<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/feeds/tag/malware" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro in Malware ]]></title>
                <link>https://www.itpro.com/security/malware</link>
        <description><![CDATA[ All the latest malware content from the ITPro team ]]></description>
                                    <lastBuildDate>Wed, 01 Apr 2026 10:32:11 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ ‘The build pipeline is becoming the new frontline’: Axios npm compromise highlights growing software supply chain risks, experts warn ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/the-build-pipeline-is-becoming-the-new-frontline-axios-npm-compromise-highlights-growing-software-supply-chain-risks-experts-warn</link>
                                                                            <description>
                            <![CDATA[ Cyber criminals exploited a hijacked maintainer account to compromise one of the world's most widely used JavaScript libraries ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">FtT83GNxmPjbmsmBPsDEnS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4XZYfjMuoUwrLG8MTcaQBi-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 01 Apr 2026 10:32:11 +0000</pubDate>                                                                                                                                <updated>Wed, 01 Apr 2026 14:13:01 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4XZYfjMuoUwrLG8MTcaQBi-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity concept image showing digital data storage modules with padlock symbols in a storage environment.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity concept image showing digital data storage modules with padlock symbols in a storage environment.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity concept image showing digital data storage modules with padlock symbols in a storage environment.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4XZYfjMuoUwrLG8MTcaQBi-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 'It's destructive, not ransomware': Security experts weigh in on motivation behind Stryker cyber attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/technology/artificial-intelligence/its-destructive-not-ransomware-security-experts-weigh-in-on-motivation-behind-stryker-cyber-attack</link>
                                                                            <description>
                            <![CDATA[ The attack on medical tech company Stryker has severely impacted operations globally ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">uAEPy85heifUdKbTPUHP9Y</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/So4cFobEWd4kjqH4MbFRyA-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Mar 2026 12:37:46 +0000</pubDate>                                                                                                                                <updated>Thu, 12 Mar 2026 12:38:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/So4cFobEWd4kjqH4MbFRyA-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of medical technology company Stryker pictured on a building facade in Warsaw, Poland.]]></media:description>                                                            <media:text><![CDATA[Logo of medical technology company Stryker pictured on a building facade in Warsaw, Poland.]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of medical technology company Stryker pictured on a building facade in Warsaw, Poland.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/So4cFobEWd4kjqH4MbFRyA-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Thousands of Asus routers are being used to fuel a massive cyber crime spree ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/thousands-of-asus-routers-are-being-used-to-fuel-a-massive-cyber-crime-spree</link>
                                                                            <description>
                            <![CDATA[ Black Lotus Labs has spotted a massive botnet of Asus routers built by malware that uses a common peer networking tool ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eKJRcjhiqzpr5rwsNrbEFS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FqwdpUKc89SZqpjHUQRg63-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Mar 2026 11:10:20 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FqwdpUKc89SZqpjHUQRg63-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Earth with a global botnet showing red and blue-colored lines spreading out across the planet.]]></media:description>                                                            <media:text><![CDATA[Earth with a global botnet showing red and blue-colored lines spreading out across the planet.]]></media:text>
                                <media:title type="plain"><![CDATA[Earth with a global botnet showing red and blue-colored lines spreading out across the planet.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FqwdpUKc89SZqpjHUQRg63-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/the-rise-of-teen-hackers-makes-for-a-good-headline-but-cyber-crime-activities-peak-later-in-life</link>
                                                                            <description>
                            <![CDATA[ With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">AixB4pKPDWgHro8HrA47Jg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 11 Mar 2026 10:56:05 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ DIY hackers are turning to ‘flat-pack’ malware components to speed up attacks and cut costs ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/diy-hackers-are-turning-to-flat-pack-malware-components-to-speed-up-attacks-and-cut-costs</link>
                                                                            <description>
                            <![CDATA[ While these malware campaigns are very basic, researchers noted “they still work” ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9micgTJB6ymCrHncsBFWMm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/oo8cMGiY5DwjHYxKQ8VLsB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 03 Mar 2026 09:00:00 +0000</pubDate>                                                                                                                                <updated>Tue, 03 Mar 2026 11:24:46 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/oo8cMGiY5DwjHYxKQ8VLsB-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware vector image showing alert symbol with exclamation mark and &#039;malware&#039; written underneath imposed over a digital interface.]]></media:description>                                                            <media:text><![CDATA[Malware vector image showing alert symbol with exclamation mark and &#039;malware&#039; written underneath imposed over a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Malware vector image showing alert symbol with exclamation mark and &#039;malware&#039; written underneath imposed over a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/oo8cMGiY5DwjHYxKQ8VLsB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘They are able to move fast now’: AI is expanding attack surfaces – and hackers are looking to reap the same rewards as enterprises with the technology ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/they-are-able-to-move-fast-now-ai-is-expanding-attack-surfaces-and-hackers-are-looking-to-reap-the-same-rewards-as-enterprises-with-the-technology</link>
                                                                            <description>
                            <![CDATA[ Potent new malware strains, faster attack times, and the rise of shadow AI are causing havoc ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3pVpmH9oN7uEFGuHcNqtg4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Hv5eL6mTr2kv7Y4y2nEKmT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 16 Feb 2026 12:12:02 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Hv5eL6mTr2kv7Y4y2nEKmT-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[AI vector illustration showing digitized human brain surrounded by digital storage systems. ]]></media:description>                                                            <media:text><![CDATA[AI vector illustration showing digitized human brain surrounded by digital storage systems. ]]></media:text>
                                <media:title type="plain"><![CDATA[AI vector illustration showing digitized human brain surrounded by digital storage systems. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Hv5eL6mTr2kv7Y4y2nEKmT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google says hacker groups are using Gemini to augment attacks – and companies are even ‘stealing’ its models ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/technology/artificial-intelligence/google-says-hacker-groups-are-using-gemini-to-augment-attacks-and-companies-are-even-stealing-its-models</link>
                                                                            <description>
                            <![CDATA[ Google Threat Intelligence Group has shut down repeated attempts to misuse the Gemini model family ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qzWopoZe4zTA5NEjJaY4zK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/u2PgWCzhcwJ3sd5MyNLvqf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Feb 2026 11:40:16 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Artificial Intelligence]]></category>
