<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/feeds/tag/cyber-crime" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro in Cyber-crime ]]></title>
                <link>https://www.itpro.com/security/cyber-crime</link>
        <description><![CDATA[ All the latest cyber-crime content from the ITPro team ]]></description>
                                    <lastBuildDate>Fri, 17 Apr 2026 11:05:53 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ Tycoon 2FA is down, but not out – researchers warn the phishing as a service operation is still a huge threat to businesses ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/tycoon-2fa-phishing-risk-takedown-barracuda</link>
                                                                            <description>
                            <![CDATA[ Millions of Tycoon 2FA attacks are still hitting businesses, according to research from Barracuda ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vXDsxDKKWbMUkuvkVXXwHC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 17 Apr 2026 11:05:53 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ German authorities want your help finding the hackers behind GandCrab and REvil  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/german-authorities-want-your-help-finding-the-hackers-behind-gandcrab-and-revil</link>
                                                                            <description>
                            <![CDATA[ Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fdDCDsuwTqeNGjcqnLSn5n</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 07 Apr 2026 11:12:24 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Dark web platforms taken down in international operation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/dark-web-platforms-taken-down-in-international-operation</link>
                                                                            <description>
                            <![CDATA[ Operation Alice traced tens of thousands of CSAM and cybercrime-as-a-service sites back to one individual ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">BdisyDLHNnfwtRmP3zyLj5</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/hNt2JaLuS3Ribvoh5XfgT8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 23 Mar 2026 12:16:15 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/hNt2JaLuS3Ribvoh5XfgT8-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Image of a Europol sign affixed to its Amsterdam headquarters]]></media:description>                                                            <media:text><![CDATA[Image of a Europol sign affixed to its Amsterdam headquarters]]></media:text>
                                <media:title type="plain"><![CDATA[Image of a Europol sign affixed to its Amsterdam headquarters]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/hNt2JaLuS3Ribvoh5XfgT8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Tomorrow's fraud techniques ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/tomorrows-fraud-techniques</link>
                                                                            <description>
                            <![CDATA[ Leaders need to proactive as attackers launch more consistent, sophisticated attacks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">YSt4fP3QNyRUV8QoGCFYTm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/UhaTLQjGywjs4tCHCcVgoe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Mar 2026 13:03:15 +0000</pubDate>                                                                                                                                <updated>Fri, 13 Mar 2026 16:01:09 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/UhaTLQjGywjs4tCHCcVgoe-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The text &quot;Tomorrow&#039;s fraud techniques&quot; against a glitched, green face on a dark background. The words &quot;fraud techniques&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:description>                                                            <media:text><![CDATA[The text &quot;Tomorrow&#039;s fraud techniques&quot; against a glitched, green face on a dark background. The words &quot;fraud techniques&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:text>
                                <media:title type="plain"><![CDATA[The text &quot;Tomorrow&#039;s fraud techniques&quot; against a glitched, green face on a dark background. The words &quot;fraud techniques&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/UhaTLQjGywjs4tCHCcVgoe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Interpol teams up with tech firms to seize 45,000 malicious IPs, servers in global cyber crime crackdown ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/interpol-teams-up-with-tech-firms-to-seize-45-000-malicious-ips-servers-in-global-cyber-crime-crackdown</link>
                                                                            <description>
                            <![CDATA[ Operation Synergia III saw 94 arrests - and counting - with malicious IP addresses used in phishing and fraud schemes seized ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">XFNDAXHXAFtquRa5PNdCj4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iYKtddn8SPxwMyTSxMyxEK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Mar 2026 11:48:22 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iYKtddn8SPxwMyTSxMyxEK-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Interpol logo and insignia pictured on a building facade at a regional unit in Singapore. ]]></media:description>                                                            <media:text><![CDATA[Interpol logo and insignia pictured on a building facade at a regional unit in Singapore. ]]></media:text>
                                <media:title type="plain"><![CDATA[Interpol logo and insignia pictured on a building facade at a regional unit in Singapore. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iYKtddn8SPxwMyTSxMyxEK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/the-rise-of-teen-hackers-makes-for-a-good-headline-but-cyber-crime-activities-peak-later-in-life</link>
                                                                            <description>
                            <![CDATA[ With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">AixB4pKPDWgHro8HrA47Jg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 11 Mar 2026 10:56:05 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cloudflare warns state-backed hackers are ‘weaponizing legitimate enterprise ecosystems’ as ‘living off the land’ attacks surge ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/cloudflare-warns-state-backed-hackers-are-weaponizing-legitimate-enterprise-ecosystems-as-living-off-the-land-attacks-surge</link>
                                                                            <description>
                            <![CDATA[ Chinese, North Korean, and Russian-backed threat groups now favor longer-term compromises over brute force attacks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tDHyWXyTh5PSUqWYrFAqbV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 04 Mar 2026 09:23:15 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ DIY hackers are turning to ‘flat-pack’ malware components to speed up attacks and cut costs ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/diy-hackers-are-turning-to-flat-pack-malware-components-to-speed-up-attacks-and-cut-costs</link>
                                                                            <description>
                            <![CDATA[ While these malware campaigns are very basic, researchers noted “they still work” ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9micgTJB6ymCrHncsBFWMm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/oo8cMGiY5DwjHYxKQ8VLsB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 03 Mar 2026 09:00:00 +0000</pubDate>                                                                                                                                <updated>Tue, 03 Mar 2026 11:24:46 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/oo8cMGiY5DwjHYxKQ8VLsB-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware vector image showing alert symbol with exclamation mark and &#039;malware&#039; written underneath imposed over a digital interface.]]></media:description>                                                            <media:text><![CDATA[Malware vector image showing alert symbol with exclamation mark and &#039;malware&#039; written underneath imposed over a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Malware vector image showing alert symbol with exclamation mark and &#039;malware&#039; written underneath imposed over a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/oo8cMGiY5DwjHYxKQ8VLsB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security expert warns Salt Typhoon is becoming 'more dangerous' after Norwegian authorities lift lid on critical infrastructure hacking campaign ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/salt-typhoon-norway-cyber-espionage-warning</link>
