<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/feeds/tag/ransomware" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro in Ransomware ]]></title>
                <link>https://www.itpro.com/security/ransomware</link>
        <description><![CDATA[ All the latest ransomware content from the ITPro team ]]></description>
                                    <lastBuildDate>Fri, 24 Apr 2026 11:19:06 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/threat-actors-ditch-spray-and-pray-attacks-in-shift-to-targeted-exploitation</link>
                                                                            <description>
                            <![CDATA[ A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">aXZoaaEbmpsecTfCYFaZAL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 24 Apr 2026 11:19:06 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:description>                                                            <media:text><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:text>
                                <media:title type="plain"><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security leaders overconfident about ransomware recovery ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/security-leaders-overconfident-about-ransomware-recovery</link>
                                                                            <description>
                            <![CDATA[ Few manage to recover all their data, and many experience business disruption ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">bV89CY9avfhwgcdKxFmGWV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Apr 2026 12:21:24 +0000</pubDate>                                                                                                                                <updated>Wed, 15 Apr 2026 13:30:22 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ German authorities want your help finding the hackers behind GandCrab and REvil  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/german-authorities-want-your-help-finding-the-hackers-behind-gandcrab-and-revil</link>
                                                                            <description>
                            <![CDATA[ Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fdDCDsuwTqeNGjcqnLSn5n</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 07 Apr 2026 11:12:24 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AutoCAD Users may have a ransomware problem – here's what they can do ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/autocad-users-may-have-a-ransomware-problem</link>
                                                                            <description>
                            <![CDATA[ A new malware family is currently using the same file types as the professional design software AutoCAD ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">B4u6c4kfpJkgcBqC3vih2Y</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WxPq27FQZr4afzJkQmv5FW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Mar 2026 19:00:22 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Peter Ray Allison ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/WxPq27FQZr4afzJkQmv5FW-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A CGI image of glowing blocks with padlocks on them, to represent ransomware.]]></media:description>                                                            <media:text><![CDATA[A CGI image of glowing blocks with padlocks on them, to represent ransomware.]]></media:text>
                                <media:title type="plain"><![CDATA[A CGI image of glowing blocks with padlocks on them, to represent ransomware.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WxPq27FQZr4afzJkQmv5FW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The rise of teen hackers ‘makes for a good headline’, but cyber crime activities peak later in life ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/the-rise-of-teen-hackers-makes-for-a-good-headline-but-cyber-crime-activities-peak-later-in-life</link>
                                                                            <description>
                            <![CDATA[ With family responsibilities and mortgages to pay, it's not teenagers dishing out malware or carrying out cyber extortion ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">AixB4pKPDWgHro8HrA47Jg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 11 Mar 2026 10:56:05 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ransomware protection for all: How consumption-based subscription models can lower the entry point for cyber resilience ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/ransomware-protection-for-all-how-consumption-based-subscription-models-can-lower-the-entry-point-for-cyber-resilience</link>
                                                                            <description>
                            <![CDATA[ Consumption-based immutable backup makes enterprise-grade ransomware resilience affordable to all ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ATGHvAADU6C5qmh3hGqVDZ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 18 Feb 2026 08:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Pete Hannah ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ransomware gangs are using employee monitoring software as a springboard for cyber attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware-gangs-are-using-employee-monitoring-software-as-a-springboard-for-cyber-attacks</link>
                                                                            <description>
                            <![CDATA[ Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">UxUKdS2z5Viemd7oCX52w4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 16 Feb 2026 11:10:15 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:description>                                                            <media:text><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoing ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/ransomware-gangs-are-sharing-virtual-machines-to-wage-cyber-attacks-on-the-cheap-but-it-could-be-their-undoing</link>
                                                                            <description>