                                                    <category><![CDATA[Technology]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/u2PgWCzhcwJ3sd5MyNLvqf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Google Gemini AI logo and branding picture on a smartphone screen.]]></media:description>                                                            <media:text><![CDATA[Google Gemini AI logo and branding picture on a smartphone screen.]]></media:text>
                                <media:title type="plain"><![CDATA[Google Gemini AI logo and branding picture on a smartphone screen.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/u2PgWCzhcwJ3sd5MyNLvqf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Chinese hackers are using ‘stealthy and resilient’ Brickstorm malware to target VMware servers and hide in networks for months at a time ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/chinese-hackers-are-using-stealthy-and-resilient-brickstorm-malware-to-target-vmware-servers-and-hide-in-networks-for-months-at-a-time</link>
                                                                            <description>
                            <![CDATA[ Organizations, particularly in the critical infrastructure, government services, and facilities and IT sectors, need to be wary of Brickstorm ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">NiTJpD7arCJes2BVMNENyS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pfHyFGEfihSGxXFaZ3iWkc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 08 Dec 2025 13:49:27 +0000</pubDate>                                                                                                                                <updated>Mon, 08 Dec 2025 13:50:15 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pfHyFGEfihSGxXFaZ3iWkc-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Brickstorm malware concept image showing a brick flying through shattered glass against a black backdrop.]]></media:description>                                                            <media:text><![CDATA[Brickstorm malware concept image showing a brick flying through shattered glass against a black backdrop.]]></media:text>
                                <media:title type="plain"><![CDATA[Brickstorm malware concept image showing a brick flying through shattered glass against a black backdrop.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pfHyFGEfihSGxXFaZ3iWkc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The most prominent infostealers and how businesses can protect against them ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/the-most-prominent-infostealers-and-how-businesses-can-protect-against-them</link>
                                                                            <description>
                            <![CDATA[ What are the most prominent infostealers of 2025 , how is the malware evolving, and how can you protect your business? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">UKtGb8vbbdm4bAo6Gn4XyA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7jpErjJDERMSTESBCWn9u8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 05 Dec 2025 08:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/7jpErjJDERMSTESBCWn9u8-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A stylized illustration showing icons representing malware, hackers, and stolen credentials made of felt such as a credit card, magnifying glass, fingerprint, and insect with a chip on its back.]]></media:description>                                                            <media:text><![CDATA[A stylized illustration showing icons representing malware, hackers, and stolen credentials made of felt such as a credit card, magnifying glass, fingerprint, and insect with a chip on its back.]]></media:text>
                                <media:title type="plain"><![CDATA[A stylized illustration showing icons representing malware, hackers, and stolen credentials made of felt such as a credit card, magnifying glass, fingerprint, and insect with a chip on its back.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7jpErjJDERMSTESBCWn9u8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The Scattered Lapsus$ Hunters group is targeting Zendesk customers – here’s what you need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/the-scattered-lapsus-usd-hunters-group-is-targeting-zendesk-customers-heres-what-you-need-to-know</link>
                                                                            <description>
                            <![CDATA[ The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">yA82eDy5m43beT5ptyrzhG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/KfsCD25eUDMdmZevdnb6rU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 27 Nov 2025 11:45:15 +0000</pubDate>                                                                                                                                <updated>Thu, 27 Nov 2025 11:46:02 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/KfsCD25eUDMdmZevdnb6rU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Zendesk logo and branding pictured on a smartphone screen. ]]></media:description>                                                            <media:text><![CDATA[Zendesk logo and branding pictured on a smartphone screen. ]]></media:text>
                                <media:title type="plain"><![CDATA[Zendesk logo and branding pictured on a smartphone screen. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/KfsCD25eUDMdmZevdnb6rU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Shai-Hulud malware is back with a vengeance and has hit more than 19,000 GitHub repositories so far — here's what developers need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/shai-hulud-malware-is-back-with-a-vengeance-and-hit-more-than-19-000-github-repositories-so-far-heres-what-developers-need-to-know</link>
                                                                            <description>
                            <![CDATA[ The malware has compromised more than 700 widely-used npm packages, and is spreading fast ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">REg52qhZmQHgZURnJGdGi8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/S2kXYxtTBgGXo79HoNmvZZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 25 Nov 2025 10:38:18 +0000</pubDate>                                                                                                                                <updated>Tue, 25 Nov 2025 12:55:53 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/S2kXYxtTBgGXo79HoNmvZZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Dune Shai-Hulud concept image showing man standing on rock with giant sandworm breaching out of the sand. ]]></media:description>                                                            <media:text><![CDATA[Dune Shai-Hulud concept image showing man standing on rock with giant sandworm breaching out of the sand. ]]></media:text>
                                <media:title type="plain"><![CDATA[Dune Shai-Hulud concept image showing man standing on rock with giant sandworm breaching out of the sand. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/S2kXYxtTBgGXo79HoNmvZZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The US, UK, and Australia just imposed sanctions on a Russian cyber crime group – 'we are exposing their dark networks and going after those responsible' ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/the-us-uk-and-australia-just-imposed-sanctions-on-a-russian-cyber-crime-group-we-are-exposing-their-dark-networks-and-going-after-those-responsible</link>
                                                                            <description>
                            <![CDATA[ Media Land offers 'bulletproof' hosting services used for ransomware and DDoS attacks around the world ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jbcE8oNisiHJvQRxooNzLU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Aqeo3GHF5pnDS754K9ahY5-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 20 Nov 2025 10:55:00 +0000</pubDate>                                                                                                                                <updated>Fri, 21 Nov 2025 08:31:54 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Aqeo3GHF5pnDS754K9ahY5-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Russian cyber crime concept image showing Russian national flag with padlock symbol in background with smashed glass in foreground.]]></media:description>                                                            <media:text><![CDATA[Russian cyber crime concept image showing Russian national flag with padlock symbol in background with smashed glass in foreground.]]></media:text>
                                <media:title type="plain"><![CDATA[Russian cyber crime concept image showing Russian national flag with padlock symbol in background with smashed glass in foreground.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Aqeo3GHF5pnDS754K9ahY5-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Europol hails triple takedown with Rhadamanthys, VenomRAT, and Elysium sting operations ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/europol-hails-triple-takedown-with-rhadamanthys-venomrat-and-elysium-sting-operations</link>
                                                                            <description>