                                                                            <description>
                            <![CDATA[ The Chinese state-backed hacking group has waged successful espionage campaigns against an array of organizations across Norway. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">5cKy9DBAE3N95B5r2F82im</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/uvuxUyoNcxZTsTdMdbPFKG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 09 Feb 2026 10:51:15 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/uvuxUyoNcxZTsTdMdbPFKG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Chinese hacker concept image symbolizing the Salt Typhoon threat group, with a man typing on keyboard with People&#039;s Republic of China (PRC) flag in background.]]></media:description>                                                            <media:text><![CDATA[Chinese hacker concept image symbolizing the Salt Typhoon threat group, with a man typing on keyboard with People&#039;s Republic of China (PRC) flag in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Chinese hacker concept image symbolizing the Salt Typhoon threat group, with a man typing on keyboard with People&#039;s Republic of China (PRC) flag in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/uvuxUyoNcxZTsTdMdbPFKG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwise ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/the-fbi-has-seized-the-ramp-hacking-forum-but-will-the-takedown-stick-history-tells-us-otherwise</link>
                                                                            <description>
                            <![CDATA[ Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9MuHqZhvZQ6Bwhq8kvCxDk</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RSjE8LWxBzgjnadXPUW8mB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 30 Jan 2026 10:56:12 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RSjE8LWxBzgjnadXPUW8mB-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing a silhouetted person in a black hat with binary code in background. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing a silhouetted person in a black hat with binary code in background. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing a silhouetted person in a black hat with binary code in background. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RSjE8LWxBzgjnadXPUW8mB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft just took down notorious cyber crime marketplace RedVDS – and found hackers were using ChatGPT and its own Copilot tool to wage attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/redvds-cyber-crime-takedown-microsoft-chatgpt-copilot</link>
                                                                            <description>
                            <![CDATA[ Microsoft worked closely with law enforcement to take down the notorious RedVDS cyber crime service – and found tools like ChatGPT and its own Copilot were being used by hackers. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">xzuWPQywa2MVPA83CQJ2D5</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 15 Jan 2026 11:51:51 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:description>                                                            <media:text><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hacked London council warns 100,000 households at risk of follow-up scams ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/kensington-and-chelsea-council-cyber-attack-data-breach</link>
                                                                            <description>
                            <![CDATA[ The council is warning residents they may be at increased risk of phishing scams in the wake of the cyber attack. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">wZ7G9ZrPZjmFuj5WHFTupd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FAsuGpEyETVLrjxktBXe5B-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 08 Jan 2026 12:04:34 +0000</pubDate>                                                                                                                                <updated>Thu, 08 Jan 2026 13:55:21 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FAsuGpEyETVLrjxktBXe5B-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Fallen leaves pictured on the pavement outside residential townhouses in London&#039;s Kensington Gardens area, part of the Kensington and Chelsea Council district.]]></media:description>                                                            <media:text><![CDATA[Fallen leaves pictured on the pavement outside residential townhouses in London&#039;s Kensington Gardens area, part of the Kensington and Chelsea Council district.]]></media:text>
                                <media:title type="plain"><![CDATA[Fallen leaves pictured on the pavement outside residential townhouses in London&#039;s Kensington Gardens area, part of the Kensington and Chelsea Council district.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FAsuGpEyETVLrjxktBXe5B-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cyber crime group claims successful attack on security firm, crows about it on Telegram – but it was all an elaborate honeypot ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime-group-claims-successful-attack-on-security-firm-crows-about-it-on-telegram-but-it-was-all-an-elaborate-honeypot</link>
                                                                            <description>
                            <![CDATA[ Scattered LAPSUS$ Hunters thought it had access to vast amounts of Resecurity's internal data, but the whole thing was just a set-up ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">cHg8Yz29i5ZEo3y72PTUoM</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 05 Jan 2026 10:33:02 +0000</pubDate>                                                                                                                                <updated>Mon, 05 Jan 2026 10:33:55 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cybersecurity experts face 20 years in prison following ransomware campaign ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/cybersecurity-experts-face-20-years-in-prison-following-ransomware-campaign</link>
                                                                            <description>
                            <![CDATA[ Two men used their tech expertise to carry out ALPHV BlackCat ransomware attacks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">YwMMNB6gfVuwvTVR73aFEU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 02 Jan 2026 14:16:08 +0000</pubDate>                                                                                                                                <updated>Mon, 05 Jan 2026 09:09:08 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:description>                                                            <media:text><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:text>
                                <media:title type="plain"><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Trend Micro issues warning over rise of 'vibe crime' as cyber criminals turn to agentic AI to automate attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/trend-micro-vibe-crime-agentic-ai-cyber-crime</link>
                                                                            <description>
                            <![CDATA[ Trend Micro is warning of a boom in 'vibe crime' - the use of agentic AI to support fully-automated cyber criminal operations and accelerate attacks. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ywnrH7u267qTjEXLD2mHkF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/288LYNa6Bw9URT5mvTzTkZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 11 Dec 2025 08:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/288LYNa6Bw9URT5mvTzTkZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Agentic AI cyber crime concept image showing digital system with padlock symbol with glowing data flow passing through.]]></media:description>                                                            <media:text><![CDATA[Agentic AI cyber crime concept image showing digital system with padlock symbol with glowing data flow passing through.]]></media:text>
