<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/feeds/tag/ethical-hacking" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro in Ethical-hacking ]]></title>
                <link>https://www.itpro.com/tag/ethical-hacking</link>
        <description><![CDATA[ All the latest ethical-hacking content from the ITPro team ]]></description>
                                    <lastBuildDate>Wed, 08 Nov 2023 07:00:21 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ Why the Space Force wants white hats to attack a satellite ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/why-space-force-wants-white-hats-to-attack-a-satellite</link>
                                                                            <description>
                            <![CDATA[ Authorities hope the first-of-its-kind competition could bring benefits to the cyber sector ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">GuKbKtQCqPMgNeEnKmeNqf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/YbcC8yDvBUesBTFirmL6G4-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 08 Nov 2023 07:00:21 +0000</pubDate>                                                                                                                                <updated>Wed, 08 Nov 2023 13:34:27 +0000</updated>
                                                                                                                                            <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ James O&#039;Malley ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/YbcC8yDvBUesBTFirmL6G4-1280-80.png">
                                                            <media:credit><![CDATA[Marc DeNofio / The Aerospace Corporation]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ Moonlighter satellite, a small cube-shaped craft with solar panel wings on either side, against a black background.]]></media:description>                                                            <media:text><![CDATA[ Moonlighter satellite, a small cube-shaped craft with solar panel wings on either side, against a black background.]]></media:text>
                                <media:title type="plain"><![CDATA[ Moonlighter satellite, a small cube-shaped craft with solar panel wings on either side, against a black background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/YbcC8yDvBUesBTFirmL6G4-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ OpenAI to pay up to $20k in rewards through new bug bounty program ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/openai-to-pay-up-to-dollar20k-in-rewards-through-new-bug-bounty-program</link>
                                                                            <description>
                            <![CDATA[ The move follows a period of unrest over data security concerns ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ZzZXTsDY4Nzg33Gh3Do3kK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zwqDDCyttCAQQ9fnt5F8rX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 12 Apr 2023 12:06:44 +0000</pubDate>                                                                                                                                <updated>Thu, 13 Apr 2023 09:03:12 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zwqDDCyttCAQQ9fnt5F8rX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[lots of lime-coloured padlocks set against a green background, with one orange padlock in the middle that&#039;s unlocked]]></media:description>                                                            <media:text><![CDATA[lots of lime-coloured padlocks set against a green background, with one orange padlock in the middle that&#039;s unlocked]]></media:text>
                                <media:title type="plain"><![CDATA[lots of lime-coloured padlocks set against a green background, with one orange padlock in the middle that&#039;s unlocked]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zwqDDCyttCAQQ9fnt5F8rX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ New ‘DarkBit’ ransomware gang shuts down Technion, demands $1.7 million ransom ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/370053/new-darkbit-ransomware-gang-shuts-down-technion-demands-17-million</link>
                                                                            <description>
                            <![CDATA[ A politically charged ransom note suggests DarkBit are one of the newest hacktivist gangs to emerge in recent months ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">j1zgmuKFiMggiY8D5FVvAU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LGuL2WiAc6tibevwqn6nCa-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 13 Feb 2023 16:30:14 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LGuL2WiAc6tibevwqn6nCa-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware on a red screen]]></media:description>                                                            <media:text><![CDATA[Ransomware on a red screen]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware on a red screen]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LGuL2WiAc6tibevwqn6nCa-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Research: Luxury cars and emergency services vehicles vulnerable to remote takeover ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/vulnerability/369800/luxury-cars-emergency-vehicles-vulnerable-remote-takeover</link>
                                                                            <description>
                            <![CDATA[ A "global API issue" has been highlighted through months-long research into brands such as Ferrari and Mercedes-Benz, leaving owners open to hacking, account takeovers, and more ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">iJ6V8XdNbR2XUMBbA5ifdk</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/wfFjV7Fx7GLJ2kXQSmw5FF-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 05 Jan 2023 12:38:52 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/wfFjV7Fx7GLJ2kXQSmw5FF-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A close up of a red Ferrari sports car]]></media:description>                                                            <media:text><![CDATA[A close up of a red Ferrari sports car]]></media:text>
                                <media:title type="plain"><![CDATA[A close up of a red Ferrari sports car]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/wfFjV7Fx7GLJ2kXQSmw5FF-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Offensive Security bans use of ChatGPT in cyber security certification exams ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/technology/artificial-intelligence-ai/369785/offensive-security-bans-chatgpt-from-cyber-certification-exams</link>