                            <![CDATA[ The Rhadamanthys infostealer operation is one of the latest victims of Europol's Operation Endgame, with more than a thousand servers taken down ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">84rf84B6USKP3XsAAbyTHC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/hNt2JaLuS3Ribvoh5XfgT8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 17 Nov 2025 12:08:54 +0000</pubDate>                                                                                                                                <updated>Mon, 17 Nov 2025 12:09:39 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/hNt2JaLuS3Ribvoh5XfgT8-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Image of a Europol sign affixed to its Amsterdam headquarters]]></media:description>                                                            <media:text><![CDATA[Image of a Europol sign affixed to its Amsterdam headquarters]]></media:text>
                                <media:title type="plain"><![CDATA[Image of a Europol sign affixed to its Amsterdam headquarters]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/hNt2JaLuS3Ribvoh5XfgT8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are using these malicious npm packages to target developers on Windows, macOS, and Linux systems – here’s how to stay safe ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/hackers-are-using-these-malicious-npm-packages-to-target-developers-windows-macos-and-linux-systems-heres-how-to-stay-safe</link>
                                                                            <description>
                            <![CDATA[ Security experts have issued a warning to developers after ten malicious npm packages were found to deliver infostealer malware across Windows, Linux, and macOS systems. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">QPudZTpdftQoXU8Cq9PzxC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RZkY82LLq5627rxcbWkaVb-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 30 Oct 2025 12:20:13 +0000</pubDate>                                                                                                                                <updated>Thu, 30 Oct 2025 12:55:04 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RZkY82LLq5627rxcbWkaVb-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware concept image showing malicious npm packages contained in a red highlighted file surrounded by legitimate folders.]]></media:description>                                                            <media:text><![CDATA[Malware concept image showing malicious npm packages contained in a red highlighted file surrounded by legitimate folders.]]></media:text>
                                <media:title type="plain"><![CDATA[Malware concept image showing malicious npm packages contained in a red highlighted file surrounded by legitimate folders.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RZkY82LLq5627rxcbWkaVb-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cisco ASA customers urged to take immediate action as NCSC, CISA issue critical vulnerability warnings ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/cisco-asa-customers-urged-to-take-immediate-action-as-ncsc-cisa-issue-critical-vulnerability-warnings</link>
                                                                            <description>
                            <![CDATA[ Cisco customers are urged to upgrade and secure systems immediately ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">X3RPSiT74dQsebZ52iKP2E</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/tS8HTW7yrXNbExyfrJHDUN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 26 Sep 2025 10:29:11 +0000</pubDate>                                                                                                                                <updated>Fri, 26 Sep 2025 10:29:44 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/tS8HTW7yrXNbExyfrJHDUN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of Cisco, developer of the Cisco ASA (Adaptive Security Appliance) device range, pictured at Mobile World Congress Barcelona 2023.]]></media:description>                                                            <media:text><![CDATA[Logo of Cisco, developer of the Cisco ASA (Adaptive Security Appliance) device range, pictured at Mobile World Congress Barcelona 2023.]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of Cisco, developer of the Cisco ASA (Adaptive Security Appliance) device range, pictured at Mobile World Congress Barcelona 2023.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/tS8HTW7yrXNbExyfrJHDUN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are disguising malware as ChatGPT, Microsoft Office, and Google Drive to dupe workers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/hackers-are-disguising-malware-as-chatgpt-microsoft-office-and-google-drive-to-dupe-workers</link>
                                                                            <description>
                            <![CDATA[ Beware of downloading applications like ChatGPT, Microsoft Office applications, and Google Drive through search engines ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">SnZmFBfqnNGgurYmgttKGn</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/kj6pPXLf6a7yeTiX6Vk8zE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 23 Sep 2025 10:24:39 +0000</pubDate>                                                                                                                                <updated>Tue, 23 Sep 2025 10:25:13 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/kj6pPXLf6a7yeTiX6Vk8zE-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware concept image showing flashing alert symbol with flashing red background and network symbols. ]]></media:description>                                                            <media:text><![CDATA[Malware concept image showing flashing alert symbol with flashing red background and network symbols. ]]></media:text>
                                <media:title type="plain"><![CDATA[Malware concept image showing flashing alert symbol with flashing red background and network symbols. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/kj6pPXLf6a7yeTiX6Vk8zE-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cybersecurity experts issue urgent warning amid surge in Stealerium malware attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/cybersecurity-experts-issue-urgent-warning-amid-surge-in-stealerium-malware-attacks</link>
                                                                            <description>
                            <![CDATA[ Proofpoint said Stealerium has flown under the radar for some time now, but researchers have observed a huge spike in activity between May and August this year. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fEHYZkKsjgE2FJgMh8FRnS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/kwyhJmg3ouGdLEZpYEUPxb-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 04 Sep 2025 10:00:00 +0000</pubDate>                                                                                                                                <updated>Thu, 04 Sep 2025 11:55:47 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/kwyhJmg3ouGdLEZpYEUPxb-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware concept image showing a laptop with skull and crossbones on screen, symbolizing a cyber attack.]]></media:description>                                                            <media:text><![CDATA[Malware concept image showing a laptop with skull and crossbones on screen, symbolizing a cyber attack.]]></media:text>
                                <media:title type="plain"><![CDATA[Malware concept image showing a laptop with skull and crossbones on screen, symbolizing a cyber attack.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/kwyhJmg3ouGdLEZpYEUPxb-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are using AI to dissect threat intelligence reports and ‘vibe code’ malware ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hackers-are-using-ai-to-dissect-threat-intelligence-reports-and-vibe-code-malware</link>
                                                                            <description>
                            <![CDATA[ TrendMicro has called for caution on how much detail is  disclosed in security advisories ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">pvKTtDch3DykNsjC8jrx2S</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mXAs4UMae4KH6AzSXeDwbe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 04 Sep 2025 07:20:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mXAs4UMae4KH6AzSXeDwbe-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Young female hacker wearing a hooded sweatshirt working on a desktop computer in a dimly lit room with glowing lights reflecting on back of computer monitor.]]></media:description>                                                            <media:text><![CDATA[Young female hacker wearing a hooded sweatshirt working on a desktop computer in a dimly lit room with glowing lights reflecting on back of computer monitor.]]></media:text>
                                <media:title type="plain"><![CDATA[Young female hacker wearing a hooded sweatshirt working on a desktop computer in a dimly lit room with glowing lights reflecting on back of computer monitor.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mXAs4UMae4KH6AzSXeDwbe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft quietly launched an AI agent that can detect and reverse engineer malware ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/microsoft-quietly-launched-an-ai-agent-that-can-reverse-engineer-and-detect-malware</link>