                                <media:title type="plain"><![CDATA[Agentic AI cyber crime concept image showing digital system with padlock symbol with glowing data flow passing through.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/288LYNa6Bw9URT5mvTzTkZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 15-year-old revealed as key player in Scattered LAPSUS$ Hunters ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/15-year-old-revealed-as-key-player-in-scattered-lapsus-usd-hunters</link>
                                                                            <description>
                            <![CDATA[ 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zBxmT5CgDixJiMrXLmNAZf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9AjMFuVUqXnko5FNhrMuKC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 28 Nov 2025 13:23:42 +0000</pubDate>                                                                                                                                <updated>Fri, 28 Nov 2025 13:28:57 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/9AjMFuVUqXnko5FNhrMuKC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing young man with hood covering face typing on a keyboard in a dark room.]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing young man with hood covering face typing on a keyboard in a dark room.]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing young man with hood covering face typing on a keyboard in a dark room.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9AjMFuVUqXnko5FNhrMuKC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ November rundown: CrowdStrike's insider threat ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/podcast-crowdstrikes-insider-threat</link>
                                                                            <description>
                            <![CDATA[ As CrowdStrike grappled with a malicious employee, Cloudflare suffered a major outage ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9by3LAKy3RkFkKYHyr7WFT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/YwZ4KQZ9beF2GcwMtqn8pD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 28 Nov 2025 07:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/YwZ4KQZ9beF2GcwMtqn8pD-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The text &quot;Crowdstrike&#039;s insider threat&quot; against an orange target symbol on a grey background. The words &quot;insider threat&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:description>                                                            <media:text><![CDATA[The text &quot;Crowdstrike&#039;s insider threat&quot; against an orange target symbol on a grey background. The words &quot;insider threat&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:text>
                                <media:title type="plain"><![CDATA[The text &quot;Crowdstrike&#039;s insider threat&quot; against an orange target symbol on a grey background. The words &quot;insider threat&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/YwZ4KQZ9beF2GcwMtqn8pD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The US, UK, and Australia just imposed sanctions on a Russian cyber crime group – 'we are exposing their dark networks and going after those responsible' ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/the-us-uk-and-australia-just-imposed-sanctions-on-a-russian-cyber-crime-group-we-are-exposing-their-dark-networks-and-going-after-those-responsible</link>
                                                                            <description>
                            <![CDATA[ Media Land offers 'bulletproof' hosting services used for ransomware and DDoS attacks around the world ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jbcE8oNisiHJvQRxooNzLU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Aqeo3GHF5pnDS754K9ahY5-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 20 Nov 2025 10:55:00 +0000</pubDate>                                                                                                                                <updated>Fri, 21 Nov 2025 08:31:54 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Aqeo3GHF5pnDS754K9ahY5-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Russian cyber crime concept image showing Russian national flag with padlock symbol in background with smashed glass in foreground.]]></media:description>                                                            <media:text><![CDATA[Russian cyber crime concept image showing Russian national flag with padlock symbol in background with smashed glass in foreground.]]></media:text>
                                <media:title type="plain"><![CDATA[Russian cyber crime concept image showing Russian national flag with padlock symbol in background with smashed glass in foreground.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Aqeo3GHF5pnDS754K9ahY5-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Europol hails triple takedown with Rhadamanthys, VenomRAT, and Elysium sting operations ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/europol-hails-triple-takedown-with-rhadamanthys-venomrat-and-elysium-sting-operations</link>
                                                                            <description>
                            <![CDATA[ The Rhadamanthys infostealer operation is one of the latest victims of Europol's Operation Endgame, with more than a thousand servers taken down ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">84rf84B6USKP3XsAAbyTHC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/hNt2JaLuS3Ribvoh5XfgT8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 17 Nov 2025 12:08:54 +0000</pubDate>                                                                                                                                <updated>Mon, 17 Nov 2025 12:09:39 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/hNt2JaLuS3Ribvoh5XfgT8-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Image of a Europol sign affixed to its Amsterdam headquarters]]></media:description>                                                            <media:text><![CDATA[Image of a Europol sign affixed to its Amsterdam headquarters]]></media:text>
                                <media:title type="plain"><![CDATA[Image of a Europol sign affixed to its Amsterdam headquarters]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/hNt2JaLuS3Ribvoh5XfgT8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Europol takes down SIM farm network that scammed thousands of victims ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/europol-takes-down-sim-farm-network-scammed-thousands</link>
                                                                            <description>
                            <![CDATA[ The sophisticated operation led to crimes from simple phishing to investment fraud ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">EmFW94M7jHtP8jqXoXAj7V</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Lq6brmg8jRUNyRnyv5SBxe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 20 Oct 2025 11:27:29 +0000</pubDate>                                                                                                                                <updated>Mon, 20 Oct 2025 11:28:08 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Lq6brmg8jRUNyRnyv5SBxe-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A glowing shield formed from glowing points and lines in an abstract landscape to represent security controls.]]></media:description>                                                            <media:text><![CDATA[A glowing shield formed from glowing points and lines in an abstract landscape to represent security controls.]]></media:text>
                                <media:title type="plain"><![CDATA[A glowing shield formed from glowing points and lines in an abstract landscape to represent security controls.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Lq6brmg8jRUNyRnyv5SBxe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ DNS Security 101: Safeguarding your business from cyber threats ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/dns-security-101-safeguarding-your-business-from-cyber-threats</link>
                                                                            <description>
