<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/feeds/tag/phishing" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro in Phishing ]]></title>
                <link>https://www.itpro.com/security/phishing</link>
        <description><![CDATA[ All the latest phishing content from the ITPro team ]]></description>
                                    <lastBuildDate>Fri, 17 Apr 2026 11:05:53 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ Tycoon 2FA is down, but not out – researchers warn the phishing as a service operation is still a huge threat to businesses ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/tycoon-2fa-phishing-risk-takedown-barracuda</link>
                                                                            <description>
                            <![CDATA[ Millions of Tycoon 2FA attacks are still hitting businesses, according to research from Barracuda ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vXDsxDKKWbMUkuvkVXXwHC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 17 Apr 2026 11:05:53 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Zephyr Energy hackers swiped £700,000 after redirecting a contractor payment ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/zephyr-energy-hackers-swiped-gbp700-000-after-redirecting-a-contractor-payment</link>
                                                                            <description>
                            <![CDATA[ Payment to a Zephyr Energy contractor was siphoned off, but the incident has been contained and new security measures implemented ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">m6aEtDpzcUUX6suSr8UbWg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:17:04 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Apr 2026 10:45:34 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:description>                                                            <media:text><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 'AI-generated phishing became the baseline' for hackers last year – Kaseya warns it's going to get worse in 2026 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/ai-generated-phishing-became-the-baseline-for-hackers-last-year-kaseya-warns-its-going-to-get-worse-in-2026</link>
                                                                            <description>
                            <![CDATA[ Forget looking for typos and bad grammar, phishing campaigns are using AI to boost their attack success ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">bMNzEiSHCoLywhdK6jLQfa</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 19 Mar 2026 11:36:23 +0000</pubDate>                                                                                                                                <updated>Thu, 19 Mar 2026 11:55:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:description>                                                            <media:text><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Interpol teams up with tech firms to seize 45,000 malicious IPs, servers in global cyber crime crackdown ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/interpol-teams-up-with-tech-firms-to-seize-45-000-malicious-ips-servers-in-global-cyber-crime-crackdown</link>
                                                                            <description>
                            <![CDATA[ Operation Synergia III saw 94 arrests - and counting - with malicious IP addresses used in phishing and fraud schemes seized ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">XFNDAXHXAFtquRa5PNdCj4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iYKtddn8SPxwMyTSxMyxEK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Mar 2026 11:48:22 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iYKtddn8SPxwMyTSxMyxEK-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Interpol logo and insignia pictured on a building facade at a regional unit in Singapore. ]]></media:description>                                                            <media:text><![CDATA[Interpol logo and insignia pictured on a building facade at a regional unit in Singapore. ]]></media:text>
                                <media:title type="plain"><![CDATA[Interpol logo and insignia pictured on a building facade at a regional unit in Singapore. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iYKtddn8SPxwMyTSxMyxEK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Is your new hire an AI clone? Microsoft says North Korean hackers are using AI to impersonate job seekers and steal company secrets ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/is-your-new-hire-an-ai-clone-microsoft-says-north-korean-hackers-are-using-ai-to-impersonate-job-seekers-and-steal-company-secrets</link>
                                                                            <description>
                            <![CDATA[ The groups are increasingly using face-changing or voice-changing software to make their fake identities more plausible ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9jyHo9d4gA83CkaZBtmvcQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/U7xFHys4ZqNqAUYxH7V7Sa-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 09 Mar 2026 12:23:15 +0000</pubDate>                                                                                                                                <updated>Tue, 10 Mar 2026 12:00:49 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/U7xFHys4ZqNqAUYxH7V7Sa-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Side profile view of a human head with brain synapses and flowing data lines. ]]></media:description>                                                            <media:text><![CDATA[Side profile view of a human head with brain synapses and flowing data lines. ]]></media:text>
                                <media:title type="plain"><![CDATA[Side profile view of a human head with brain synapses and flowing data lines. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/U7xFHys4ZqNqAUYxH7V7Sa-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ LastPass issues alert as customers face second major phishing campaign of 2026 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/lastpass-issues-alert-as-customers-face-second-major-phishing-campaign-of-2026</link>
                                                                            <description>
                            <![CDATA[ The campaign is the third to hit LastPass users in six months ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MoCaRUcUDxBBuWzHCWEBw8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ocP3dX4tjhaXs2GSGBykGh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 04 Mar 2026 11:42:09 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ocP3dX4tjhaXs2GSGBykGh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[LastPass logo and branding reflected on the internal discs of a hard drive.]]></media:description>                                                            <media:text><![CDATA[LastPass logo and branding reflected on the internal discs of a hard drive.]]></media:text>
                                <media:title type="plain"><![CDATA[LastPass logo and branding reflected on the internal discs of a hard drive.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ocP3dX4tjhaXs2GSGBykGh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A single compromised account gave hackers access to 1.2 million French banking records ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/a-single-compromised-account-gave-hackers-access-to-1-2-million-french-banking-records</link>
                                                                            <description>
                            <![CDATA[ Ficoba has warned that “numerous” scams are already in circulation following the data breach ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MctzL27C9DgHoFVWrZYiq4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 20 Feb 2026 10:55:22 +0000</pubDate>                                                                                                                                <updated>Fri, 20 Feb 2026 13:17:05 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Starkiller: Cyber experts issue warning over new phishing kit that proxies real login pages ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/starkiller-cyber-experts-issue-warning-over-new-phishing-kit-that-proxies-real-login-pages</link>