                                                                            <description>
                            <![CDATA[ It becomes the second major IT organisation to ban the use of the powerful tool that's taken the industry by storm ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3RrdbjmcU5P31cMdG6ZgKb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Nkbty4iP4SETyn4Ja5xtud-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 03 Jan 2023 11:26:49 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Careers and Training]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ Zach Marzouk ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Nkbty4iP4SETyn4Ja5xtud-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Programming language as seen on a computer monitor ]]></media:description>                                                            <media:text><![CDATA[Programming language as seen on a computer monitor ]]></media:text>
                                <media:title type="plain"><![CDATA[Programming language as seen on a computer monitor ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Nkbty4iP4SETyn4Ja5xtud-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Podcast transcript: Meet the cyborg hacker ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/369133/podcast-transcript-meet-the-cyborg-hacker</link>
                                                                            <description>
                            <![CDATA[ Read the full transcript for this episode of the IT Pro Podcast ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4ekpSreZcLL2go22W64RcW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/e68dF8GWJKnWi2HERUMHr6-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 23 Sep 2022 06:30:08 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ IT Pro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/e68dF8GWJKnWi2HERUMHr6-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Podcast transcript: Meet the cyborg hacker]]></media:description>                                                            <media:text><![CDATA[Podcast transcript: Meet the cyborg hacker]]></media:text>
                                <media:title type="plain"><![CDATA[Podcast transcript: Meet the cyborg hacker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/e68dF8GWJKnWi2HERUMHr6-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The IT Pro Podcast: Meet the cyborg hacker ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/369132/the-it-pro-podcast-meet-the-cyborg-hacker</link>
                                                                            <description>
                            <![CDATA[ Resistance is futile - offensive biotech implants are already here ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sHqqiJKcvTj48dfZkrwUvF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/F9XLqHX4GgHqvgUS3jYT3C-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 23 Sep 2022 06:30:06 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ IT Pro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/F9XLqHX4GgHqvgUS3jYT3C-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The IT Pro Podcast: Meet the cyborg hacker]]></media:description>                                                            <media:text><![CDATA[The IT Pro Podcast: Meet the cyborg hacker]]></media:text>
                                <media:title type="plain"><![CDATA[The IT Pro Podcast: Meet the cyborg hacker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/F9XLqHX4GgHqvgUS3jYT3C-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ SpaceX bug bounty offers up to $25,000 per Starlink exploit ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/368818/spacex-bug-bounty-offers-up-to-25000-per-starlink-exploit</link>
                                                                            <description>
                            <![CDATA[ The spacecraft manufacturer has offered white hats immunity to exploit a wide range of Starlink systems, with a dedicated report page ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">kcZcBG9HRWB1E3RwPokuqX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7GkXcP3EpizVUKqUkMfu4b-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 16 Aug 2022 15:52:07 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/7GkXcP3EpizVUKqUkMfu4b-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Close up of the Starlink logo, a stylised black &amp;#039;X&amp;#039; with the word starlink beneath on a white background, with other such logos in the background but blurry]]></media:description>                                                            <media:text><![CDATA[Close up of the Starlink logo, a stylised black &amp;#039;X&amp;#039; with the word starlink beneath on a white background, with other such logos in the background but blurry]]></media:text>
                                <media:title type="plain"><![CDATA[Close up of the Starlink logo, a stylised black &amp;#039;X&amp;#039; with the word starlink beneath on a white background, with other such logos in the background but blurry]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7GkXcP3EpizVUKqUkMfu4b-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Nomad happy to forgive hackers if they return 90% of $190 million that was stolen ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/368746/nomad-happy-to-forgive-hackers-if-they-return-stolen-funds</link>
                                                                            <description>
                            <![CDATA[ The crypto bridge is offering 'white hat hackers' a 10% bounty following the attack earlier this week ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">uxHeQsCbRsCMLgEx7cQtNm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/xH65SKaC9StGBUq7g6tS57-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 05 Aug 2022 11:31:11 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Zach Marzouk ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/xH65SKaC9StGBUq7g6tS57-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A hacker against a red background]]></media:description>                                                            <media:text><![CDATA[A hacker against a red background]]></media:text>
                                <media:title type="plain"><![CDATA[A hacker against a red background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/xH65SKaC9StGBUq7g6tS57-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ HackerOne employee fired for using position to steal bug bounties ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/368417/hackerone-employee-fired-for-using-position-to-steal-bug-bounties</link>