                            <![CDATA[ What strategies can businesses implement to strengthen defenses against the increased threat landscape? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fn9WGWCsjNj45T7uw7JCuf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/aSbfsNzaNX7t8ueawAP2xZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Oct 2025 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ram Mohan ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/aSbfsNzaNX7t8ueawAP2xZ-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Attack]]></media:description>                                                            <media:text><![CDATA[Attack]]></media:text>
                                <media:title type="plain"><![CDATA[Attack]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/aSbfsNzaNX7t8ueawAP2xZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘Channel their curiosity into something meaningful’: Cyber expert warns an uptick of youth hackers should be a ‘wake-up call’ after teens charged over TfL attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/channel-their-curiosity-into-something-meaningful-cyber-expert-warns-an-uptick-of-youth-hackers-should-be-a-wake-up-call-after-teens-charged-over-tfl-attack</link>
                                                                            <description>
                            <![CDATA[ Encouraging youths to engage in positive tech initiatives will guide them down the right path and away from nefarious activities ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">WugG4wEK5H8nQyf7wGFg8M</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/S2Ccb42WNY5VTpTYRAM3Wj-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 19 Sep 2025 15:45:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/S2Ccb42WNY5VTpTYRAM3Wj-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Youth hacker concept image showing teenage boy coding on a laptop in a dimly-lit room.]]></media:description>                                                            <media:text><![CDATA[Youth hacker concept image showing teenage boy coding on a laptop in a dimly-lit room.]]></media:text>
                                <media:title type="plain"><![CDATA[Youth hacker concept image showing teenage boy coding on a laptop in a dimly-lit room.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/S2Ccb42WNY5VTpTYRAM3Wj-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ BreachForums founder resentenced to three years in prison ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/breachforums-founder-resentenced-to-three-years-in-prison</link>
                                                                            <description>
                            <![CDATA[ A US appeals court vacated his previous sentence and remanded the case for resentencing ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">89c6NL7kU77oCJUB2tkVgV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 18 Sep 2025 07:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:description>                                                            <media:text><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:text>
                                <media:title type="plain"><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/jaguar-land-rover-did-the-right-thing-shutting-down-systems-to-thwart-cyber-attack</link>
                                                                            <description>
                            <![CDATA[ The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">D57UajELbiS6N9VR6p5zoH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9pwYva8LtuzWuM93eM7TCd-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 03 Sep 2025 10:14:36 +0000</pubDate>                                                                                                                                <updated>Wed, 03 Sep 2025 10:15:07 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/9pwYva8LtuzWuM93eM7TCd-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Jaguar Land Rover dealership with Jaguar and Land Rover logos pictured on a sign. ]]></media:description>                                                            <media:text><![CDATA[Jaguar Land Rover dealership with Jaguar and Land Rover logos pictured on a sign. ]]></media:text>
                                <media:title type="plain"><![CDATA[Jaguar Land Rover dealership with Jaguar and Land Rover logos pictured on a sign. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9pwYva8LtuzWuM93eM7TCd-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Anthropic admits hackers have 'weaponized' its tools – and cyber experts warn it's a terrifying glimpse into 'how quickly AI is changing the threat landscape' ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/anthropic-admits-hackers-have-weaponized-its-tools-and-cyber-experts-warn-its-a-terrifying-glimpse-into-how-quickly-ai-is-changing-the-threat-landscape</link>
                                                                            <description>
                            <![CDATA[ Security experts say Anthropic's recent admission that hackers have "weaponized" its AI tools gives us a terrifying glimpse into the future of cyber crime. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sNQmBcMMc3ECxbQp7Yd5qE</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/nBgbYBKj4tUofQNaYdx3mX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 02 Sep 2025 10:10:53 +0000</pubDate>                                                                                                                                <updated>Tue, 02 Sep 2025 10:11:24 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/nBgbYBKj4tUofQNaYdx3mX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Anthropic logo symbol on a smartphone screen with Claude AI model logo and branding pictured in background.]]></media:description>                                                            <media:text><![CDATA[Anthropic logo symbol on a smartphone screen with Claude AI model logo and branding pictured in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Anthropic logo symbol on a smartphone screen with Claude AI model logo and branding pictured in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/nBgbYBKj4tUofQNaYdx3mX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The Allianz Life data breach just took a huge turn for the worse ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/allianz-life-data-breach-customer-accounts-impacted</link>
                                                                            <description>
                            <![CDATA[ Around 1.1 million Allianz Life customers are believed to have been impacted in a recent data breach, making up the vast majority of the insurer's North American customers. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ADG2qEJ4qjUX9B5Uh9ZWSX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WyQDsXrph78RGRusAv8L7g-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 20 Aug 2025 10:40:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/WyQDsXrph78RGRusAv8L7g-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of Allianz, parent company of Allianz Life, pictured in Berlin city center.]]></media:description>                                                            <media:text><![CDATA[Logo of Allianz, parent company of Allianz Life, pictured in Berlin city center.]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of Allianz, parent company of Allianz Life, pictured in Berlin city center.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WyQDsXrph78RGRusAv8L7g-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Warning issued as new Pakistan-based malware group hits millions globally ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/warning-issued-as-new-pakistan-based-malware-group-hits-millions-globally</link>
                                                                            <description>
                            <![CDATA[ Tempting people in with offers of pirated software, the network installs commodity infostealers, according to CloudSEK ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">R8wUYjv2NQWMDuhdKvRn5n</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/wtsGxk4n6oHAkbWZ7YpcKF-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 15 Aug 2025 11:59:20 +0000</pubDate>                                                                                                                                <updated>Fri, 15 Aug 2025 11:59:39 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/wtsGxk4n6oHAkbWZ7YpcKF-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware concept image showing a shield with a red-colored, locked padlock place on top.]]></media:description>                                                            <media:text><![CDATA[Malware concept image showing a shield with a red-colored, locked padlock place on top.]]></media:text>