                            <![CDATA[ Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zLwJpcY9ZvURVNVFjzut46</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 05 Feb 2026 10:20:10 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google issues warning over ShinyHunters-branded vishing campaigns ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/google-issues-warning-over-shinyhunters-branded-vishing-campaigns</link>
                                                                            <description>
                            <![CDATA[ Related groups are stealing data through voice phishing  and fake credential harvesting websites ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zHr8MESTqLrM7FdPM6unGB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 04 Feb 2026 08:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:description>                                                            <media:text><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:text>
                                <media:title type="plain"><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwise ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/the-fbi-has-seized-the-ramp-hacking-forum-but-will-the-takedown-stick-history-tells-us-otherwise</link>
                                                                            <description>
                            <![CDATA[ Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9MuHqZhvZQ6Bwhq8kvCxDk</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RSjE8LWxBzgjnadXPUW8mB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 30 Jan 2026 10:56:12 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RSjE8LWxBzgjnadXPUW8mB-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing a silhouetted person in a black hat with binary code in background. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing a silhouetted person in a black hat with binary code in background. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing a silhouetted person in a black hat with binary code in background. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RSjE8LWxBzgjnadXPUW8mB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Everything we know so far about the Nike data breach ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/everything-we-know-so-far-about-the-nike-data-breach</link>
                                                                            <description>
                            <![CDATA[ Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">RQPiXZQAgvbMN6mcFnWGYm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/hKDg9HJeNfft4roCAaoUod-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 27 Jan 2026 14:52:54 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/hKDg9HJeNfft4roCAaoUod-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Nike tick logo pictured on a storefront sign in San Francisco, USA.]]></media:description>                                                            <media:text><![CDATA[Nike tick logo pictured on a storefront sign in San Francisco, USA.]]></media:text>
                                <media:title type="plain"><![CDATA[Nike tick logo pictured on a storefront sign in San Francisco, USA.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/hKDg9HJeNfft4roCAaoUod-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ransomware is on the rise. Again ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/ransomware-is-on-the-rise-again</link>
                                                                            <description>
                            <![CDATA[ Ransomware resurges with AI-driven sophistication, challenging defenders and creating opportunities for MSPs ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Tvk7bXaN9woWdpj6YntSXc</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2rdWoqNdk32nyzW9Qqq4GN-1280-80.jpeg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 21 Jan 2026 08:00:00 +0000</pubDate>                                                                                                                                <updated>Mon, 26 Jan 2026 13:26:18 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Daniel Blank ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/2rdWoqNdk32nyzW9Qqq4GN-1280-80.jpeg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Circuit board with word ransomware lit up in neon red]]></media:description>                                                            <media:text><![CDATA[Circuit board with word ransomware lit up in neon red]]></media:text>
                                <media:title type="plain"><![CDATA[Circuit board with word ransomware lit up in neon red]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2rdWoqNdk32nyzW9Qqq4GN-1280-80.jpeg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ There’s a dangerous new ransomware variant on the block – and cyber experts warn it’s flying under the radar ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/deadlock-ransomware-polygon-smart-contract-abuse</link>
                                                                            <description>
                            <![CDATA[ The new DeadLock ransomware family is taking off in the wild, researchers warn ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">m57Hg7V7mpV9CyhGdcTjwC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 14 Jan 2026 11:29:39 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hacker offering US engineering firm data online after alleged breach ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/hacker-offering-us-engineering-firm-data-online-after-alleged-breach</link>
                                                                            <description>