                                                                            <description>
                            <![CDATA[ The Starkiller package offers monthly framework updates and documentation, meaning no technical ability is needed ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mHwEJejwdhDhzJt7KvMCBA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/tjxtfTzqYUV5qV2FNQQYVM-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 19 Feb 2026 12:06:46 +0000</pubDate>                                                                                                                                <updated>Thu, 19 Feb 2026 12:22:07 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/tjxtfTzqYUV5qV2FNQQYVM-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Close-up image of a web browser URL bar with https code.]]></media:description>                                                            <media:text><![CDATA[Close-up image of a web browser URL bar with https code.]]></media:text>
                                <media:title type="plain"><![CDATA[Close-up image of a web browser URL bar with https code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/tjxtfTzqYUV5qV2FNQQYVM-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google says hacker groups are using Gemini to augment attacks – and companies are even ‘stealing’ its models ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/technology/artificial-intelligence/google-says-hacker-groups-are-using-gemini-to-augment-attacks-and-companies-are-even-stealing-its-models</link>
                                                                            <description>
                            <![CDATA[ Google Threat Intelligence Group has shut down repeated attempts to misuse the Gemini model family ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qzWopoZe4zTA5NEjJaY4zK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/u2PgWCzhcwJ3sd5MyNLvqf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Feb 2026 11:40:16 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Artificial Intelligence]]></category>
                                                    <category><![CDATA[Technology]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/u2PgWCzhcwJ3sd5MyNLvqf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Google Gemini AI logo and branding picture on a smartphone screen.]]></media:description>                                                            <media:text><![CDATA[Google Gemini AI logo and branding picture on a smartphone screen.]]></media:text>
                                <media:title type="plain"><![CDATA[Google Gemini AI logo and branding picture on a smartphone screen.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/u2PgWCzhcwJ3sd5MyNLvqf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security experts warn Substack users to brace for phishing attacks after breach ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/security-experts-warn-substack-users-to-brace-for-phishing-attacks-after-breach</link>
                                                                            <description>
                            <![CDATA[ Substack CEO Christ Best confirmed the incident occurred in October 2025 ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">o7MCXZ7M3JJJe6sM7bNT9B</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/k4Nndu7uQs2VrqAomgdw8R-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 06 Feb 2026 09:38:32 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/k4Nndu7uQs2VrqAomgdw8R-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Substack logo and branding pictured on a laptop screen with hand placed on keyboard and blurred user head in foreground.]]></media:description>                                                            <media:text><![CDATA[Substack logo and branding pictured on a laptop screen with hand placed on keyboard and blurred user head in foreground.]]></media:text>
                                <media:title type="plain"><![CDATA[Substack logo and branding pictured on a laptop screen with hand placed on keyboard and blurred user head in foreground.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/k4Nndu7uQs2VrqAomgdw8R-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google issues warning over ShinyHunters-branded vishing campaigns ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/google-issues-warning-over-shinyhunters-branded-vishing-campaigns</link>
                                                                            <description>
                            <![CDATA[ Related groups are stealing data through voice phishing  and fake credential harvesting websites ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zHr8MESTqLrM7FdPM6unGB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 04 Feb 2026 08:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:description>                                                            <media:text><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:text>
                                <media:title type="plain"><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are using LLMs to generate malicious JavaScript in real time – and they’re going after web browsers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hackers-are-using-llms-to-generate-malicious-javascript-in-real-time-and-theyre-going-after-web-browsers</link>
                                                                            <description>
                            <![CDATA[ Defenders advised to use runtime behavioral analysis to detect and block malicious activity at the point of execution, directly within the browser ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jCEPJqp6YG8HwK82cTm96g</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/MNSH2GsMD6TfUQC4bpLHm-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 28 Jan 2026 12:57:52 +0000</pubDate>                                                                                                                                <updated>Wed, 28 Jan 2026 13:11:31 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/MNSH2GsMD6TfUQC4bpLHm-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Generative AI attack concept image showing a robotic, AI-controlled hand holding an alert symbol.]]></media:description>                                                            <media:text><![CDATA[Generative AI attack concept image showing a robotic, AI-controlled hand holding an alert symbol.]]></media:text>
                                <media:title type="plain"><![CDATA[Generative AI attack concept image showing a robotic, AI-controlled hand holding an alert symbol.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/MNSH2GsMD6TfUQC4bpLHm-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Thousands of Microsoft Teams users are being targeted in a new phishing campaign ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/microsoft-teams-phishing-scam-fake-billing-check-point</link>
                                                                            <description>
                            <![CDATA[ Microsoft Teams users should be on the alert, according to researchers at Check Point ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">xYBLYYi6CQjeTaVUDQ9sSk</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WwZJrcyz5jLppWLVcEFL8m-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 26 Jan 2026 10:45:59 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/WwZJrcyz5jLppWLVcEFL8m-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft Teams login page on desktop app pictured on a laptop screen.]]></media:description>                                                            <media:text><![CDATA[Microsoft Teams login page on desktop app pictured on a laptop screen.]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft Teams login page on desktop app pictured on a laptop screen.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WwZJrcyz5jLppWLVcEFL8m-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft warns of rising AitM phishing attacks on energy sector ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/microsoft-warns-of-rising-aitm-phishing-attacks-on-energy-sector</link>