                                                                            <description>
                            <![CDATA[ The threat actor was identified by their duplicate data, which they were trying to pass off as their own for financial gain ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fE1UQQXXTbS7Bn2QrxS66h</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/gkK5cyPQiHCTuPaDrkc6MU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 04 Jul 2022 11:24:12 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/gkK5cyPQiHCTuPaDrkc6MU-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A hand holding a magnifying glass reveals a red lock, unlocked among several blue locked locks]]></media:description>                                                            <media:text><![CDATA[A hand holding a magnifying glass reveals a red lock, unlocked among several blue locked locks]]></media:text>
                                <media:title type="plain"><![CDATA[A hand holding a magnifying glass reveals a red lock, unlocked among several blue locked locks]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/gkK5cyPQiHCTuPaDrkc6MU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ethical hackers handed lifeline in controversial US cyber crime review ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ethical-hacking/367753/ethical-hackers-handed-lifeline-in-controversial-us-cyber-crime</link>
                                                                            <description>
                            <![CDATA[ The DoJ's latest ruling is a boon to "good-faith security research" but some argue that white hats are still not protected ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">6vM2oAtd4Fb2pTaXDSuvKJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N22ik5y6rm5mskzYejFrF7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 20 May 2022 11:49:10 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Policy and Legislation]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N22ik5y6rm5mskzYejFrF7-1280-80.jpg">
                                                            <media:credit><![CDATA[Bigstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Graphical mockup of a piece of software being tested for vulnerabilities]]></media:description>                                                            <media:text><![CDATA[Graphical mockup of a piece of software being tested for vulnerabilities]]></media:text>
                                <media:title type="plain"><![CDATA[Graphical mockup of a piece of software being tested for vulnerabilities]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N22ik5y6rm5mskzYejFrF7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Certified ethical hacker and IT manager steals $575,000 in cryptocurrency from elderly person ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/367398/certified-ethical-hacker-and-it-manager-steals-575000-in-cryptocurrency</link>
                                                                            <description>
                            <![CDATA[ The practising IT manager stole the huge sum from an elderly person after being hired to fit a home security system ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">p1pPvVUDxf1DH5aGiewA7m</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ZzdJSZhjvG3kZFpodAqtjF-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 12 Apr 2022 11:18:33 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ZzdJSZhjvG3kZFpodAqtjF-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing]]></media:description>                                                            <media:text><![CDATA[Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing]]></media:text>
                                <media:title type="plain"><![CDATA[Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ZzdJSZhjvG3kZFpodAqtjF-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ukrainian ethical hackers targeted by Russian malware attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ethical-hacking/366727/russia-targets-ukraine-ethical-hackers-with-malware</link>
                                                                            <description>
                            <![CDATA[ Cisco Talos researchers say the IT Army of Ukraine's Telegram channel is being hit with malicious links ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hZu3PSRNu6UPZ1mJwW3NTD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/tkKB3q5gtsyADQHcoXjLSa-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 11 Mar 2022 13:38:35 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/tkKB3q5gtsyADQHcoXjLSa-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Russian hacking on a laptop mockup with code sprawling over the screen]]></media:description>                                                            <media:text><![CDATA[Russian hacking on a laptop mockup with code sprawling over the screen]]></media:text>
                                <media:title type="plain"><![CDATA[Russian hacking on a laptop mockup with code sprawling over the screen]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/tkKB3q5gtsyADQHcoXjLSa-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Anonymous hijacks Russian broadcasts with footage of Ukraine war ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/365021/anonymous-hack-russian-state-broadcasts</link>
                                                                            <description>
                            <![CDATA[ The hacking group said it managed to manipulate the broadcasts of three major Russian state-backed media organisations ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">xACXJjqJJJFdU9ZbY9kHL5</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6JWu5tPs6NR2CXDxtPqvCE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 07 Mar 2022 10:43:34 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6JWu5tPs6NR2CXDxtPqvCE-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A person wearing a Guy Fawkes mask as a symbol of the Anonymous hacking collective]]></media:description>                                                            <media:text><![CDATA[A person wearing a Guy Fawkes mask as a symbol of the Anonymous hacking collective]]></media:text>
                                <media:title type="plain"><![CDATA[A person wearing a Guy Fawkes mask as a symbol of the Anonymous hacking collective]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6JWu5tPs6NR2CXDxtPqvCE-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Vulnerability hunters are cut from a different cloth – they’re naturally inquisitive ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/363344/vulnerability-hunters-naturally-inquisitive</link>