                            <![CDATA[ Data relating to Tampa Electric Company, Duke Energy Florida, and American Electric Power was allegedly stolen ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jh9aTUhGsytBhJ5PDe8U6k</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dyefxvMjRzV26cLHKKchw3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 07 Jan 2026 14:15:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dyefxvMjRzV26cLHKKchw3-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a yellow-colored alert symbol pictured against a jet black background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a yellow-colored alert symbol pictured against a jet black background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a yellow-colored alert symbol pictured against a jet black background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dyefxvMjRzV26cLHKKchw3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cybersecurity experts face 20 years in prison following ransomware campaign ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/cybersecurity-experts-face-20-years-in-prison-following-ransomware-campaign</link>
                                                                            <description>
                            <![CDATA[ Two men used their tech expertise to carry out ALPHV BlackCat ransomware attacks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">YwMMNB6gfVuwvTVR73aFEU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 02 Jan 2026 14:16:08 +0000</pubDate>                                                                                                                                <updated>Mon, 05 Jan 2026 09:09:08 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:description>                                                            <media:text><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:text>
                                <media:title type="plain"><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 15-year-old revealed as key player in Scattered LAPSUS$ Hunters ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/15-year-old-revealed-as-key-player-in-scattered-lapsus-usd-hunters</link>
                                                                            <description>
                            <![CDATA[ 'Rey' says he's trying to leave Scattered LAPSUS$ Hunters and is prepared to cooperate with law enforcement ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zBxmT5CgDixJiMrXLmNAZf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9AjMFuVUqXnko5FNhrMuKC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 28 Nov 2025 13:23:42 +0000</pubDate>                                                                                                                                <updated>Fri, 28 Nov 2025 13:28:57 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/9AjMFuVUqXnko5FNhrMuKC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing young man with hood covering face typing on a keyboard in a dark room.]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing young man with hood covering face typing on a keyboard in a dark room.]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing young man with hood covering face typing on a keyboard in a dark room.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9AjMFuVUqXnko5FNhrMuKC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The Scattered Lapsus$ Hunters group is targeting Zendesk customers – here’s what you need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/the-scattered-lapsus-usd-hunters-group-is-targeting-zendesk-customers-heres-what-you-need-to-know</link>
                                                                            <description>
                            <![CDATA[ The group appears to be infecting support and help-desk personnel with remote access trojans and other forms of malware ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">yA82eDy5m43beT5ptyrzhG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/KfsCD25eUDMdmZevdnb6rU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 27 Nov 2025 11:45:15 +0000</pubDate>                                                                                                                                <updated>Thu, 27 Nov 2025 11:46:02 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/KfsCD25eUDMdmZevdnb6rU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Zendesk logo and branding pictured on a smartphone screen. ]]></media:description>                                                            <media:text><![CDATA[Zendesk logo and branding pictured on a smartphone screen. ]]></media:text>
                                <media:title type="plain"><![CDATA[Zendesk logo and branding pictured on a smartphone screen. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/KfsCD25eUDMdmZevdnb6rU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Impact of Asahi cyber attack laid bare as company confirms 1.5 million customers exposed ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/impact-of-asahi-cyber-attack-laid-bare-as-company-confirms-1-5-million-customers-exposed</link>
                                                                            <description>
                            <![CDATA[ No ransom has been paid, said president and group CEO Atsushi Katsuki, and the company is restoring its systems ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">XcX6ActjP2bh9LDh65xnZR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/aDBAN7h4XVnMEMPqko7mef-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 27 Nov 2025 10:50:40 +0000</pubDate>                                                                                                                                <updated>Thu, 27 Nov 2025 15:00:21 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/aDBAN7h4XVnMEMPqko7mef-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Asahi logo pictured outside the Asahi Kanagawa Brewery in Minamiashigara, Kanagawa, Japan.]]></media:description>                                                            <media:text><![CDATA[Asahi logo pictured outside the Asahi Kanagawa Brewery in Minamiashigara, Kanagawa, Japan.]]></media:text>
                                <media:title type="plain"><![CDATA[Asahi logo pictured outside the Asahi Kanagawa Brewery in Minamiashigara, Kanagawa, Japan.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/aDBAN7h4XVnMEMPqko7mef-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The US, UK, and Australia just imposed sanctions on a Russian cyber crime group – 'we are exposing their dark networks and going after those responsible' ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/the-us-uk-and-australia-just-imposed-sanctions-on-a-russian-cyber-crime-group-we-are-exposing-their-dark-networks-and-going-after-those-responsible</link>
