governments to do more to support organizations ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ufHbR5Rg3fPPLAJnVtEKqA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 20 Oct 2025 14:29:29 +0000</pubDate>                                                                                                                                <updated>Mon, 20 Oct 2025 14:30:08 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers stole source code, bug details in disastrous F5 security incident – here’s everything we know and how to protect yourself ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/f5-security-incident-what-we-know-so-far</link>
                                                                            <description>
                            <![CDATA[ CISA has warned the F5 security incident presents a serious threat to federal networks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">k2fbTmrERuxRQhEesF8geR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WvBYgg3DiH9a4NENQJueTg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 16 Oct 2025 09:31:48 +0000</pubDate>                                                                                                                                <updated>Thu, 16 Oct 2025 09:32:26 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/WvBYgg3DiH9a4NENQJueTg-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[F5 logo and branding pictured on a smartphone screen held up in hand with company logo in background.]]></media:description>                                                            <media:text><![CDATA[F5 logo and branding pictured on a smartphone screen held up in hand with company logo in background.]]></media:text>
                                <media:title type="plain"><![CDATA[F5 logo and branding pictured on a smartphone screen held up in hand with company logo in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WvBYgg3DiH9a4NENQJueTg-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>