                                                                            <description>
                            <![CDATA[ The campaign abused SharePoint file sharing services to deliver phishing payloads and altered inbox rules to maintain persistence ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Bt6xNvsN2W3SWsSesfhL95</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 23 Jan 2026 11:10:09 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:description>                                                            <media:text><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ LastPass issues alert as customers targeted in new phishing campaign ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/lastpass-issues-alert-as-customers-targeted-in-new-phishing-campaign</link>
                                                                            <description>
                            <![CDATA[ LastPass has urged customers to be on the alert for phishing emails amidst an ongoing scam campaign that encourages users to backup vaults. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ijqU7Q6m8qg9BLHKYP63hX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ocP3dX4tjhaXs2GSGBykGh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 21 Jan 2026 10:43:16 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ocP3dX4tjhaXs2GSGBykGh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[LastPass logo and branding reflected on the internal discs of a hard drive.]]></media:description>                                                            <media:text><![CDATA[LastPass logo and branding reflected on the internal discs of a hard drive.]]></media:text>
                                <media:title type="plain"><![CDATA[LastPass logo and branding reflected on the internal discs of a hard drive.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ocP3dX4tjhaXs2GSGBykGh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hacked London council warns 100,000 households at risk of follow-up scams ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/kensington-and-chelsea-council-cyber-attack-data-breach</link>
                                                                            <description>
                            <![CDATA[ The council is warning residents they may be at increased risk of phishing scams in the wake of the cyber attack. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">wZ7G9ZrPZjmFuj5WHFTupd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FAsuGpEyETVLrjxktBXe5B-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 08 Jan 2026 12:04:34 +0000</pubDate>                                                                                                                                <updated>Thu, 08 Jan 2026 13:55:21 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FAsuGpEyETVLrjxktBXe5B-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Fallen leaves pictured on the pavement outside residential townhouses in London&#039;s Kensington Gardens area, part of the Kensington and Chelsea Council district.]]></media:description>                                                            <media:text><![CDATA[Fallen leaves pictured on the pavement outside residential townhouses in London&#039;s Kensington Gardens area, part of the Kensington and Chelsea Council district.]]></media:text>
                                <media:title type="plain"><![CDATA[Fallen leaves pictured on the pavement outside residential townhouses in London&#039;s Kensington Gardens area, part of the Kensington and Chelsea Council district.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FAsuGpEyETVLrjxktBXe5B-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Phishing kits soared in popularity last year as rookie hackers ramped up DIY cyber attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/phishing-as-a-service-kits-growth-2025-barracuda</link>
                                                                            <description>
                            <![CDATA[ As PhaaS kits increase in sophistication, organizations should be on the alert ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">TxzYZV9miajXYFXsXXBgFZ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 08 Jan 2026 11:03:07 +0000</pubDate>                                                                                                                                <updated>Thu, 08 Jan 2026 11:03:59 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:description>                                                            <media:text><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Warning issued as surge in OAuth device code phishing leads to M365 account takeovers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/warning-issued-as-surge-in-oauth-device-code-phishing-leads-to-m365-account-takeovers</link>
                                                                            <description>
                            <![CDATA[ Successful attacks enable full M365 account access, opening the door to data theft, lateral movement, and persistent compromise ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">KvYoW3sdJ4wDkctJHg82bk</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/cH6m7NRbNRSksBtYe4xHVH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 22 Dec 2025 10:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/cH6m7NRbNRSksBtYe4xHVH-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft 365 logo pictured on a smartphone with Microsoft logo pictured in background.]]></media:description>                                                            <media:text><![CDATA[Microsoft 365 logo pictured on a smartphone with Microsoft logo pictured in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft 365 logo pictured on a smartphone with Microsoft logo pictured in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/cH6m7NRbNRSksBtYe4xHVH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Complacent Gen Z and Millennial workers are more likely to be duped by social engineering attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/complacent-gen-z-and-millennial-workers-are-more-likely-to-be-duped-by-social-engineering-attacks</link>
                                                                            <description>
                            <![CDATA[ Overconfidence and a lack of security training are putting organizations at risk ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">487j6euuWzVzHbTfjp59jF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QGJdnzL5ujgBmZvWfYVyk7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 16 Dec 2025 11:00:35 +0000</pubDate>                                                                                                                                <updated>Tue, 16 Dec 2025 11:01:19 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QGJdnzL5ujgBmZvWfYVyk7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ethical hacker concept image showing hands of a female pentester typing on a laptop keyboard.]]></media:description>                                                            <media:text><![CDATA[Ethical hacker concept image showing hands of a female pentester typing on a laptop keyboard.]]></media:text>
                                <media:title type="plain"><![CDATA[Ethical hacker concept image showing hands of a female pentester typing on a laptop keyboard.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QGJdnzL5ujgBmZvWfYVyk7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The Scattered Lapsus$ Hunters group is targeting Zendesk customers – here’s what you need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/the-scattered-lapsus-usd-hunters-group-is-targeting-zendesk-customers-heres-what-you-need-to-know</link>
                                                                            <description>