                                                                            <description>
                            <![CDATA[ Researchers say the tool is already achieving the “gold standard” in malware classification ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VtR898d4aarv57XPHrzE4B</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/eA94AYk6DLNFxKRQtGuKoT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 22 Aug 2025 11:52:08 +0000</pubDate>                                                                                                                                <updated>Fri, 22 Aug 2025 11:54:38 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/eA94AYk6DLNFxKRQtGuKoT-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[AI concept image showing digitized human eye monitoring digital interfaces and software.]]></media:description>                                                            <media:text><![CDATA[AI concept image showing digitized human eye monitoring digital interfaces and software.]]></media:text>
                                <media:title type="plain"><![CDATA[AI concept image showing digitized human eye monitoring digital interfaces and software.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/eA94AYk6DLNFxKRQtGuKoT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Malicious URLs overtake email attachments as the biggest malware threat ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/malicious-urls-overtake-email-attachments-as-the-biggest-malware-threat</link>
                                                                            <description>
                            <![CDATA[ With malware threats surging, research from Proofpoint highlights the increasing use of off-the-shelf 'phish kits' like CoGUI and Darcula ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MnqNyLFMRRCSCpH4xotVDV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 18 Aug 2025 10:11:40 +0000</pubDate>                                                                                                                                <updated>Mon, 18 Aug 2025 10:12:06 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:description>                                                            <media:text><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:text>
                                <media:title type="plain"><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Warning issued as new Pakistan-based malware group hits millions globally ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/warning-issued-as-new-pakistan-based-malware-group-hits-millions-globally</link>
                                                                            <description>
                            <![CDATA[ Tempting people in with offers of pirated software, the network installs commodity infostealers, according to CloudSEK ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">R8wUYjv2NQWMDuhdKvRn5n</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/wtsGxk4n6oHAkbWZ7YpcKF-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 15 Aug 2025 11:59:20 +0000</pubDate>                                                                                                                                <updated>Fri, 15 Aug 2025 11:59:39 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/wtsGxk4n6oHAkbWZ7YpcKF-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware concept image showing a shield with a red-colored, locked padlock place on top.]]></media:description>                                                            <media:text><![CDATA[Malware concept image showing a shield with a red-colored, locked padlock place on top.]]></media:text>
                                <media:title type="plain"><![CDATA[Malware concept image showing a shield with a red-colored, locked padlock place on top.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/wtsGxk4n6oHAkbWZ7YpcKF-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Malware as a service explained: What it is and why businesses should take note ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/malware-as-a-service-explained-what-it-is-and-why-businesses-should-take-note</link>
                                                                            <description>
                            <![CDATA[ What is malware as a service (MaaS), why is it so popular with adversaries, and what can businesses do to protect themselves from this growing threat? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mUwH4wnNwCz9yVPEoR73Kn</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9JMkhTZBajGwt8HZPT7F7j-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 08 Jul 2025 11:41:51 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/9JMkhTZBajGwt8HZPT7F7j-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A stylized CGI image showing a bacteria-shaped malware with three red lights resembling traffic lights, against a dark backrgound with green, yellow, and red lights.]]></media:description>                                                            <media:text><![CDATA[A stylized CGI image showing a bacteria-shaped malware with three red lights resembling traffic lights, against a dark backrgound with green, yellow, and red lights.]]></media:text>
                                <media:title type="plain"><![CDATA[A stylized CGI image showing a bacteria-shaped malware with three red lights resembling traffic lights, against a dark backrgound with green, yellow, and red lights.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9JMkhTZBajGwt8HZPT7F7j-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Developers face a torrent of malware threats as malicious open source packages surge 188% ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/developers-face-a-torrent-of-malware-threats-as-malicious-open-source-packages-surge-188-percent</link>
                                                                            <description>
                            <![CDATA[ Researchers have identified more than 16,000 malicious open source packages across popular ecosystems ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jAgGygn4ZH59PBSiZHmgQ9</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mP59D9NhKL5dmDvk5CMAzZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 08 Jul 2025 11:17:33 +0000</pubDate>                                                                                                                                <updated>Tue, 08 Jul 2025 11:17:52 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mP59D9NhKL5dmDvk5CMAzZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Neptune RAT malware concept image showing a skull and crossbones in binary code against a red colored backdrop.]]></media:description>                                                            <media:text><![CDATA[Neptune RAT malware concept image showing a skull and crossbones in binary code against a red colored backdrop.]]></media:text>
                                <media:title type="plain"><![CDATA[Neptune RAT malware concept image showing a skull and crossbones in binary code against a red colored backdrop.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mP59D9NhKL5dmDvk5CMAzZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ OpenAI is clamping down on ChatGPT accounts used to spread malware ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/openai-is-clamping-down-on-chatgpt-accounts-used-to-spread-malware</link>
                                                                            <description>
                            <![CDATA[ Tools like ChatGPT are being used by threat actors to automate and amplify campaigns ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">dvQ5V6ky8EKaaP74Xf5Upn</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/AM7ReJDhZZWMAqjKqACmJL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 09 Jun 2025 10:39:03 +0000</pubDate>                                                                                                                                <updated>Mon, 09 Jun 2025 10:39:15 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/AM7ReJDhZZWMAqjKqACmJL-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ChatGPT logo and branding pictured in white coloring against a black backdrop.]]></media:description>                                                            <media:text><![CDATA[ChatGPT logo and branding pictured in white coloring against a black backdrop.]]></media:text>
                                <media:title type="plain"><![CDATA[ChatGPT logo and branding pictured in white coloring against a black backdrop.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/AM7ReJDhZZWMAqjKqACmJL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ It's been a bad week for ransomware operators ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/its-been-a-bad-week-for-ransomware-operators</link>
                                                                            <description>
                            <![CDATA[ A host of ransomware strains have been neutralized, servers seized, and key players indicted ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MdJgGcGovV2xMcJEhrSkNc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/bBfHCREVCzyehuRCbKWheD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 23 May 2025 10:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/bBfHCREVCzyehuRCbKWheD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing digitized padlock pictured on a laptop screen on red background]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing digitized padlock pictured on a laptop screen on red background]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing digitized padlock pictured on a laptop screen on red background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/bBfHCREVCzyehuRCbKWheD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What is polymorphic malware? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/what-is-polymorphic-malware</link>