                                                                            <description>
                            <![CDATA[ So, you want to be a hacker? We share the best advice and resources for getting started ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ipg7AFC5TuhaAStgEp9hqw</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/qU6bvC48443qckkHxmMnZK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 07 Mar 2022 08:00:07 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Davey Winder ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/qU6bvC48443qckkHxmMnZK-1280-80.jpg">
                                                            <media:credit><![CDATA[Bigstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Graphic of a hacker walking through a digital corridor]]></media:description>                                                            <media:text><![CDATA[Graphic of a hacker walking through a digital corridor]]></media:text>
                                <media:title type="plain"><![CDATA[Graphic of a hacker walking through a digital corridor]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/qU6bvC48443qckkHxmMnZK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Belarusian hacktivists target railway in bid to halt Russian military ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/362059/belarusian-hacktivists-railway-ransomware-halt-russian-military</link>
                                                                            <description>
                            <![CDATA[ The incident is thought to be one of the first times ransomware has been used in hacktivism ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">etiP2Gz2S96H1r8rtLUiU4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/xH65SKaC9StGBUq7g6tS57-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 25 Jan 2022 10:55:57 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/xH65SKaC9StGBUq7g6tS57-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A hacker against a red background]]></media:description>                                                            <media:text><![CDATA[A hacker against a red background]]></media:text>
                                <media:title type="plain"><![CDATA[A hacker against a red background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/xH65SKaC9StGBUq7g6tS57-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Poly Network offers up $500k bug bounty reward to its own hacker ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ethical-hacking/360573/poly-network-hacker-offered-500000-bug-bounty</link>
                                                                            <description>
                            <![CDATA[ The reward has been offered following the successful return of $610 million in stolen tokens ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">wKSBSXt2Hv4WMPNwEswS9e</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6V6nqMwFpfZtWAn4yd4ZT9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Aug 2021 11:51:58 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sabina Weston ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6V6nqMwFpfZtWAn4yd4ZT9-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Poly Network logo seen on a mobile phone and a computer screen]]></media:description>                                                            <media:text><![CDATA[Poly Network logo seen on a mobile phone and a computer screen]]></media:text>
                                <media:title type="plain"><![CDATA[Poly Network logo seen on a mobile phone and a computer screen]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6V6nqMwFpfZtWAn4yd4ZT9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Poly Network hacker returns $342 million of stolen assets ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/technology/cryptocurrencies/360551/poly-network-hacker-returns-342-million-of-stolen-assets</link>
                                                                            <description>
                            <![CDATA[ Hacker states that they are “not very interested in money” ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ngKCzyKVELEQezvhU2RRB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/D5SqEJvUh8pV83LKehBQSU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Aug 2021 09:47:09 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sabina Weston ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/D5SqEJvUh8pV83LKehBQSU-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Darkened image of a hacker wearing a hoodie using computing equipment]]></media:description>                                                            <media:text><![CDATA[Darkened image of a hacker wearing a hoodie using computing equipment]]></media:text>
                                <media:title type="plain"><![CDATA[Darkened image of a hacker wearing a hoodie using computing equipment]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/D5SqEJvUh8pV83LKehBQSU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Does cyber security’s public image need a makeover? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ethical-hacking/360431/does-cyber-securitys-public-image-need-a-makeover</link>
                                                                            <description>
                            <![CDATA[ A growing number of ethical hackers want the media to change the way it talks about the industry ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">oPXQnJdgz1NeDksnXHQvFU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QsFy3psCVCAnojY8jkxPdN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 30 Jul 2021 10:25:36 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ethical Hacking]]></category>
                                                                                                                    <dc:creator><![CDATA[ Charlie Metcalfe ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QsFy3psCVCAnojY8jkxPdN-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A cartoon of a hacker wearing a black hoodie, with crosses on its eyes and blue flames surrounding it]]></media:description>                                                            <media:text><![CDATA[A cartoon of a hacker wearing a black hoodie, with crosses on its eyes and blue flames surrounding it]]></media:text>