                            <![CDATA[ The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">yA82eDy5m43beT5ptyrzhG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/KfsCD25eUDMdmZevdnb6rU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 27 Nov 2025 11:45:15 +0000</pubDate>                                                                                                                                <updated>Thu, 27 Nov 2025 11:46:02 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/KfsCD25eUDMdmZevdnb6rU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Zendesk logo and branding pictured on a smartphone screen. ]]></media:description>                                                            <media:text><![CDATA[Zendesk logo and branding pictured on a smartphone screen. ]]></media:text>
                                <media:title type="plain"><![CDATA[Zendesk logo and branding pictured on a smartphone screen. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/KfsCD25eUDMdmZevdnb6rU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google wants to take hackers to court ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/google-wants-to-take-hackers-to-court</link>
                                                                            <description>
                            <![CDATA[ You don't have a package waiting for you, it's a scam – and Google is fighting back ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">DDsJH49C7fhTRu7oseXiE6</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/yfUArnWfBRPqRCc8yFhuxe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 13 Nov 2025 11:58:15 +0000</pubDate>                                                                                                                                <updated>Thu, 13 Nov 2025 11:58:58 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/yfUArnWfBRPqRCc8yFhuxe-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Google logo pictured on a sign on side of the company&#039;s headquarters in Krakow, Poland. ]]></media:description>                                                            <media:text><![CDATA[Google logo pictured on a sign on side of the company&#039;s headquarters in Krakow, Poland. ]]></media:text>
                                <media:title type="plain"><![CDATA[Google logo pictured on a sign on side of the company&#039;s headquarters in Krakow, Poland. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/yfUArnWfBRPqRCc8yFhuxe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 77% of security leaders say they'd fire staff who fall for phishing scams, even though they've done the same thing ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/77-percent-of-security-leaders-say-theyd-fire-staff-who-fall-for-phishing-scams-even-though-theyve-done-the-same-thing</link>
                                                                            <description>
                            <![CDATA[ A new report uncovers worrying complacency amongst IT and security leaders ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">se8utRnanCv3BCSK2H2n5N</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6VWtT5jw3HYNZeXsUu7hrV-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 16 Oct 2025 13:04:07 +0000</pubDate>                                                                                                                                <updated>Thu, 16 Oct 2025 13:04:45 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6VWtT5jw3HYNZeXsUu7hrV-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Office worker using a desktop computer and clicking on a mouse button.]]></media:description>                                                            <media:text><![CDATA[Office worker using a desktop computer and clicking on a mouse button.]]></media:text>
                                <media:title type="plain"><![CDATA[Office worker using a desktop computer and clicking on a mouse button.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6VWtT5jw3HYNZeXsUu7hrV-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Been offered a job at Google? Think again. This new phishing scam is duping tech workers looking for a career change ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/been-offered-a-job-at-google-think-again-this-new-phishing-scam-is-duping-tech-workers-looking-for-a-career-change</link>
                                                                            <description>
                            <![CDATA[ A new Google Careers phishing scam is targeting tech workers looking for a change of scenery – here's how to stay safe ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">SVYarkCEJVnpoCzah5NkFc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/sRnYxWRCtCVXgvACRyiqq8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 16 Oct 2025 07:50:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/sRnYxWRCtCVXgvACRyiqq8-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Job application concept image showing woman in a coffee shop updating her CV on a laptop computer.]]></media:description>                                                            <media:text><![CDATA[Job application concept image showing woman in a coffee shop updating her CV on a laptop computer.]]></media:text>
                                <media:title type="plain"><![CDATA[Job application concept image showing woman in a coffee shop updating her CV on a laptop computer.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/sRnYxWRCtCVXgvACRyiqq8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are using a new phishing kit to steal Microsoft 365 credentials and MFA tokens – Whisper 2FA is evolving rapidly and has been used in nearly one million attacks since July ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/whisper2fa-phishing-attacks-microsoft-365-barracuda</link>
                                                                            <description>
                            <![CDATA[ Whisper 2FA is now the third most common Phishing as a Service tool worldwide ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">o2296ByLgWyubbBQFtiSkh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/BwgyDzFJ2YV3ja2RZQJT9b-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Oct 2025 09:55:00 +0000</pubDate>                                                                                                                                <updated>Wed, 15 Oct 2025 12:57:42 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/BwgyDzFJ2YV3ja2RZQJT9b-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing concept image showing an email symbol with a fishing hook pierced through, with glowing padlock symbols in background.]]></media:description>                                                            <media:text><![CDATA[Phishing concept image showing an email symbol with a fishing hook pierced through, with glowing padlock symbols in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing concept image showing an email symbol with a fishing hook pierced through, with glowing padlock symbols in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/BwgyDzFJ2YV3ja2RZQJT9b-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft and Cloudflare just took down a major phishing operation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/microsoft-and-cloudflare-just-took-down-a-major-phishing-operation</link>
                                                                            <description>
                            <![CDATA[ RaccoonO365’s phishing as a service platform has risen to prominence via Telegram ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9mAaawBnYk74K7Jxi4d7dG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 18 Sep 2025 11:40:27 +0000</pubDate>                                                                                                                                <updated>Thu, 18 Sep 2025 11:40:56 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:description>                                                            <media:text><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Varonis snaps up AI email security specialist SlashNext ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/acquisition/varonis-snaps-up-ai-email-security-specialist-slashnext</link>