                                                                            <description>
                            <![CDATA[ Polymorphic malware constantly changes its code to avoid detection, making it a top cybersecurity threat that demands advanced, behavior-based defenses ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">EsNfyxw6wvaK6zMfnTeDHD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/L9ELEs4vTK7uviL6eLinFC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 29 Apr 2025 19:16:01 +0000</pubDate>                                                                                                                                <updated>Wed, 30 Apr 2025 11:38:53 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ David Howell ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/L9ELEs4vTK7uviL6eLinFC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An abstract image showing overlapping bue, purple, red, orange, and yellow fibres representing polymorphic malware.]]></media:description>                                                            <media:text><![CDATA[An abstract image showing overlapping bue, purple, red, orange, and yellow fibres representing polymorphic malware.]]></media:text>
                                <media:title type="plain"><![CDATA[An abstract image showing overlapping bue, purple, red, orange, and yellow fibres representing polymorphic malware.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/L9ELEs4vTK7uviL6eLinFC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are using Zoom’s remote control feature to infect devices with malware ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hackers-are-using-zooms-remote-control-feature-to-infect-devices-with-malware</link>
                                                                            <description>
                            <![CDATA[ Security experts have issued an alert over a new social engineering campaign using Zoom’s remote control features to take over victim devices. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">m5BG2PenTC4nHGhF3tsKeH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 24 Apr 2025 09:07:03 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:description>                                                            <media:text><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:text>
                                <media:title type="plain"><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are duping developers with malware-laden coding challenges ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hackers-are-duping-developers-with-malware-laden-coding-challenges</link>
                                                                            <description>
                            <![CDATA[ A North Korean state-sponsored group has been targeting crypto developers through fake coding challenges given as part of the recruitment process. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">wpDxx4XidWpG6V8wQi3DyE</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ZCsZjR3vKiA3rUPRWJ84EC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 16 Apr 2025 09:51:01 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ZCsZjR3vKiA3rUPRWJ84EC-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A hand on a keyboard in a dark room]]></media:description>                                                            <media:text><![CDATA[A hand on a keyboard in a dark room]]></media:text>
                                <media:title type="plain"><![CDATA[A hand on a keyboard in a dark room]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ZCsZjR3vKiA3rUPRWJ84EC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/phishing-kits-cyber-crime-dark-web</link>
                                                                            <description>
                            <![CDATA[ Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qsveyM9EvfU5jiXfZRPQk8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 11 Apr 2025 11:58:06 +0000</pubDate>                                                                                                                                <updated>Fri, 11 Apr 2025 12:03:14 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:description>                                                            <media:text><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:text>
                                <media:title type="plain"><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Seized database helps Europol snare botnet customers in ‘Operation Endgame’ follow-up sting ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/europol-operation-endgame-botnet-follow-up-arrests</link>
                                                                            <description>
                            <![CDATA[ Europol has detained several people believed to be involved in a botnet operation as part of a follow-up to a major takedown last year. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vsdWMViFBLwKPaWxpsCreJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/X8SLtm2YmMKNBeG8ZeCDXf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 10 Apr 2025 12:02:51 +0000</pubDate>                                                                                                                                <updated>Thu, 10 Apr 2025 18:37:55 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/X8SLtm2YmMKNBeG8ZeCDXf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Europol logo and badge pictured on the exterior of the Europol headquarters in The Hague, Netherlands.]]></media:description>                                                            <media:text><![CDATA[Europol logo and badge pictured on the exterior of the Europol headquarters in The Hague, Netherlands.]]></media:text>
                                <media:title type="plain"><![CDATA[Europol logo and badge pictured on the exterior of the Europol headquarters in The Hague, Netherlands.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/X8SLtm2YmMKNBeG8ZeCDXf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ This potent malware variant can hijack your Windows PC, steal passwords, and more: Neptune RAT is spreading on GitHub, Telegram, and even YouTube – and experts warn 'anyone could use it to launch attacks'  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/neptune-rat-malware-growth</link>
                                                                            <description>
                            <![CDATA[ Neptune RAT can hijack Windows PCs and steal passwords – and it's spreading fast ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">PizbTrVZ9Uhbkvh2u8RVqC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mP59D9NhKL5dmDvk5CMAzZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 09 Apr 2025 14:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mP59D9NhKL5dmDvk5CMAzZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Neptune RAT malware concept image showing a skull and crossbones in binary code against a red colored backdrop.]]></media:description>                                                            <media:text><![CDATA[Neptune RAT malware concept image showing a skull and crossbones in binary code against a red colored backdrop.]]></media:text>
                                <media:title type="plain"><![CDATA[Neptune RAT malware concept image showing a skull and crossbones in binary code against a red colored backdrop.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mP59D9NhKL5dmDvk5CMAzZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Warning issued over ‘fast flux’ techniques used to obscure malicious signals on compromised networks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/warning-issued-over-fast-flux-techniques-used-to-obscure-malicious-signals-on-compromised-networks</link>
                                                                            <description>
                            <![CDATA[ Cybersecurity agencies have issued a stark message that too little is being done to sniff out malware hiding in corporate networks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">u8XbEY7Mt6secUMHHeuVKT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LBK4xgJuLRTpzeH9RiQXvY-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 04 Apr 2025 10:57:45 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LBK4xgJuLRTpzeH9RiQXvY-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Internet security, virus, big data hacking and malware concept with blurred blue binary code in form of skull symbol on dark background.]]></media:description>                                                            <media:text><![CDATA[Internet security, virus, big data hacking and malware concept with blurred blue binary code in form of skull symbol on dark background.]]></media:text>