                                <media:title type="plain"><![CDATA[A cartoon of a hacker wearing a black hoodie, with crosses on its eyes and blue flames surrounding it]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QsFy3psCVCAnojY8jkxPdN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google launches new bug bounty platform ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ethical-hacking/360394/google-launches-new-bug-bounty-platform</link>
                                                                            <description>
                            <![CDATA[ Vulnerability hunters will be able to improve their skills through the newly launched Bug Hunter University ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qHzmz8RHKtVbAHk9g2n5KG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/rzbbePFwKtpa9HpTeo4kz9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 28 Jul 2021 11:25:48 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sabina Weston ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/rzbbePFwKtpa9HpTeo4kz9-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Close up Google logo with the security lock icon isolated on black background]]></media:description>                                                            <media:text><![CDATA[Close up Google logo with the security lock icon isolated on black background]]></media:text>
                                <media:title type="plain"><![CDATA[Close up Google logo with the security lock icon isolated on black background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/rzbbePFwKtpa9HpTeo4kz9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft awarded $13.6 million in bug bounties over the last 12 months ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/bugs/360167/microsoft-awarded-136-million-in-bug-bounties-over-the-last-12-months</link>
                                                                            <description>
                            <![CDATA[ Over 340 security researchers from 58 countries reported a total of 1,261 valid vulnerabilities between 2020-2021 ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">5dq9gR2Z2HngSWVZ57RdHy</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/a6UYCVj2xe9xHmoYCjcSBe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 09 Jul 2021 10:54:03 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sabina Weston ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/a6UYCVj2xe9xHmoYCjcSBe-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft sign-in page on screen]]></media:description>                                                            <media:text><![CDATA[Microsoft sign-in page on screen]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft sign-in page on screen]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/a6UYCVj2xe9xHmoYCjcSBe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ IT Pro 20/20: Does cyber security's public image need a makeover? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-security/360060/it-pro-2020-does-cyber-securitys-public-image-need-a-makeover</link>
                                                                            <description>
                            <![CDATA[ Issue 18 of IT Pro 20/20 looks at recent efforts to retire the 'hacker' stereotype, and how the threat landscape has changed over the past 20 years ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">dtiXYdEodZWsfueDgo12E6</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/h388diQyR5igVUgsxxNYqd-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 30 Jun 2021 13:46:32 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Dale Walker ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/h388diQyR5igVUgsxxNYqd-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[IT Pro 20/20 Issue 18: Does cyber security&amp;#039;s public image need a makeover?]]></media:description>                                                            <media:text><![CDATA[IT Pro 20/20 Issue 18: Does cyber security&amp;#039;s public image need a makeover?]]></media:text>
                                <media:title type="plain"><![CDATA[IT Pro 20/20 Issue 18: Does cyber security&amp;#039;s public image need a makeover?]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/h388diQyR5igVUgsxxNYqd-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The IT Pro Podcast: Why is it so hard to convict hackers? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-security/359759/the-it-pro-podcast-why-is-it-so-hard-to-convict-hackers</link>
                                                                            <description>
                            <![CDATA[ Catching cyber criminals is hard enough - but putting them behind bars is even more challenging ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">i6DnXGCT9wvGySMTib8b6f</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/yiWQ8hUL5Qf6rak8Gg8vJT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 03 Jun 2021 10:10:56 +0000</pubDate>                                                                                                                                <updated>Fri, 04 Jun 2021 06:30:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ IT Pro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/yiWQ8hUL5Qf6rak8Gg8vJT-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The IT Pro Podcast: Why is it so hard to convict hackers?]]></media:description>                                                            <media:text><![CDATA[The IT Pro Podcast: Why is it so hard to convict hackers?]]></media:text>
                                <media:title type="plain"><![CDATA[The IT Pro Podcast: Why is it so hard to convict hackers?]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/yiWQ8hUL5Qf6rak8Gg8vJT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Apple's AirTag tracker has already been hacked ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/359480/security-researcher-has-already-hacked-the-new-apple-airtag</link>
                                                                            <description>
                            <![CDATA[ An IT security researcher redirected the device’s finding feature to his own website ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">oKEc7squEjd2hzLFZXmaVM</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/st9yDTqti6UwRqBTR2jiUk-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 10 May 2021 16:45:19 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mike Brassfield ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/st9yDTqti6UwRqBTR2jiUk-1280-80.jpg">
                                                            <media:credit><![CDATA[Apple]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[White Apple AirTag with a smiling emoji on it]]></media:description>                                                            <media:text><![CDATA[White Apple AirTag with a smiling emoji on it]]></media:text>