                                                                            <description>
                            <![CDATA[ The vendor will integrate SlashNext’s phishing and social engineering detection capabilities into its Data Security Platform ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">NTm3yWUndWneEkdgKF5KAT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/98R6uA9EGq7B7qGSeGEfcS-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 04 Sep 2025 11:30:12 +0000</pubDate>                                                                                                                                <updated>Thu, 04 Sep 2025 11:30:44 +0000</updated>
                                                                                                                                            <category><![CDATA[Acquisition]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/98R6uA9EGq7B7qGSeGEfcS-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Varonis logo and branding pictured on a smartphone screen.]]></media:description>                                                            <media:text><![CDATA[Varonis logo and branding pictured on a smartphone screen.]]></media:text>
                                <media:title type="plain"><![CDATA[Varonis logo and branding pictured on a smartphone screen.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/98R6uA9EGq7B7qGSeGEfcS-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are abusing ConnectWise ScreenConnect, again ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/watch-out-for-fake-zoom-invites-hackers-are-abusing-connectwise-screenconnect-to-take-over-devices</link>
                                                                            <description>
                            <![CDATA[ A new spear phishing campaign has targeted more than 900 organizations with fake invitations from platforms like Zoom and Microsoft Teams. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">aufhxNMDzjp8GwNMjv2ojN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 28 Aug 2025 10:10:00 +0000</pubDate>                                                                                                                                <updated>Thu, 28 Aug 2025 11:34:51 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:description>                                                            <media:text><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Malicious URLs overtake email attachments as the biggest malware threat ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/malicious-urls-overtake-email-attachments-as-the-biggest-malware-threat</link>
                                                                            <description>
                            <![CDATA[ With malware threats surging, research from Proofpoint highlights the increasing use of off-the-shelf 'phish kits' like CoGUI and Darcula ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MnqNyLFMRRCSCpH4xotVDV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 18 Aug 2025 10:11:40 +0000</pubDate>                                                                                                                                <updated>Mon, 18 Aug 2025 10:12:06 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:description>                                                            <media:text><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:text>
                                <media:title type="plain"><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ New hires are your weakest link when it comes to phishing attacks – here's how you can build a strong security culture that doesn't judge victims ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/new-hires-are-your-weakest-link-when-it-comes-to-phishing-attacks-heres-how-you-can-build-a-strong-security-culture-that-doesnt-judge-victims</link>
                                                                            <description>
                            <![CDATA[ Research from Keepnet shows new hires are far more likely to fall for phishing attacks – here's how you can improve security awareness during onboarding processes. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">cJBoQGagYkR3DvwwpoYpB8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 22 Jul 2025 10:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:description>                                                            <media:text><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are using Microsoft 365 features to bombard enterprises with phishing emails – and they’ve already hit more than 70 organizations ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hackers-are-using-microsoft-365-features-to-bombard-enterprises-with-phishing-emails-and-theyve-already-hit-more-than-70-organizations</link>
                                                                            <description>
                            <![CDATA[ A new phishing campaign uncovered by researchers at Varonis shows threat actors are abusing Microsoft 365's Direct Send feature to launch phishing attacks. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">GkZeWAQdAPYkDzGXhHvzZL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 27 Jun 2025 09:47:23 +0000</pubDate>                                                                                                                                <updated>Fri, 27 Jun 2025 09:47:40 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:description>                                                            <media:text><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ FIN6 attackers target recruiters with fraudulent resumes ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/fin6-attackers-target-recruiters-with-fraudulent-resumes</link>
                                                                            <description>
                            <![CDATA[ The group's phishing methods protect it from many detection tools, researchers warn ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">SaTwmxFXECL6xpADrrDaNb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QiKYok3J9ymuxFszVLW8CM-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 11 Jun 2025 09:53:24 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QiKYok3J9ymuxFszVLW8CM-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A cyber criminal using a laptop, with a close-up of their hands on the keyboard]]></media:description>                                                            <media:text><![CDATA[A cyber criminal using a laptop, with a close-up of their hands on the keyboard]]></media:text>
                                <media:title type="plain"><![CDATA[A cyber criminal using a laptop, with a close-up of their hands on the keyboard]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QiKYok3J9ymuxFszVLW8CM-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 100,000 accounts have been hit in a HMRC scam campaign, but the tax office says it wasn't hacked – here's why ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hmrc-scam-account-campaign</link>
                                                                            <description>
                            <![CDATA[ Organized criminals used phished data to set up dodgy HMRC accounts and demand tax rebates ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8jdVp5LJwTZZ84xo9Vo3xT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/xP6A8Prw5RKCLWiZNrCaNT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 05 Jun 2025 11:26:03 +0000</pubDate>                                                                                                                                <updated>Thu, 05 Jun 2025 11:26:13 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/xP6A8Prw5RKCLWiZNrCaNT-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[HM Revenue &amp; Customs (HMRC) letter pictured on a table top. ]]></media:description>                                                            <media:text><![CDATA[HM Revenue &amp; Customs (HMRC) letter pictured on a table top. ]]></media:text>