                                                                            <description>
                            <![CDATA[ Media Land offers 'bulletproof' hosting services used for ransomware and DDoS attacks around the world ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jbcE8oNisiHJvQRxooNzLU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Aqeo3GHF5pnDS754K9ahY5-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 20 Nov 2025 10:55:00 +0000</pubDate>                                                                                                                                <updated>Fri, 21 Nov 2025 08:31:54 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Aqeo3GHF5pnDS754K9ahY5-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Russian cyber crime concept image showing Russian national flag with padlock symbol in background with smashed glass in foreground.]]></media:description>                                                            <media:text><![CDATA[Russian cyber crime concept image showing Russian national flag with padlock symbol in background with smashed glass in foreground.]]></media:text>
                                <media:title type="plain"><![CDATA[Russian cyber crime concept image showing Russian national flag with padlock symbol in background with smashed glass in foreground.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Aqeo3GHF5pnDS754K9ahY5-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ How the channel weakened ransomware’s grip ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/how-the-channel-weakened-ransomwares-grip</link>
                                                                            <description>
                            <![CDATA[ What tools and techniques are empowering businesses to say no to ransomware demands? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">aR9V72zDf6FWC2WqbHqAEg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2rdWoqNdk32nyzW9Qqq4GN-1280-80.jpeg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 06 Nov 2025 08:00:00 +0000</pubDate>                                                                                                                                <updated>Mon, 10 Nov 2025 12:38:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ James Watts ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/2rdWoqNdk32nyzW9Qqq4GN-1280-80.jpeg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Circuit board with word ransomware lit up in neon red]]></media:description>                                                            <media:text><![CDATA[Circuit board with word ransomware lit up in neon red]]></media:text>
                                <media:title type="plain"><![CDATA[Circuit board with word ransomware lit up in neon red]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2rdWoqNdk32nyzW9Qqq4GN-1280-80.jpeg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A notorious ransomware group is spreading fake Microsoft Teams ads to snare victims ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/a-notorious-ransomware-group-is-spreading-fake-microsoft-teams-ads-to-snare-victims</link>
                                                                            <description>
                            <![CDATA[ The Rhysida ransomware group is leveraging Trusted Signing from Microsoft to lend plausibility to its activities ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ypMyi8ZbGGmjf5agPHZQnD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/G9Dv79E7SBGG2hp8n8G7Dc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 04 Nov 2025 16:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/G9Dv79E7SBGG2hp8n8G7Dc-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft Teams app for macOS pictured on a MacBook device screen.]]></media:description>                                                            <media:text><![CDATA[Microsoft Teams app for macOS pictured on a MacBook device screen.]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft Teams app for macOS pictured on a MacBook device screen.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/G9Dv79E7SBGG2hp8n8G7Dc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Volkswagen confirms security ‘incident’ amid ransomware breach claims ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/volkswagen-cyber-attack-8base-ransomware-claims</link>
                                                                            <description>
                            <![CDATA[ Volkswagen has confirmed a security "incident" has occurred, but insists no IT systems have been compromised. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">XRX7HPdNZK5eDAWQdecV9V</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/CozKDyii8Kdz9mfKxVUFbe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 21 Oct 2025 11:27:22 +0000</pubDate>                                                                                                                                <updated>Tue, 21 Oct 2025 11:58:54 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/CozKDyii8Kdz9mfKxVUFbe-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Volkswagen vehicles lined up in a parking lot with company logo and branding pictured on side of an assembly plant in background.]]></media:description>                                                            <media:text><![CDATA[Volkswagen vehicles lined up in a parking lot with company logo and branding pictured on side of an assembly plant in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Volkswagen vehicles lined up in a parking lot with company logo and branding pictured on side of an assembly plant in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/CozKDyii8Kdz9mfKxVUFbe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The number of ransomware groups rockets as new, smaller players emerge ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/rocketing-number-of-ransomware-groups-as-new-smaller-players-emerge</link>
                                                                            <description>