                                <media:title type="plain"><![CDATA[Malware concept image showing a shield with a red-colored, locked padlock place on top.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/wtsGxk4n6oHAkbWZ7YpcKF-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The rise of GhostGPT – Why cybercriminals are turning to generative AI ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/the-rise-of-ghostgpt-why-cybercriminals-are-turning-to-generative-ai</link>
                                                                            <description>
                            <![CDATA[ GhostGPT is not an AI tool - It has been explicitly repurposed for criminal activity ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qU3TtqDgfUCVggCaKa5tR5</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/XXVBViWyi8AEAdzh2ktnvQ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 01 Aug 2025 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ryan Estes ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/XXVBViWyi8AEAdzh2ktnvQ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A small plastic cartoon-style ghost, sat on an orange background. The ghost resembles a white bedsheet with black eyeholes cut at the top.]]></media:description>                                                            <media:text><![CDATA[A small plastic cartoon-style ghost, sat on an orange background. The ghost resembles a white bedsheet with black eyeholes cut at the top.]]></media:text>
                                <media:title type="plain"><![CDATA[A small plastic cartoon-style ghost, sat on an orange background. The ghost resembles a white bedsheet with black eyeholes cut at the top.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/XXVBViWyi8AEAdzh2ktnvQ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Arrests made after huge HMRC scam campaign hit 100,000 accounts ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/arrests-made-after-huge-hmrc-scam-campaign-hit-100-000-accounts</link>
                                                                            <description>
                            <![CDATA[ The Romanian nationals are accused of having used stolen data to make fraudulent claims ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">To4PxGYrHF5DJUWxqWiHmj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/xP6A8Prw5RKCLWiZNrCaNT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 14 Jul 2025 12:37:13 +0000</pubDate>                                                                                                                                <updated>Mon, 14 Jul 2025 12:37:34 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/xP6A8Prw5RKCLWiZNrCaNT-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[HM Revenue &amp; Customs (HMRC) letter pictured on a table top. ]]></media:description>                                                            <media:text><![CDATA[HM Revenue &amp; Customs (HMRC) letter pictured on a table top. ]]></media:text>
                                <media:title type="plain"><![CDATA[HM Revenue &amp; Customs (HMRC) letter pictured on a table top. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/xP6A8Prw5RKCLWiZNrCaNT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Millions of customers have been exposed in the Qantas cyber attack – here’s everything we know so far ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/qantas-cyber-attack-six-million-customers-exposed</link>
                                                                            <description>
                            <![CDATA[ While details remain murky, cyber experts told ITPro the Qantas incident bears all the hallmarks of the Scattered Spider ransomware group. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">SmrTMohCqqQDG6BMYm5eQb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/hRSyexQrm5mG9MV3zQY4E9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 02 Jul 2025 11:05:37 +0000</pubDate>                                                                                                                                <updated>Wed, 02 Jul 2025 11:18:49 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/hRSyexQrm5mG9MV3zQY4E9-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A Qantas 787 Dreamliner pictured on the runway at John F Kennedy International Airport in New York City, USA.]]></media:description>                                                            <media:text><![CDATA[A Qantas 787 Dreamliner pictured on the runway at John F Kennedy International Airport in New York City, USA.]]></media:text>
                                <media:title type="plain"><![CDATA[A Qantas 787 Dreamliner pictured on the runway at John F Kennedy International Airport in New York City, USA.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/hRSyexQrm5mG9MV3zQY4E9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ M&S aims for full online restoration within four weeks following major cyber attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/m-and-s-aims-for-full-online-restoration-within-four-weeks-following-major-cyber-attack</link>
                                                                            <description>
                            <![CDATA[ M&S CEO Stuart Machin says the high street retailer plans to fully restore operations by August following a devastating cyber attack in April. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qT746VdLCB2QnNV476PyhM</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/aMsMu5LvrpDS6f9Gc4EPFa-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 02 Jul 2025 07:55:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Rene Millman) ]]></author>                    <dc:creator><![CDATA[ Rene Millman ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/aMsMu5LvrpDS6f9Gc4EPFa-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Pedestrians pictured walking past a Marks &amp; Spencer (M&amp;S) store front on Oxford Street, London.]]></media:description>                                                            <media:text><![CDATA[Pedestrians pictured walking past a Marks &amp; Spencer (M&amp;S) store front on Oxford Street, London.]]></media:text>
                                <media:title type="plain"><![CDATA[Pedestrians pictured walking past a Marks &amp; Spencer (M&amp;S) store front on Oxford Street, London.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/aMsMu5LvrpDS6f9Gc4EPFa-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ British IT worker jailed for revenge attack on employer that caused a “ripple effect of disruption” for colleagues and customers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/british-it-worker-jailed-for-revenge-attack-on-employer-that-caused-a-ripple-effect-of-disruption-for-colleagues-and-customers</link>
                                                                            <description>
                            <![CDATA[ West Yorkshire man Mohammed Umar Taj was suspended from his job in Huddersfield in July 2022, and began taking revenge within hours. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">KokdJ85bvAGL5Q55X3q3vK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 01 Jul 2025 09:58:48 +0000</pubDate>                                                                                                                                <updated>Tue, 01 Jul 2025 14:03:48 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:description>                                                            <media:text><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:text>
                                <media:title type="plain"><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The FBI thinks it's nailed the notorious 'IntelBroker' threat actor ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/the-fbi-thinks-its-nailed-the-notorious-intelbroker-threat-actor</link>
                                                                            <description>