                                <media:title type="plain"><![CDATA[HM Revenue &amp; Customs (HMRC) letter pictured on a table top. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/xP6A8Prw5RKCLWiZNrCaNT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Employee phishing training is working – but don’t get complacent ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/employee-phishing-training-is-working-but-dont-get-complacent</link>
                                                                            <description>
                            <![CDATA[ Educating staff on how to avoid phishing attacks can cut the rate by 80% ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">37z7vZ2GgU3rttv3wGMRRe</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 15 May 2025 11:22:11 +0000</pubDate>                                                                                                                                <updated>Thu, 15 May 2025 11:22:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:description>                                                            <media:text><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Russian hackers tried to lure diplomats with wine tasting – sound familiar? It’s an update to a previous campaign by the notorious Midnight Blizzard group ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/midnight-blizzard-grapeloader-campaign</link>
                                                                            <description>
                            <![CDATA[ The Midnight Blizzard threat group has been targeting European diplomats with malicious emails offering an invite to wine tasting events, according to Check Point. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">gfj5NaQ622X4dJM3a496XK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N7Ps3tz7EftxHFVrboGb6g-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 06 May 2025 23:05:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N7Ps3tz7EftxHFVrboGb6g-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Wine tasting concept image showing a man holding up a glass of red wine in a cellar surrounded by barrels. ]]></media:description>                                                            <media:text><![CDATA[Wine tasting concept image showing a man holding up a glass of red wine in a cellar surrounded by barrels. ]]></media:text>
                                <media:title type="plain"><![CDATA[Wine tasting concept image showing a man holding up a glass of red wine in a cellar surrounded by barrels. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N7Ps3tz7EftxHFVrboGb6g-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ This hacker group is posing as IT helpdesk workers to target enterprises – and researchers warn its social engineering techniques are exceptionally hard to spot ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/this-hacker-group-is-posing-as-it-helpdesk-workers-to-target-enterprises-and-researchers-warn-its-social-engineering-techniques-are-exceptionally-hard-to-spot</link>
                                                                            <description>
                            <![CDATA[ The Luna Moth hacker group is ramping up attacks on firms across a range of industries with its 'callback phishing' campaign, according to security researchers. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">askdj8bRPN3gJq5xf8wMCL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WyQFFy6TAF7mzUvPhASUCd-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 06 May 2025 11:29:54 +0000</pubDate>                                                                                                                                <updated>Tue, 06 May 2025 11:29:59 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/WyQFFy6TAF7mzUvPhASUCd-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Luna Moth concept image showing cartoon mothman figure with red eyes and wings hovering against the night sky. ]]></media:description>                                                            <media:text><![CDATA[Luna Moth concept image showing cartoon mothman figure with red eyes and wings hovering against the night sky. ]]></media:text>
                                <media:title type="plain"><![CDATA[Luna Moth concept image showing cartoon mothman figure with red eyes and wings hovering against the night sky. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WyQFFy6TAF7mzUvPhASUCd-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Healthcare organizations are turning a blind eye to phishing attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/healthcare-organizations-are-turning-a-blind-eye-to-phishing-attacks</link>
                                                                            <description>
                            <![CDATA[ A survey reveals that most attacks go unreported, putting patient data at risk ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zCKUnaWuQZ4KtMKbaUX7jY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 25 Apr 2025 08:25:33 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:description>                                                            <media:text><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘Phishing kits are a force multiplier': Cheap cyber crime kits can be bought on the dark web for less than $25 – and experts warn it’s lowering the barrier of entry for amateur hackers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/phishing-kits-cyber-crime-dark-web</link>
                                                                            <description>
                            <![CDATA[ Research from NordVPN shows phishing kits are now widely available on the dark web and via messaging apps like Telegram, and are often selling for less than $25. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qsveyM9EvfU5jiXfZRPQk8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 11 Apr 2025 11:58:06 +0000</pubDate>                                                                                                                                <updated>Fri, 11 Apr 2025 12:03:14 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:description>                                                            <media:text><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:text>
                                <media:title type="plain"><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/have-i-been-pwned-owner-troy-hunts-mailing-list-compromised-in-phishing-attack</link>
                                                                            <description>
                            <![CDATA[ Troy Hunt, the security blogger behind data-breach site Have I Been Pwned, has fallen victim to a phishing attack targeting his email subscriber list. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">DeZk4b24SkqhNduybCNMUS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/cNZLBdbFMucebEe8kjq7di-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 26 Mar 2025 08:30:00 +0000</pubDate>                                                                                                                                <updated>Wed, 26 Mar 2025 11:20:43 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ jane.mccallion@futurenet.com (Jane McCallion) ]]></author>                    <dc:creator><![CDATA[ Jane McCallion ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/cNZLBdbFMucebEe8kjq7di-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing concept image showing an email symbol with fishing hook.]]></media:description>                                                            <media:text><![CDATA[Phishing concept image showing an email symbol with fishing hook.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing concept image showing an email symbol with fishing hook.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/cNZLBdbFMucebEe8kjq7di-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security experts warn of ‘contradictory confidence’ over critical infrastructure threats ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/critical-infrastructure-cyber-threats</link>
                                                                            <description>