                            <![CDATA[ The good news is that the number of victims remains steady ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">H4qEvfnxsmEgU7PeYnDgEQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iYfDDDfVYNFEDBMdcZc62A-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Oct 2025 09:50:58 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Oct 2025 14:28:05 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iYfDDDfVYNFEDBMdcZc62A-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A glowing blue padlock with coiled red CGI data around it, representing new ransomware.]]></media:description>                                                            <media:text><![CDATA[A glowing blue padlock with coiled red CGI data around it, representing new ransomware.]]></media:text>
                                <media:title type="plain"><![CDATA[A glowing blue padlock with coiled red CGI data around it, representing new ransomware.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iYfDDDfVYNFEDBMdcZc62A-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Teens arrested over nursery chain Kido hack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/teens-arrested-over-nursery-chain-kido-hack</link>
                                                                            <description>
                            <![CDATA[ The ransom attack caused widespread shock when the hackers published children's personal data ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">NZySYFBmCJT4WCQP2XpEUN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mDacFVas65bAq7oWUcrkNg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 08 Oct 2025 10:02:14 +0000</pubDate>                                                                                                                                <updated>Wed, 08 Oct 2025 10:55:46 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mDacFVas65bAq7oWUcrkNg-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A child in a nursery ]]></media:description>                                                            <media:text><![CDATA[A child in a nursery ]]></media:text>
                                <media:title type="plain"><![CDATA[A child in a nursery ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mDacFVas65bAq7oWUcrkNg-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCA confirms arrest after airport cyber disruption ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/nca-confirms-arrest-after-airport-cyber-disruption</link>
                                                                            <description>
                            <![CDATA[ Disruption is easing across Europe following the ransomware incident ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">kWCwnrAH3rkHjFhYnwfMDX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/rcgqGm2k9qbr9K4kHhEmvU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 25 Sep 2025 09:25:43 +0000</pubDate>                                                                                                                                <updated>Thu, 25 Sep 2025 09:26:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/rcgqGm2k9qbr9K4kHhEmvU-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An abstract image showing a skull over a pixelated background to symbolise a cyber security vulnerability]]></media:description>                                                            <media:text><![CDATA[An abstract image showing a skull over a pixelated background to symbolise a cyber security vulnerability]]></media:text>
                                <media:title type="plain"><![CDATA[An abstract image showing a skull over a pixelated background to symbolise a cyber security vulnerability]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/rcgqGm2k9qbr9K4kHhEmvU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The top ransomware trends for businesses in 2025 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/the-top-ransomware-trends-for-businesses</link>
                                                                            <description>
                            <![CDATA[ A splintering of top groups and changing attitudes toward payments are changing attacker tactics at speed ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">2qVHE7oah2J55wxJZhXQ4n</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/e6zeYCopy4dSbbjb6kpzhi-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 18 Sep 2025 16:34:12 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/e6zeYCopy4dSbbjb6kpzhi-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Gold lock floating above a digitally rendered motherboard with blue and red glowing hues, denoting ransomware]]></media:description>                                                            <media:text><![CDATA[Gold lock floating above a digitally rendered motherboard with blue and red glowing hues, denoting ransomware]]></media:text>
                                <media:title type="plain"><![CDATA[Gold lock floating above a digitally rendered motherboard with blue and red glowing hues, denoting ransomware]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/e6zeYCopy4dSbbjb6kpzhi-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cyber professionals are losing sleep over late night attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-professionals-are-losing-sleep-over-late-night-attacks</link>
                                                                            <description>
                            <![CDATA[ Hackers are biding their time and launching attacks when businesses can’t respond ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">6MRfyAm2iFivsrNHEtUsjP</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9ZT5mU7YeSN7Bg7YHh2LxX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 18 Sep 2025 10:15:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/9ZT5mU7YeSN7Bg7YHh2LxX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Female software developer coding in dark room with screen reflecting on glasses.]]></media:description>                                                            <media:text><![CDATA[Female software developer coding in dark room with screen reflecting on glasses.]]></media:text>