                                <media:title type="plain"><![CDATA[White Apple AirTag with a smiling emoji on it]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/st9yDTqti6UwRqBTR2jiUk-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ethical-hacking/359430/department-of-defense-expands-vulnerability-disclosure-program-to</link>
                                                                            <description>
                            <![CDATA[ This move allows greater research and reporting of bugs to Pentagon ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">e1CVsHSw7nVHbKQAdtM8iT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dLQZ4pyPjPZAxUhBSTsYJn-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 05 May 2021 18:20:35 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Public Sector]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rene Millman ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dLQZ4pyPjPZAxUhBSTsYJn-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[depatment of defenve buiding]]></media:description>                                                            <media:text><![CDATA[depatment of defenve buiding]]></media:text>
                                <media:title type="plain"><![CDATA[depatment of defenve buiding]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dLQZ4pyPjPZAxUhBSTsYJn-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security researchers take control of a Tesla via drone ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ethical-hacking/359429/security-researchers-take-control-of-a-tesla-via-drone</link>
                                                                            <description>
                            <![CDATA[ Cyber security researchers found a way to unlock the car doors with a Wi-Fi dongle ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">q7JiLRBE8scdni2rkySK78</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/tJTvydREGqgeBHpdMdUvHn-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 05 May 2021 18:04:09 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Mike Brassfield ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/tJTvydREGqgeBHpdMdUvHn-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Tesla factory]]></media:description>                                                            <media:text><![CDATA[Tesla factory]]></media:text>
                                <media:title type="plain"><![CDATA[Tesla factory]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/tJTvydREGqgeBHpdMdUvHn-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Widely-used cyber crime forums targeted in hacking spree ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/358789/widely-used-cyber-crime-forums-targeted-in-hacking-spree</link>
                                                                            <description>
                            <![CDATA[ Security researchers say hacker-on-hacker campaigns indirectly help the good guys ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">n7rWss48EfqvgD67VMiJvU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/wDQfXhNPUxQ6TfnH5UYHo3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 05 Mar 2021 11:34:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keumars Afifi-Sabet ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/wDQfXhNPUxQ6TfnH5UYHo3-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                        <media:description><![CDATA[Shutterstock]]></media:description>                                                            <media:text><![CDATA[A person on a laptop to depict hacking]]></media:text>
                                <media:title type="plain"><![CDATA[A person on a laptop to depict hacking]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/wDQfXhNPUxQ6TfnH5UYHo3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ US launches “Hack the Army 3.0” bug bounty program  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ethical-hacking/358260/us-launches-hack-the-army-30-bug-bounty-program</link>
                                                                            <description>
                            <![CDATA[ The program is open to military and civilian hackers ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">6cggtkCY4UAupxtTQmDyJW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/sxPHuXaCER7EmPeKVDM2jU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 07 Jan 2021 16:56:44 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Praharsha Anand ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/sxPHuXaCER7EmPeKVDM2jU-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hack the Army logo on a white background]]></media:description>                                                            <media:text><![CDATA[Hack the Army logo on a white background]]></media:text>
                                <media:title type="plain"><![CDATA[Hack the Army logo on a white background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/sxPHuXaCER7EmPeKVDM2jU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ MoD launches bug bounty programme ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/358083/mod-launches-bug-bounty-programme</link>
                                                                            <description>
                            <![CDATA[ Researchers are encouraged to report any flaws they find on MoD systems, but they must not engage in social engineering or phishing attacks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">gjDn1E3uRZj8PDj9RB5hTg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2QVtGsQqwJmbv96BVLpaAJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 10 Dec 2020 12:40:55 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keumars Afifi-Sabet ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/2QVtGsQqwJmbv96BVLpaAJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Image of a cyber criminal using several computers in a dark room ]]></media:description>                                                            <media:text><![CDATA[Image of a cyber criminal using several computers in a dark room ]]></media:text>
                                <media:title type="plain"><![CDATA[Image of a cyber criminal using several computers in a dark room ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2QVtGsQqwJmbv96BVLpaAJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Apple pays ethical hackers $288k for finding 55 vulnerabilities ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ethical-hacking/357380/apple-pays-ethical-hackers-288k-for-finding-55-vulnerabilities</link>