                            <![CDATA[ Almost all critical national infrastructure (CNI) organizations in the UK (95%) experienced a data breach in the last year, according to new research. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">heNCYhzyqu24MbBtP54Xgb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WpWQgus5fSc7duCTbNXWAm-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 24 Mar 2025 10:44:54 +0000</pubDate>                                                                                                                                <updated>Mon, 24 Mar 2025 14:30:09 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/WpWQgus5fSc7duCTbNXWAm-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity concept image showing digitized padlock with data points flowing out from behind.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity concept image showing digitized padlock with data points flowing out from behind.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity concept image showing digitized padlock with data points flowing out from behind.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WpWQgus5fSc7duCTbNXWAm-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Healthcare organizations need to shake up email security practices ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/healthcare-organizations-need-to-shake-up-email-security-practices</link>
                                                                            <description>
                            <![CDATA[ Microsoft 365 is the source of almost half of all healthcare email breaches, thanks mainly to misconfigurations in security settings. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">93TwYBNZR67ud924vKQoj8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 18 Mar 2025 10:28:18 +0000</pubDate>                                                                                                                                <updated>Tue, 18 Mar 2025 16:50:07 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:description>                                                            <media:text><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google is dropping SMS authentication for QR codes ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/google-is-dropping-sms-authentication-for-qr-codes</link>
                                                                            <description>
                            <![CDATA[ Google appears finally ready to deprecate using SMS codes for multi-factor authentication (MFA) for Gmail according to insiders at the search giant. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">UCEDXHknwhEr83pN7eWGzb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/KWnuenMsdyFzLapjnaFXAU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 25 Feb 2025 16:30:00 +0000</pubDate>                                                                                                                                <updated>Wed, 26 Feb 2025 15:23:01 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/KWnuenMsdyFzLapjnaFXAU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Google logo pictured at the company&#039;s Bay View campus in Mountain View, California.]]></media:description>                                                            <media:text><![CDATA[Google logo pictured at the company&#039;s Bay View campus in Mountain View, California.]]></media:text>
                                <media:title type="plain"><![CDATA[Google logo pictured at the company&#039;s Bay View campus in Mountain View, California.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/KWnuenMsdyFzLapjnaFXAU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Why ‘malware as a service’ is becoming a serious problem ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/why-malware-as-a-service-is-becoming-a-serious-problem</link>
                                                                            <description>
                            <![CDATA[ Researchers have issued a warning over the rise of 'malware as a service' platforms amid a surge in attacks over the last year. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">88BZdeNJiYUjw3wdr39wYe</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/C5CVHQe64yFiVrMZmpFsbQ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 20 Feb 2025 13:00:13 +0000</pubDate>                                                                                                                                <updated>Fri, 21 Feb 2025 12:52:13 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/C5CVHQe64yFiVrMZmpFsbQ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Close up of yellow networking cables going to a circuitboard]]></media:description>                                                            <media:text><![CDATA[Close up of yellow networking cables going to a circuitboard]]></media:text>
                                <media:title type="plain"><![CDATA[Close up of yellow networking cables going to a circuitboard]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/C5CVHQe64yFiVrMZmpFsbQ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are using this new phishing technique to bypass MFA ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/device-code-phishing-storm-2372-microsoft</link>
                                                                            <description>
                            <![CDATA[ Microsoft has warned that a threat group known as Storm-2372 has altered its tactics using a specific ‘device code phishing’ technique to bypass MFA and steal access tokens. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">EajvbWkdC23JH36pTDndFF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 17 Feb 2025 16:33:39 +0000</pubDate>                                                                                                                                <updated>Fri, 28 Feb 2025 14:13:26 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:description>                                                            <media:text><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:text>
                                <media:title type="plain"><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Threat actors are leaning on trusted services more than ever ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/threat-actors-are-leaning-on-trusted-services-more-than-ever</link>
                                                                            <description>
                            <![CDATA[ Cyber threats are increasingly incorporating legitimate services in their attack chain, researchers warn. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">LaSEnKpAcP9vRL88AgHzxX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 13 Feb 2025 13:17:04 +0000</pubDate>                                                                                                                                <updated>Thu, 13 Feb 2025 15:24:53 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:description>                                                            <media:text><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:text>
                                <media:title type="plain"><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A new phishing campaign is exploiting Microsoft’s legacy ADFS identity solution to steal credentials and bypass MFA ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/afds-phishing-campaign-microsoft</link>
                                                                            <description>
                            <![CDATA[ Researchers at Abnormal Security have warned of a new phishing campaign targeting Microsoft's Active Directory Federation Services (ADFS) secure access system. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jWz79Zqfqo8QtneD9UTang</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/AyCxLdc2QUT4hxMUVAZoBW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 04 Feb 2025 11:00:20 +0000</pubDate>                                                                                                                                <updated>Tue, 04 Feb 2025 14:50:43 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/AyCxLdc2QUT4hxMUVAZoBW-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Blue fingerprint with labels on digital background]]></media:description>                                                            <media:text><![CDATA[Blue fingerprint with labels on digital background]]></media:text>