                                <media:title type="plain"><![CDATA[Female software developer coding in dark room with screen reflecting on glasses.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9ZT5mU7YeSN7Bg7YHh2LxX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Prolific ransomware operator added to Europe’s Most Wanted list as US dangles $10 million reward ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/prolific-ransomware-operator-added-to-europes-most-wanted-list-as-us-dangles-usd10-million-reward</link>
                                                                            <description>
                            <![CDATA[ The US Department of Justice is offering a reward of up to $10 million for information leading to the arrest of Volodymyr Viktorovych Tymoshchuk, an alleged ransomware criminal. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">7Yemh7hwZhfC2bJ9cqNknY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mPh3wnjLq4AYLuZzD9ZuN7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 10 Sep 2025 10:17:34 +0000</pubDate>                                                                                                                                <updated>Wed, 10 Sep 2025 10:18:06 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mPh3wnjLq4AYLuZzD9ZuN7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Police mugshot concept image showing silhouette of a man with back to wall.]]></media:description>                                                            <media:text><![CDATA[Police mugshot concept image showing silhouette of a man with back to wall.]]></media:text>
                                <media:title type="plain"><![CDATA[Police mugshot concept image showing silhouette of a man with back to wall.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mPh3wnjLq4AYLuZzD9ZuN7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Jaguar Land Rover “did the right thing” shutting down systems to thwart cyber attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/jaguar-land-rover-did-the-right-thing-shutting-down-systems-to-thwart-cyber-attack</link>
                                                                            <description>
                            <![CDATA[ The attack on Jaguar Land Rover highlights the growing attractiveness of the automotive sector ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">D57UajELbiS6N9VR6p5zoH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9pwYva8LtuzWuM93eM7TCd-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 03 Sep 2025 10:14:36 +0000</pubDate>                                                                                                                                <updated>Wed, 03 Sep 2025 10:15:07 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/9pwYva8LtuzWuM93eM7TCd-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Jaguar Land Rover dealership with Jaguar and Land Rover logos pictured on a sign. ]]></media:description>                                                            <media:text><![CDATA[Jaguar Land Rover dealership with Jaguar and Land Rover logos pictured on a sign. ]]></media:text>
                                <media:title type="plain"><![CDATA[Jaguar Land Rover dealership with Jaguar and Land Rover logos pictured on a sign. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9pwYva8LtuzWuM93eM7TCd-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ransomware attack on IT supplier disrupts hundreds of Swedish municipalities ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/ransomware-attack-on-it-supplier-disrupts-hundreds-of-swedish-municipalities</link>
                                                                            <description>
                            <![CDATA[ The attack on IT systems supplier Miljödata has impacted public sector services across the country ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">QgB2y2LYqEb9N6S88Y8euB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iLRESJd4Q6KcThu2x6AsoQ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 01 Sep 2025 09:38:52 +0000</pubDate>                                                                                                                                <updated>Mon, 01 Sep 2025 13:30:59 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iLRESJd4Q6KcThu2x6AsoQ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Flag of Sweden flying in the wind with blue skies and light clouds in background.]]></media:description>                                                            <media:text><![CDATA[Flag of Sweden flying in the wind with blue skies and light clouds in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Flag of Sweden flying in the wind with blue skies and light clouds in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iLRESJd4Q6KcThu2x6AsoQ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ransomware payments are banned in the public sector: should businesses still pay? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/ransomware-payments-are-banned-in-the-public-sector-should-businesses-still-pay</link>
                                                                            <description>
                            <![CDATA[ The UK government is introducing a ban on ransomware payments for the public sector and critical national infrastructure –  but will there could be unintended consequences ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eNhVRYYSFLfX22VhbcYfF8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/M52ds9wEZCmgUf2Bzb8fkM-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Fri, 29 Aug 2025 09:50:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Stephen Pritchard ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/M52ds9wEZCmgUf2Bzb8fkM-1280-80.png">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A black and white hand holding a drawing of a white, square-handled key. Instead of teeth, the key has the number &quot;10110&quot; representing binary code and encryption. The hand and key are set against a solid blue background.]]></media:description>                                                            <media:text><![CDATA[A black and white hand holding a drawing of a white, square-handled key. Instead of teeth, the key has the number &quot;10110&quot; representing binary code and encryption. The hand and key are set against a solid blue background.]]></media:text>