                                                                            <description>
                            <![CDATA[ If exploited the bugs would have provided access to Apple's infrastructure and sensitive user data ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">wncpZeTzjvY2uJG4rm6uEN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/gg9aXpt82myN8kj48ADaBV-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 09 Oct 2020 10:37:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cloud Security]]></category>
                                                    <category><![CDATA[Cloud]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sabina Weston ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/gg9aXpt82myN8kj48ADaBV-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Apple logo stuck onto a glass building]]></media:description>                                                            <media:text><![CDATA[The Apple logo stuck onto a glass building]]></media:text>
                                <media:title type="plain"><![CDATA[The Apple logo stuck onto a glass building]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/gg9aXpt82myN8kj48ADaBV-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ GitLab patches API flaw that exposed private group data ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/357348/gitlab-search-api-flaw-exposed</link>
                                                                            <description>
                            <![CDATA[ GitLab private projects that were formerly public could have been accessed through search APIs ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jB4UppQkyeCjbckN8mCB53</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/vYQidYuUdSSKxGSthkR8Lj-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 07 Oct 2020 09:43:54 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Protection]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sabina Weston ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/vYQidYuUdSSKxGSthkR8Lj-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Gitlab logo visible on display screen]]></media:description>                                                            <media:text><![CDATA[Gitlab logo visible on display screen]]></media:text>
                                <media:title type="plain"><![CDATA[Gitlab logo visible on display screen]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/vYQidYuUdSSKxGSthkR8Lj-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The IT Pro Podcast: The secret life of hackers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/356480/the-it-pro-podcast-the-secret-life-of-hackers</link>
                                                                            <description>
                            <![CDATA[ What it’s really like to be a professional penetration tester ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">uRoAtgR6n8ctWXgTgnkPBY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/gM9p5jwgA7zxw4LQMUgCy3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 17 Jul 2020 06:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ IT Pro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/gM9p5jwgA7zxw4LQMUgCy3-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The IT Pro Podcast: The secret life of hackers]]></media:description>                                                            <media:text><![CDATA[The IT Pro Podcast: The secret life of hackers]]></media:text>
                                <media:title type="plain"><![CDATA[The IT Pro Podcast: The secret life of hackers]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/gM9p5jwgA7zxw4LQMUgCy3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Mobile banking apps are exposing user data to attackers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ethical-hacking/356252/poorly-secured-banking-apps-lead-to-cyber-threats</link>
                                                                            <description>
                            <![CDATA[ Positive Technologies’ study finds 13 out of 14 banking apps gave attackers access to user data ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">kH9jok7VvU47LBLRfTn8wA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/wtBXVyUScqZXJ7JKHTm3GS-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 26 Jun 2020 19:14:02 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sarah Brennan ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/wtBXVyUScqZXJ7JKHTm3GS-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Banking written in red surrounded by coding]]></media:description>                                                            <media:text><![CDATA[Banking written in red surrounded by coding]]></media:text>
                                <media:title type="plain"><![CDATA[Banking written in red surrounded by coding]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/wtBXVyUScqZXJ7JKHTm3GS-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Developer scores $100,000 bounty from Apple for exposing a critical vulnerability ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ethical-hacking/355860/developer-scores-100000-bounty-from-apple-for-exposing-a-critical</link>
                                                                            <description>
                            <![CDATA[ Apple ID bug would allow hackers to take control of a user’s account ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">juosdn4SgArnF7TDM26U6H</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/v4j367nsp96PK3hjm8MxGk-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 01 Jun 2020 18:07:58 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ David Gargaro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/v4j367nsp96PK3hjm8MxGk-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Fake ladybug on a circuit board]]></media:description>                                                            <media:text><![CDATA[Fake ladybug on a circuit board]]></media:text>
                                <media:title type="plain"><![CDATA[Fake ladybug on a circuit board]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/v4j367nsp96PK3hjm8MxGk-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ US Air Force launches $50,000 satellite hacking challenge ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ethical-hacking/355663/us-air-force-launches-online-satellite-hacking-comp</link>
                                                                            <description>