                            <![CDATA[ A British man believed to be the notorious ‘IntelBroker’ hacker has been charged in the US following their arrest in France earlier this year. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">XUAddJW5o7yFfH8sPqg4sb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 30 Jun 2025 09:45:26 +0000</pubDate>                                                                                                                                <updated>Mon, 30 Jun 2025 09:45:42 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:description>                                                            <media:text><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Financial impact of cyber attacks on UK retailers laid bare in new report ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/cyber-attacks-on-uk-retailers-financial-impact</link>
                                                                            <description>
                            <![CDATA[ Analysis from the Cyber Monitoring Centre shows the recent cyber attacks on a host of UK retailers could cost up to £440 million. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MML4cJS6ZT2N37UPMwASVi</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ci8VLxJaLb7KFhVHy3RBE5-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 25 Jun 2025 09:16:42 +0000</pubDate>                                                                                                                                <updated>Wed, 25 Jun 2025 09:16:57 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ci8VLxJaLb7KFhVHy3RBE5-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Store front of M&amp;S, one of the victims of a wave of cyber attacks on UK retailers, pictured at the Westfield Stratford City Shopping Centre .]]></media:description>                                                            <media:text><![CDATA[Store front of M&amp;S, one of the victims of a wave of cyber attacks on UK retailers, pictured at the Westfield Stratford City Shopping Centre .]]></media:text>
                                <media:title type="plain"><![CDATA[Store front of M&amp;S, one of the victims of a wave of cyber attacks on UK retailers, pictured at the Westfield Stratford City Shopping Centre .]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ci8VLxJaLb7KFhVHy3RBE5-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A sneaky cyber espionage campaign is exploiting IoT devices and home office routers – here's what you need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/lapdogs-cyber-espionage-campaign-iot-home-office-routers</link>
                                                                            <description>
                            <![CDATA[ Researchers at SecurityScorecard have issued a warning about a new China-linked threat campaign, dubbed 'LapDogs', targeting IoT devices and home routers. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hnTamSnFiPKw4RfcFR3E7U</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 23 Jun 2025 09:50:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:description>                                                            <media:text><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ LockBit data dump reveals a treasure trove of intel on the notorious hacker group ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/lockbit-data-dump-reveals-a-treasure-trove-of-intel-on-the-notorious-hacker-group</link>
                                                                            <description>
                            <![CDATA[ An analysis of May's SQL database dump shows how much LockBit was really making ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">q6gHYYicEc4cCKCdXT2Hch</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Jun 2025 09:37:21 +0000</pubDate>                                                                                                                                <updated>Fri, 13 Jun 2025 09:37:34 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Disinformation security is a major concern for cyber teams – here's what your business can do ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/disinformation-security-concern-for-cyber-teams</link>
                                                                            <description>
                            <![CDATA[ Attackers can impersonate employees and fake data with increasing ease ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ubNUYZd6YC9jQk9tXr8LvF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Uk9apHytppNEVvCDTRHpAh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 09 Jun 2025 12:37:01 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keri Allan ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Uk9apHytppNEVvCDTRHpAh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A digital illustration showing a portrait of a woman overlaid with a digital boxout of an eye and a mouth and a speech bubble above, surrounded by red and green glitched shapes, to represent deepfakes and digital disinformation.]]></media:description>                                                            <media:text><![CDATA[A digital illustration showing a portrait of a woman overlaid with a digital boxout of an eye and a mouth and a speech bubble above, surrounded by red and green glitched shapes, to represent deepfakes and digital disinformation.]]></media:text>
                                <media:title type="plain"><![CDATA[A digital illustration showing a portrait of a woman overlaid with a digital boxout of an eye and a mouth and a speech bubble above, surrounded by red and green glitched shapes, to represent deepfakes and digital disinformation.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Uk9apHytppNEVvCDTRHpAh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ OpenAI is clamping down on ChatGPT accounts used to spread malware ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/openai-is-clamping-down-on-chatgpt-accounts-used-to-spread-malware</link>
                                                                            <description>
                            <![CDATA[ Tools like ChatGPT are being used by threat actors to automate and amplify campaigns ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">dvQ5V6ky8EKaaP74Xf5Upn</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/AM7ReJDhZZWMAqjKqACmJL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 09 Jun 2025 10:39:03 +0000</pubDate>                                                                                                                                <updated>Mon, 09 Jun 2025 10:39:15 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/AM7ReJDhZZWMAqjKqACmJL-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ChatGPT logo and branding pictured in white coloring against a black backdrop.]]></media:description>                                                            <media:text><![CDATA[ChatGPT logo and branding pictured in white coloring against a black backdrop.]]></media:text>
                                <media:title type="plain"><![CDATA[ChatGPT logo and branding pictured in white coloring against a black backdrop.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/AM7ReJDhZZWMAqjKqACmJL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘States don’t do hacking for fun’: NCSC expert urges businesses to follow geopolitics as defensive strategy ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/states-dont-do-hacking-for-fun-ncsc-expert-urges-businesses-to-follow-geopolitics-as-defensive-strategy</link>
                                                                            <description>
                            <![CDATA[ Paul Chichester, director of operations at the UK’s National Cyber Security Centre, urged businesses to keep closer tabs on geopolitical events to gauge potential cyber threats. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tWmWKKmQCWqZdQFyWWxsaA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/TLqJdzSrYCkAScByVUwGaF-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 05 Jun 2025 09:01:08 +0000</pubDate>                                                                                                                                <updated>Thu, 05 Jun 2025 09:01:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/TLqJdzSrYCkAScByVUwGaF-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Russian hacker concept image showing a skulls and crossbones colored like the Russian Federation flag, made up of binary code, and imposed over a digital interface.]]></media:description>                                                            <media:text><![CDATA[Russian hacker concept image showing a skulls and crossbones colored like the Russian Federation flag, made up of binary code, and imposed over a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Russian hacker concept image showing a skulls and crossbones colored like the Russian Federation flag, made up of binary code, and imposed over a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/TLqJdzSrYCkAScByVUwGaF-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘I take pleasure in thinking I can rid society of at least some of them’: A cyber vigilante is dumping information on notorious ransomware criminals – and security experts say police will be keeping close tabs ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/ransomware-conti-trickbot-leaks-gangexposed</link>