                                <media:title type="plain"><![CDATA[Internet security, virus, big data hacking and malware concept with blurred blue binary code in form of skull symbol on dark background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LBK4xgJuLRTpzeH9RiQXvY-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Infostealer malware: What’s the threat to businesses? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/infostealer-malware-threat-to-businesses</link>
                                                                            <description>
                            <![CDATA[ To counter the rising threat of infostealer malware,  security teams must be vigilant and practice rigorous patching ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">W4VfSWQZrJEL7sCgCz5kJ8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Gk766rgmc5xqmYdCEvHAJf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 31 Mar 2025 10:55:08 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Gk766rgmc5xqmYdCEvHAJf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A top-down illustration showing red, ghostly hands emanating from a monitor and typing on a computer keyboard to represent infostealer malware. Along the red hands and forearms of the implied hacker, binary is shown to represent stolen data.]]></media:description>                                                            <media:text><![CDATA[A top-down illustration showing red, ghostly hands emanating from a monitor and typing on a computer keyboard to represent infostealer malware. Along the red hands and forearms of the implied hacker, binary is shown to represent stolen data.]]></media:text>
                                <media:title type="plain"><![CDATA[A top-down illustration showing red, ghostly hands emanating from a monitor and typing on a computer keyboard to represent infostealer malware. Along the red hands and forearms of the implied hacker, binary is shown to represent stolen data.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Gk766rgmc5xqmYdCEvHAJf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Fake file converter tools are on the rise – here’s what you need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/fake-file-converter-tools-are-on-the-rise-heres-what-you-need-to-know</link>
                                                                            <description>
                            <![CDATA[ The FBI has issued an alert over the rise of fake file converter tools available online after observing a spate of scams and ransomware attacks. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VVekdSkGWA2QGjxQxot4DP</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/qG3459Gnf43CVyu33sP7si-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 25 Mar 2025 11:01:24 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/qG3459Gnf43CVyu33sP7si-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware Detected Warning Screen with abstract binary code 3d digital concept]]></media:description>                                                            <media:text><![CDATA[Malware Detected Warning Screen with abstract binary code 3d digital concept]]></media:text>
                                <media:title type="plain"><![CDATA[Malware Detected Warning Screen with abstract binary code 3d digital concept]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/qG3459Gnf43CVyu33sP7si-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Forget MFA fatigue, attackers are exploiting ‘click tolerance’ to trick users into infecting themselves with malware ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/forget-mfa-fatigue-attackers-are-exploiting-click-tolerance-to-trick-users-into-infecting-themselves-with-malware</link>
                                                                            <description>
                            <![CDATA[ Threat actors are exploiting users’ familiarity with verification tests to trick them into loading malware onto their systems, new research has warned. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">yweBc4aY8D9tgu72WurDee</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 20 Mar 2025 09:16:19 +0000</pubDate>                                                                                                                                <updated>Thu, 20 Mar 2025 12:04:45 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:description>                                                            <media:text><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:text>
                                <media:title type="plain"><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A ‘significant increase’ in infostealer malware attacks left 3.9 billion credentials exposed to cyber criminals last year – and experts worry this is a ticking time bomb for enterprises ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/infostealer-malware-exposed-credentials</link>
                                                                            <description>
                            <![CDATA[ The threat of infostealer malware is on the rise, with 4.3 million machines infected last year alone ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">6GPdt3tuUtsBDsnhJ6kGTM</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/gr35Nym2DPm2qLtu2CHabe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 11 Mar 2025 08:31:42 +0000</pubDate>                                                                                                                                <updated>Tue, 11 Mar 2025 16:21:46 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/gr35Nym2DPm2qLtu2CHabe-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[angled view of a dialogue box with a purple Malware icon surrounded by other neon blue dialogue boxes with pink backlight]]></media:description>                                                            <media:text><![CDATA[angled view of a dialogue box with a purple Malware icon surrounded by other neon blue dialogue boxes with pink backlight]]></media:text>
                                <media:title type="plain"><![CDATA[angled view of a dialogue box with a purple Malware icon surrounded by other neon blue dialogue boxes with pink backlight]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/gr35Nym2DPm2qLtu2CHabe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Why ‘malware as a service’ is becoming a serious problem ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/why-malware-as-a-service-is-becoming-a-serious-problem</link>
                                                                            <description>
                            <![CDATA[ Researchers have issued a warning over the rise of 'malware as a service' platforms amid a surge in attacks over the last year. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">88BZdeNJiYUjw3wdr39wYe</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/C5CVHQe64yFiVrMZmpFsbQ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 20 Feb 2025 13:00:13 +0000</pubDate>                                                                                                                                <updated>Fri, 21 Feb 2025 12:52:13 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/C5CVHQe64yFiVrMZmpFsbQ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Close up of yellow networking cables going to a circuitboard]]></media:description>                                                            <media:text><![CDATA[Close up of yellow networking cables going to a circuitboard]]></media:text>
                                <media:title type="plain"><![CDATA[Close up of yellow networking cables going to a circuitboard]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/C5CVHQe64yFiVrMZmpFsbQ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ There’s a new ransomware player on the scene: the ‘BlackLock’ group has become one of the most prolific operators in the cyber crime industry – and researchers warn it’s only going to get worse for potential victims ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/blacklock-ransomware-group-reliaquest</link>
                                                                            <description>
                            <![CDATA[ Security experts have warned the BlackLock group could become the most active ransomware operator in 2025 ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">DuUe3wJfL47GoEiaDQbEyA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dKikTPpzL92Y4jzf78G8aM-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 18 Feb 2025 13:00:00 +0000</pubDate>                                                                                                                                <updated>Fri, 28 Feb 2025 14:14:46 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dKikTPpzL92Y4jzf78G8aM-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Black padlock sitting on laptop keyboard with red background, representing the BlackLock ransomware group.]]></media:description>                                                            <media:text><![CDATA[Black padlock sitting on laptop keyboard with red background, representing the BlackLock ransomware group.]]></media:text>
                                <media:title type="plain"><![CDATA[Black padlock sitting on laptop keyboard with red background, representing the BlackLock ransomware group.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dKikTPpzL92Y4jzf78G8aM-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are using a new AI chatbot to wage cyber attacks: GhostGPT lets users write malicious code, create malware, and curate phishing emails – and it costs just $50 to use ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/hackers-are-using-a-new-ai-chatbot-to-wage-cyber-attacks-ghostgpt-lets-users-write-malicious-code-create-malware-and-curate-phishing-emails-and-it-costs-just-usd50-to-use</link>