                            <![CDATA[ Hack-a-Sat challenge will kick off on 22 May and is open to ethical hackers worldwide ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">c5HXL4viAbkc1pjXVn6FHR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6VmBsDoDVnfVTCHmTtvzwn-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Fri, 15 May 2020 11:18:08 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ethical Hacking]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bobby Hellard ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/6VmBsDoDVnfVTCHmTtvzwn-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                        <media:description><![CDATA[Hack-A-Sat logo]]></media:description>                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6VmBsDoDVnfVTCHmTtvzwn-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Journalist Glenn Greenwald charged with cyber crimes in Brazil ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/354604/journalist-glenn-greenwald-charged-with-cyber-crimes-in-brazil</link>
                                                                            <description>
                            <![CDATA[ The Snowden-era investigative journalist has been accused of playing a key role in hacking into public officials' mobile phones ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">soGLKofzTLirTxmBEw9eSD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LUifViTqsXYp5Qe6njSguB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 22 Jan 2020 15:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keumars Afifi-Sabet ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LUifViTqsXYp5Qe6njSguB-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                                                                                                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LUifViTqsXYp5Qe6njSguB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ HackerOne bug bounty platform breached by its own user ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/bugs/354287/hackerone-bug-bounty-platform-breached-by-its-own-user</link>
                                                                            <description>
                            <![CDATA[ The bug bounty specialist paid the hacker responsible a cool $20,000 for their efforts ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eX5G43mZHbYhshH8tUFMi2</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/JcULBUeCjTeXK6wU56j3e4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 06 Dec 2019 08:37:54 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/JcULBUeCjTeXK6wU56j3e4-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A hacker wearing an anonymous mask with a golden halo above their head]]></media:description>                                                            <media:text><![CDATA[A hacker wearing an anonymous mask with a golden halo above their head]]></media:text>
                                <media:title type="plain"><![CDATA[A hacker wearing an anonymous mask with a golden halo above their head]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/JcULBUeCjTeXK6wU56j3e4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What is the Computer Misuse Act? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/it-legislation/28174/what-is-the-computer-misuse-act</link>
                                                                            <description>
                            <![CDATA[ If your computer systems are attacked, is the Computer Misuse Act effective enough to put those criminals behind bars? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sqK7aDSRcVRg6mxChRgXaQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/cFGftVxymDaVkoPEafBXm9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 17 Sep 2019 07:46:00 +0000</pubDate>                                                                                                                                <updated>Thu, 23 Nov 2023 10:57:29 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ jane.mccallion@futurenet.com (Jane McCallion) ]]></author>                    <dc:creator><![CDATA[ Jane McCallion ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/cFGftVxymDaVkoPEafBXm9-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A statue of Lady Justice, a blindfolded woman raising two scales in the air to represent the legal system, set against a blurred background of a laptop with blue light streaming from the monitor, to represent the Computer Misuse Act.]]></media:description>                                                            <media:text><![CDATA[A statue of Lady Justice, a blindfolded woman raising two scales in the air to represent the legal system, set against a blurred background of a laptop with blue light streaming from the monitor, to represent the Computer Misuse Act.]]></media:text>
                                <media:title type="plain"><![CDATA[A statue of Lady Justice, a blindfolded woman raising two scales in the air to represent the legal system, set against a blurred background of a laptop with blue light streaming from the monitor, to represent the Computer Misuse Act.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/cFGftVxymDaVkoPEafBXm9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ How do you become an ethical hacker? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/641470/so-you-want-to-be-an-ethical-hacker</link>
                                                                            <description>
                            <![CDATA[ We examine what certifications do you need, what jobs are available and how much you can expect to be paid ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8sfKBHrggppFm6qjTAe767</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ZzdJSZhjvG3kZFpodAqtjF-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 29 Jul 2019 12:10:00 +0000</pubDate>                                                                                                                                <updated>Fri, 29 Apr 2022 15:27:50 +0000</updated>
                                                                                                                                            <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ connor.jones@futurenet.com (Connor Jones) ]]></author>                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ZzdJSZhjvG3kZFpodAqtjF-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing]]></media:description>                                                            <media:text><![CDATA[Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing]]></media:text>
                                <media:title type="plain"><![CDATA[Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ZzdJSZhjvG3kZFpodAqtjF-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>