                                                                            <description>
                            <![CDATA[ An anonymous whistleblower has released large amounts of data allegedly linked to the ransomware gangs ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3sqwxUBfDAXNBC4mxqQxnZ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/hm7qyYp9PbhjVaXbk3hMkE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 03 Jun 2025 23:04:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/hm7qyYp9PbhjVaXbk3hMkE-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware criminal concept image showing hacker in a hooded top working on a laptop in a dark room.]]></media:description>                                                            <media:text><![CDATA[Ransomware criminal concept image showing hacker in a hooded top working on a laptop in a dark room.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware criminal concept image showing hacker in a hooded top working on a laptop in a dark room.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/hm7qyYp9PbhjVaXbk3hMkE-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AVCheck cyber crime service snared in police takedown  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/avcheck-cyber-crime-service-snared-in-police-takedown</link>
                                                                            <description>
                            <![CDATA[ Authorities have seized the domains of AVCheck, one of the largest counter antivirus services used by cybercriminals around the world ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">rALJbRVnbo9BswhQRfVstH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mP59D9NhKL5dmDvk5CMAzZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 02 Jun 2025 14:53:36 +0000</pubDate>                                                                                                                                <updated>Mon, 02 Jun 2025 14:53:47 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mP59D9NhKL5dmDvk5CMAzZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Neptune RAT malware concept image showing a skull and crossbones in binary code against a red colored backdrop.]]></media:description>                                                            <media:text><![CDATA[Neptune RAT malware concept image showing a skull and crossbones in binary code against a red colored backdrop.]]></media:text>
                                <media:title type="plain"><![CDATA[Neptune RAT malware concept image showing a skull and crossbones in binary code against a red colored backdrop.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mP59D9NhKL5dmDvk5CMAzZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Scattered Spider: Who are the alleged hackers behind the M&S cyber attack? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/scattered-spider-group-marks-and-spencer</link>
                                                                            <description>
                            <![CDATA[ The Scattered Spider group has been highly active in recent years ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tS38BJbwf9Vi4dH3sbA56S</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9o8wM4L4ivcaCajMFzGyyC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 02 May 2025 14:00:49 +0000</pubDate>                                                                                                                                <updated>Fri, 02 May 2025 14:59:05 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/9o8wM4L4ivcaCajMFzGyyC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Scattered Spider concept image showing digitized spider on a computer screen.]]></media:description>                                                            <media:text><![CDATA[Scattered Spider concept image showing digitized spider on a computer screen.]]></media:text>
                                <media:title type="plain"><![CDATA[Scattered Spider concept image showing digitized spider on a computer screen.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9o8wM4L4ivcaCajMFzGyyC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Multichannel attacks are becoming a serious threat for enterprises – and AI is fueling the surge ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/multichannel-attacks-increase-ai-cyber-crime</link>
                                                                            <description>
                            <![CDATA[ Organizations are seeing a steep rise in multichannel attacks fueled in part by an uptick in AI cyber crime, new research from SoSafe has found. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">xp67FSxSwhJgmZDufTyQzf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2LvDwLLQ8jfBDzQBX5WER9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 10 Mar 2025 11:47:31 +0000</pubDate>                                                                                                                                <updated>Mon, 10 Mar 2025 16:56:27 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ george.fitzmaurice@futurenet.com (George Fitzmaurice) ]]></author>                    <dc:creator><![CDATA[ George Fitzmaurice ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/2LvDwLLQ8jfBDzQBX5WER9-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[IoT security concept image showing network symbols on a blue background.]]></media:description>                                                            <media:text><![CDATA[IoT security concept image showing network symbols on a blue background.]]></media:text>
                                <media:title type="plain"><![CDATA[IoT security concept image showing network symbols on a blue background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2LvDwLLQ8jfBDzQBX5WER9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cobalt Strike abusers have been dealt a hammer blow: An "aggressive" takedown campaign by Fortra and Microsoft shuttered over 200 malicious domains – and it’s cut the misuse of the tool by 80% ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/cobalt-strike-takedown-fortra-microsoft</link>
                                                                            <description>
                            <![CDATA[ Threat actors have long used unauthorized copies of Cobalt Strike to deploy malware, identify vulnerabilities, and move laterally while evading detection ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">YJDkC2YvHeWchyfSNCitJd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ZCsZjR3vKiA3rUPRWJ84EC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 07 Mar 2025 15:00:00 +0000</pubDate>                                                                                                                                <updated>Fri, 07 Mar 2025 15:51:30 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ZCsZjR3vKiA3rUPRWJ84EC-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A hand on a keyboard in a dark room]]></media:description>                                                            <media:text><![CDATA[A hand on a keyboard in a dark room]]></media:text>
                                <media:title type="plain"><![CDATA[A hand on a keyboard in a dark room]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ZCsZjR3vKiA3rUPRWJ84EC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 'GitVenom' campaign uses dodgy GitHub repositories to spread malware ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/gitvenom-campaign-uses-dodgy-github-repositories-to-spread-malware</link>
                                                                            <description>