                                <media:title type="plain"><![CDATA[Blue fingerprint with labels on digital background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/AyCxLdc2QUT4hxMUVAZoBW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Phishing campaign targets developers with fake CrowdStrike job offers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing-campaign-targets-developers-with-fake-crowdstrike-job-offers</link>
                                                                            <description>
                            <![CDATA[ Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8KsJD5vq3ieSnxtDxoyEVP</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/p6mimCvEVhrkHzupt2m8sc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 13 Jan 2025 12:51:17 +0000</pubDate>                                                                                                                                <updated>Tue, 14 Jan 2025 16:40:07 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/p6mimCvEVhrkHzupt2m8sc-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Envelope with job offer on the laptop screen. Workplace in office. Vector flat graphic.]]></media:description>                                                            <media:text><![CDATA[Envelope with job offer on the laptop screen. Workplace in office. Vector flat graphic.]]></media:text>
                                <media:title type="plain"><![CDATA[Envelope with job offer on the laptop screen. Workplace in office. Vector flat graphic.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/p6mimCvEVhrkHzupt2m8sc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are stepping up ‘qishing’ attacks by hiding malicious QR codes in PDF email attachments ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hackers-are-stepping-up-qishing-attacks-by-hiding-malicious-qr-codes-in-pdf-email-attachments</link>
                                                                            <description>
                            <![CDATA[ Malicious QR codes hidden in email attachments may be missed by traditional email security scanners, with over 500,000 qishing attacks launched in the last three months. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Py9zQTLHsCnbmaaYGQsucc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/VLiKbabtA65uHxV6axAJs8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 23 Oct 2024 04:00:00 +0000</pubDate>                                                                                                                                <updated>Wed, 23 Oct 2024 14:10:44 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/VLiKbabtA65uHxV6axAJs8-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Yellow QR code floating above smartphone screen on a green code terminal background]]></media:description>                                                            <media:text><![CDATA[Yellow QR code floating above smartphone screen on a green code terminal background]]></media:text>
                                <media:title type="plain"><![CDATA[Yellow QR code floating above smartphone screen on a green code terminal background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/VLiKbabtA65uHxV6axAJs8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ How hackers are using legitimate tools to distribute phishing links ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/how-hackers-are-using-legitimate-tools-to-distribute-phishing-links</link>
                                                                            <description>
                            <![CDATA[ Research indicates 2024 has ushered in a new era of phishing where threat actors have become increasingly adept at concealing their malicious links ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">XJ2DnK6PhKf5f66vjjwyTA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dhasVosU9LHYqxVocXyHuX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 19 Sep 2024 11:08:15 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dhasVosU9LHYqxVocXyHuX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A hand hovering over a keyboard]]></media:description>                                                            <media:text><![CDATA[A hand hovering over a keyboard]]></media:text>
                                <media:title type="plain"><![CDATA[A hand hovering over a keyboard]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dhasVosU9LHYqxVocXyHuX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Why social engineering is such a problem and how your business can protect itself ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/why-social-engineering-is-such-a-problem-and-how-your-business-can-protect-itself</link>
                                                                            <description>
                            <![CDATA[ Hackers are continually diversifying their social engineering techniques to take advantage of human error, but leaders can fight back with new tech and focused training ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">98L7Hd6asxLUn95enTmMb9</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/BXqo2imx3zRzHUYHQUT3Un-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 29 Feb 2024 14:35:00 +0000</pubDate>                                                                                                                                <updated>Fri, 01 Mar 2024 11:18:01 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Jonathan Weinberg ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/BXqo2imx3zRzHUYHQUT3Un-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An abstract picture showing a rectangle log-in form skewered by a fishing hook on a bright blue background]]></media:description>                                                            <media:text><![CDATA[An abstract picture showing a rectangle log-in form skewered by a fishing hook on a bright blue background]]></media:text>
                                <media:title type="plain"><![CDATA[An abstract picture showing a rectangle log-in form skewered by a fishing hook on a bright blue background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/BXqo2imx3zRzHUYHQUT3Un-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Salesforce-based phishing attacks surge 109% since the start of 2024 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/salesforce-based-phishing-attacks-surge-109-since-the-start-of-2024</link>
                                                                            <description>
                            <![CDATA[ Threat analysts have uncovered a sophisticated phishing attack imitating emails from Salesforce that are likely bypassing many business email filters ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">JSjjBpLzJekqHoY6s4JkKZ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/AZaB5VNgrN4tQP3n9GUw5B-1280-80.jpeg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 30 Jan 2024 13:26:32 +0000</pubDate>                                                                                                                                <updated>Thu, 08 Feb 2024 18:17:55 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/AZaB5VNgrN4tQP3n9GUw5B-1280-80.jpeg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Salesforce logo above &#039;the future of productivity&#039; slogan]]></media:description>                                                            <media:text><![CDATA[Salesforce logo above &#039;the future of productivity&#039; slogan]]></media:text>
                                <media:title type="plain"><![CDATA[Salesforce logo above &#039;the future of productivity&#039; slogan]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/AZaB5VNgrN4tQP3n9GUw5B-1280-80.jpeg" />
                                                                                        </item>
            </channel>
</rss>