                                                                            <description>
                            <![CDATA[ Researchers at Abnormal Security have warned about the rise of GhostGPT, a new chatbot used by cyber criminals to create malicious code and malware. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">CeXMuWh83zuzDaibbydcmB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RpYYNVNkkquBAGU6u8BeaY-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 28 Jan 2025 13:42:53 +0000</pubDate>                                                                                                                                <updated>Wed, 29 Jan 2025 14:37:58 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RpYYNVNkkquBAGU6u8BeaY-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[GhostGPT concept image showing AI circuit board with interconnected data points.]]></media:description>                                                            <media:text><![CDATA[GhostGPT concept image showing AI circuit board with interconnected data points.]]></media:text>
                                <media:title type="plain"><![CDATA[GhostGPT concept image showing AI circuit board with interconnected data points.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RpYYNVNkkquBAGU6u8BeaY-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ US authorities just purged malware from thousands of devices across the world ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/us-authorities-just-purged-malware-from-thousands-of-devices-across-the-world</link>
                                                                            <description>
                            <![CDATA[ After taking control of the PlugX malware’s command-and-control server, the coalition were able to trigger a self-delete mechanism to remove the malicious program ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">QHGyXTBxdqZ4jhtDVALjp9</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N9ygzncFbwS3sNjicve3JK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 16 Jan 2025 11:23:55 +0000</pubDate>                                                                                                                                <updated>Thu, 16 Jan 2025 17:09:09 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N9ygzncFbwS3sNjicve3JK-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware bug symbol in red floating abouve digital circuitry concept design]]></media:description>                                                            <media:text><![CDATA[Malware bug symbol in red floating abouve digital circuitry concept design]]></media:text>
                                <media:title type="plain"><![CDATA[Malware bug symbol in red floating abouve digital circuitry concept design]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N9ygzncFbwS3sNjicve3JK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Open source malware surged by 156% in 2024 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/open-source-malware-surged-by-156-percent-in-2024</link>
                                                                            <description>
                            <![CDATA[ Hackers are taking advantage of lax verification and surging demand to distribute and scale malware in record time ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Pxw3S5fvo9zuN4rU6Htq8i</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/qG3459Gnf43CVyu33sP7si-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 11 Dec 2024 13:48:09 +0000</pubDate>                                                                                                                                <updated>Thu, 12 Dec 2024 11:15:28 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/qG3459Gnf43CVyu33sP7si-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware Detected Warning Screen with abstract binary code 3d digital concept]]></media:description>                                                            <media:text><![CDATA[Malware Detected Warning Screen with abstract binary code 3d digital concept]]></media:text>
                                <media:title type="plain"><![CDATA[Malware Detected Warning Screen with abstract binary code 3d digital concept]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/qG3459Gnf43CVyu33sP7si-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Two notorious infostealer malware operations were just knocked offline ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/two-notorious-infostealer-malware-operations-were-just-knocked-offline</link>
                                                                            <description>
                            <![CDATA[ Infrastructure linked to two major infostealer malware strains has been seized in a joint law enforcement operation ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">n7QDgqzmFDzEC4jv2EGMeN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FRRDLEFjuVCi2yG5QJMqoU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 31 Oct 2024 13:16:33 +0000</pubDate>                                                                                                                                <updated>Thu, 31 Oct 2024 14:49:13 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FRRDLEFjuVCi2yG5QJMqoU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Blue and gold mockup of motherboard with lock denoting malware and security]]></media:description>                                                            <media:text><![CDATA[Blue and gold mockup of motherboard with lock denoting malware and security]]></media:text>
                                <media:title type="plain"><![CDATA[Blue and gold mockup of motherboard with lock denoting malware and security]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FRRDLEFjuVCi2yG5QJMqoU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ New Loader Masquerades as Antivirus to Deliver SSLoad ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/new-loader-masquerades-as-antivirus-to-deliver-ssload</link>
                                                                            <description>
                            <![CDATA[ A new malware loader, PhantomLoader, disguises itself as an antivirus software module to deliver the evasive SSLoad malware, bypassing traditional security measures. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">GSDXb59TRKJu2RvuMgrTtJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4fzAJ927NMxsZ73HJqaLQ8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 16 Oct 2024 15:38:39 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ dale.walker@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4fzAJ927NMxsZ73HJqaLQ8-1280-80.jpg">
                                                            <media:credit><![CDATA[ANYRUN-FZCO]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An image of a robotic head with a digital aperture overlaid and a download icon to the left. The entire image is in red and black.]]></media:description>                                                            <media:text><![CDATA[An image of a robotic head with a digital aperture overlaid and a download icon to the left. The entire image is in red and black.]]></media:text>
                                <media:title type="plain"><![CDATA[An image of a robotic head with a digital aperture overlaid and a download icon to the left. The entire image is in red and black.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4fzAJ927NMxsZ73HJqaLQ8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are using a ChromeLoader exploit to set up fake companies and malware-ridden websites ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/hackers-are-using-a-chromeloader-exploit-to-set-up-fake-companies-and-malware-ridden-websites</link>
                                                                            <description>
                            <![CDATA[ Code-signing and malvertising are being used to guide victims to well-designed websites that offer seemingly legitimate tools like PDF readers and converters ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Adv8HQiHbXzDP5mmLieuvQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/DJW3UY5VBy5paFVbKYYiLD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 27 Sep 2024 10:14:47 +0000</pubDate>                                                                                                                                <updated>Fri, 27 Sep 2024 11:12:33 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Bobby Hellard) ]]></author>                    <dc:creator><![CDATA[ Bobby Hellard ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/DJW3UY5VBy5paFVbKYYiLD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A hand over a keyboard]]></media:description>                                                            <media:text><![CDATA[A hand over a keyboard]]></media:text>
                                <media:title type="plain"><![CDATA[A hand over a keyboard]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/DJW3UY5VBy5paFVbKYYiLD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Fake invoice scams are still a major threat to enterprises — and they’re only going to get stealthier ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/fake-invoice-scams-are-still-a-major-threat-to-enterprises-and-theyre-only-going-to-get-stealthier</link>