                            <![CDATA[ Security researchers have issued an alert over a campaign using GitHub repositories to distribute malware, with users lured in by fake projects. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">oi382VRTgebocxDcEb3xtW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/aHo3PqtnFsRx2Wi6XPjRYC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 27 Feb 2025 10:43:17 +0000</pubDate>                                                                                                                                <updated>Fri, 28 Feb 2025 14:18:27 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/aHo3PqtnFsRx2Wi6XPjRYC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[GitHub logo and branding displayed on a smartphone screen placed on top of a laptop keyboard.]]></media:description>                                                            <media:text><![CDATA[GitHub logo and branding displayed on a smartphone screen placed on top of a laptop keyboard.]]></media:text>
                                <media:title type="plain"><![CDATA[GitHub logo and branding displayed on a smartphone screen placed on top of a laptop keyboard.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/aHo3PqtnFsRx2Wi6XPjRYC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are on a huge Microsoft 365 password spraying spree – here’s what you need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/hackers-are-on-a-huge-microsoft-365-password-spraying-spree-heres-what-you-need-to-know</link>
                                                                            <description>
                            <![CDATA[ A botnet made up of 130,000 compromised devices has been conducting a huge password spraying campaign targeting Microsoft 365 accounts. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">rVSTRUKhoxcu6twp6oncx7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/cH6m7NRbNRSksBtYe4xHVH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 25 Feb 2025 11:19:46 +0000</pubDate>                                                                                                                                <updated>Fri, 28 Feb 2025 09:16:11 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/cH6m7NRbNRSksBtYe4xHVH-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft 365 logo pictured on a smartphone with Microsoft logo pictured in background.]]></media:description>                                                            <media:text><![CDATA[Microsoft 365 logo pictured on a smartphone with Microsoft logo pictured in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft 365 logo pictured on a smartphone with Microsoft logo pictured in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/cH6m7NRbNRSksBtYe4xHVH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The Zservers takedown is another big win for law enforcement ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/the-zservers-takedown-is-another-big-win-for-law-enforcement</link>
                                                                            <description>
                            <![CDATA[ LockBit has been dealt another blow by law enforcement after Dutch police took 127 of its servers offline ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">FDfF6wSLEQwRgmdc2TZGgK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/TMG8nWBAMePUV38qdnr5nj-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 19 Feb 2025 00:15:00 +0000</pubDate>                                                                                                                                <updated>Wed, 19 Feb 2025 14:41:54 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/TMG8nWBAMePUV38qdnr5nj-1280-80.jpg">
                                                            <media:credit><![CDATA[Korps Nationale Politie]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Seized servers from bulletproof hosting facility wrapped in cellphane]]></media:description>                                                            <media:text><![CDATA[Seized servers from bulletproof hosting facility wrapped in cellphane]]></media:text>
                                <media:title type="plain"><![CDATA[Seized servers from bulletproof hosting facility wrapped in cellphane]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/TMG8nWBAMePUV38qdnr5nj-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Threat actors are leaning on trusted services more than ever ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/threat-actors-are-leaning-on-trusted-services-more-than-ever</link>
                                                                            <description>
                            <![CDATA[ Cyber threats are increasingly incorporating legitimate services in their attack chain, researchers warn. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">LaSEnKpAcP9vRL88AgHzxX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 13 Feb 2025 13:17:04 +0000</pubDate>                                                                                                                                <updated>Thu, 13 Feb 2025 15:24:53 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:description>                                                            <media:text><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:text>
                                <media:title type="plain"><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Seashell Blizzard hacker group escalating attacks on critical infrastructure, Microsoft warns ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/seashell-blizzard-badpilot-hacking-campaign</link>
                                                                            <description>
                            <![CDATA[ The BadPilot threat campaign has compromised organizations operating across a raft of critical industries, including energy, telecoms, and manufacturing. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ihLNKXUj5A8Gq9pntPX6ub</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4ySRUYSWaLx6DdciidDn8T-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 13 Feb 2025 12:18:09 +0000</pubDate>                                                                                                                                <updated>Thu, 13 Feb 2025 15:21:18 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4ySRUYSWaLx6DdciidDn8T-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Global cyber attack concept image signifying nations and areas targeted by the Seashell Blizzard hacker group across Europe and North Africa.]]></media:description>                                                            <media:text><![CDATA[Global cyber attack concept image signifying nations and areas targeted by the Seashell Blizzard hacker group across Europe and North Africa.]]></media:text>
                                <media:title type="plain"><![CDATA[Global cyber attack concept image signifying nations and areas targeted by the Seashell Blizzard hacker group across Europe and North Africa.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4ySRUYSWaLx6DdciidDn8T-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Agentic AI could be a blessing and a curse for cybersecurity ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/agentic-ai-cybersecurity-risks</link>
                                                                            <description>
                            <![CDATA[ Agentic AI systems could become a key weapon in the cybercriminal arsenal as the technology matures, according to research from Malwarebytes. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">BVbgiNsXLQnaf9VEBZ4S6Q</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mKqijeStnwv8R2Gikw9VgV-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 05 Feb 2025 11:33:12 +0000</pubDate>                                                                                                                                <updated>Wed, 05 Feb 2025 14:32:45 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mKqijeStnwv8R2Gikw9VgV-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Agentic AI concept image showing a digitized human brain in purple color with interconnected data points.]]></media:description>                                                            <media:text><![CDATA[Agentic AI concept image showing a digitized human brain in purple color with interconnected data points.]]></media:text>
                                <media:title type="plain"><![CDATA[Agentic AI concept image showing a digitized human brain in purple color with interconnected data points.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mKqijeStnwv8R2Gikw9VgV-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>