                                                                            <description>
                            <![CDATA[ Fake invoice scams are not a new trend, research shows, but hackers are refining these attacks to make sure they stay an effective entry method ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hEuPX2M4Dy2AvbiDSAy8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/3PKCd5DJbPpzM2M4nnCTsN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 17 May 2024 11:20:43 +0000</pubDate>                                                                                                                                <updated>Tue, 21 May 2024 11:03:35 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/3PKCd5DJbPpzM2M4nnCTsN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Email security concept image showing a flurry of digitized mail symbols.]]></media:description>                                                            <media:text><![CDATA[Email security concept image showing a flurry of digitized mail symbols.]]></media:text>
                                <media:title type="plain"><![CDATA[Email security concept image showing a flurry of digitized mail symbols.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/3PKCd5DJbPpzM2M4nnCTsN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ This malware is trying to steal your AWS keys and more, here's how to protect yourself ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/this-malware-is-trying-to-steal-your-aws-keys-and-more-heres-how-to-protect-yourself</link>
                                                                            <description>
                            <![CDATA[ Androxgh0st malware is stealing credentials and building a botnet to go after more targets, according to the FBI and CISA ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">RBt3kgz4XMALWZJYvBHjrj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Jtpk6Us8wuCQvQrs6SDRQb-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 17 Jan 2024 21:30:41 +0000</pubDate>                                                                                                                                <updated>Thu, 18 Jan 2024 11:10:27 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Steve Ranger ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Jtpk6Us8wuCQvQrs6SDRQb-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware stock image showing warning symbol in yellow on red background with unlocked padlocks]]></media:description>                                                            <media:text><![CDATA[Malware stock image showing warning symbol in yellow on red background with unlocked padlocks]]></media:text>
                                <media:title type="plain"><![CDATA[Malware stock image showing warning symbol in yellow on red background with unlocked padlocks]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Jtpk6Us8wuCQvQrs6SDRQb-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Warning issued over “inadvertent” spread of malvertising on Google Dynamic Search Ads ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/warning-issued-over-inadvertent-spread-of-malvertising-on-google-dynamic-search-ads</link>
                                                                            <description>
                            <![CDATA[ The malvertising campaign represents a novel case in which threat actors were unaware of the success of their campaign ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">WA9w7YLaQL9MtBdrL2TFsB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/L6DSTHdion3mCrSBkWnF9C-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 01 Nov 2023 08:50:46 +0000</pubDate>                                                                                                                                <updated>Wed, 01 Nov 2023 14:36:33 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/L6DSTHdion3mCrSBkWnF9C-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Mockup of a padlock covered in blue and red neon code denoting ransomware, malware, and security]]></media:description>                                                            <media:text><![CDATA[Mockup of a padlock covered in blue and red neon code denoting ransomware, malware, and security]]></media:text>
                                <media:title type="plain"><![CDATA[Mockup of a padlock covered in blue and red neon code denoting ransomware, malware, and security]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/L6DSTHdion3mCrSBkWnF9C-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Researchers uncover novel RDStealer malware targeting remote desktop protocol ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/researchers-uncover-novel-rdstealer-malware-targeting-remote-desktop-protocol</link>
                                                                            <description>
                            <![CDATA[ Bitdefender's experts said the level of disguise observed in this campaign “surpasses anything witnessed thus far” ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">K53G9Kqz62qKYdpDzyhBYB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/o7aE2bbqGF7TeVESbqgZfb-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 20 Jun 2023 10:50:01 +0000</pubDate>                                                                                                                                <updated>Tue, 20 Jun 2023 15:34:56 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ richard.speed@futurenet.com (Richard Speed) ]]></author>                    <dc:creator><![CDATA[ Richard Speed ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/o7aE2bbqGF7TeVESbqgZfb-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[RDStealer: Mockup of brigtly coloured alert with code and a warning sign, reading &#039;malware&#039;]]></media:description>                                                            <media:text><![CDATA[RDStealer: Mockup of brigtly coloured alert with code and a warning sign, reading &#039;malware&#039;]]></media:text>
                                <media:title type="plain"><![CDATA[RDStealer: Mockup of brigtly coloured alert with code and a warning sign, reading &#039;malware&#039;]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/o7aE2bbqGF7TeVESbqgZfb-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The top malware and ransomware threats for June 2023 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/the-top-malware-and-ransomware-threats-for-june-2023</link>
                                                                            <description>
                            <![CDATA[ Organizations face a fresh round of cyber threats as criminals continue to evolve their tactics ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Dm3is6Bemde56uckRk2EKR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/wxwQh5vaMoKWvRvc4tsgMe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 08 Jun 2023 11:35:02 +0000</pubDate>                                                                                                                                <updated>Tue, 13 Jun 2023 09:55:49 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ connor.jones@futurenet.com (Connor Jones) ]]></author>                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/wxwQh5vaMoKWvRvc4tsgMe-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[System hacked alert appearing on a computer screen]]></media:description>                                                            <media:text><![CDATA[System hacked alert appearing on a computer screen]]></media:text>
                                <media:title type="plain"><![CDATA[System hacked alert appearing on a computer screen]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/wxwQh5vaMoKWvRvc4tsgMe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Kaspersky traces spyware attack on staff iOS devices back to 2019 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/kaspersky-traces-spyware-attack-on-staff-ios-devices-back-to-2019</link>
                                                                            <description>
                            <![CDATA[ It's currently unclear who is behind the spyware attack on the Russian-based cyber security firm ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">TQzZqWRbayRMvW4DubGcLj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/rCZWb4KQCTDwQB3y4xjNAf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 02 Jun 2023 11:52:29 +0000</pubDate>                                                                                                                                <updated>Tue, 13 Jun 2023 08:09:37 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/rCZWb4KQCTDwQB3y4xjNAf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The silhouette of a person looking at their phone, in front of text reading &#039;Kaspersky&#039; on a light blue background.]]></media:description>                                                            <media:text><![CDATA[The silhouette of a person looking at their phone, in front of text reading &#039;Kaspersky&#039; on a light blue background.]]></media:text>
                                <media:title type="plain"><![CDATA[The silhouette of a person looking at their phone, in front of text reading &#039;Kaspersky&#039; on a light blue background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/rCZWb4KQCTDwQB3y4xjNAf-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>