                                <media:title type="plain"><![CDATA[A black and white hand holding a drawing of a white, square-handled key. Instead of teeth, the key has the number &quot;10110&quot; representing binary code and encryption. The hand and key are set against a solid blue background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/M52ds9wEZCmgUf2Bzb8fkM-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A notorious hacker group is ramping up cloud-based ransomware attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/a-notorious-hacker-group-is-ramping-up-cloud-based-ransomware-attacks</link>
                                                                            <description>
                            <![CDATA[ The Storm-0501 threat group is refining its tactics, according to Microsoft, shifting away from traditional endpoint-based attacks and toward cloud-based ransomware. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3TKoyoPGVcaX3oUU6yqhgG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 28 Aug 2025 11:20:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security researchers have just identified what could be the first ‘AI-powered’ ransomware strain – and it uses OpenAI’s gpt-oss-20b model ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/security-researchers-have-just-identified-what-could-be-the-first-ai-powered-ransomware-strain-and-it-uses-openais-gpt-oss-20b-model</link>
                                                                            <description>
                            <![CDATA[ Using OpenAI's gpt-oss:20b model, ‘PromptLock’ generates malicious Lua scripts via the Ollama API. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">pyVt8viTWFAveREZ3Qjvjf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 27 Aug 2025 10:14:24 +0000</pubDate>                                                                                                                                <updated>Wed, 27 Aug 2025 10:14:53 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:description>                                                            <media:text><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:text>
                                <media:title type="plain"><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Data I/O shuts down systems in wake of ransomware attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/data-i-o-shuts-down-systems-in-wake-of-ransomware-attack</link>
                                                                            <description>
                            <![CDATA[ Regulatory filings by Data I/O suggest the costs of dealing with the attack could be significant ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qnyyeWtzpti4PvLnbXy7AJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 26 Aug 2025 09:39:13 +0000</pubDate>                                                                                                                                <updated>Tue, 26 Aug 2025 09:39:42 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Average ransom payment doubles in a single quarter  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/average-ransom-payment-doubles-in-a-single-quarter</link>
                                                                            <description>
                            <![CDATA[ Targeted social engineering and data exfiltration have become the biggest tactics as three major ransomware groups dominate ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sNHZRNKdk9gF3ueWkzroKQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dyefxvMjRzV26cLHKKchw3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 14 Aug 2025 07:30:00 +0000</pubDate>                                                                                                                                <updated>Thu, 14 Aug 2025 09:21:28 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dyefxvMjRzV26cLHKKchw3-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a yellow-colored alert symbol pictured against a jet black background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a yellow-colored alert symbol pictured against a jet black background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a yellow-colored alert symbol pictured against a jet black background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dyefxvMjRzV26cLHKKchw3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ BlackSuit ransomware gang taken down in latest law enforcement sting – but members have already formed a new group  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/blacksuit-ransomware-gang-taken-down-in-latest-law-enforcement-operation-but-members-have-already-formed-a-new-group</link>
                                                                            <description>
                            <![CDATA[ The notorious gang has seen its servers taken down and bitcoin seized, but may have morphed into a new group called Chaos ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">gfn9EWomo5iXhUAEVfVGka</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mJfYyZvh8k5gkrArFsfHiX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 13 Aug 2025 09:59:37 +0000</pubDate>                                                                                                                                <updated>Wed, 13 Aug 2025 10:01:59 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mJfYyZvh8k5gkrArFsfHiX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing skull and cross bones on a computer chip sitting on a circuit board.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing skull and cross bones on a computer chip sitting on a circuit board.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing skull and cross bones on a computer chip sitting on a circuit board.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mJfYyZvh8k5gkrArFsfHiX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ MSPs beware – these two ransomware groups are ramping up attacks and have claimed hundreds of victims ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/msps-beware-these-two-ransomware-groups-are-ramping-up-attacks-and-have-claimed-hundreds-of-victims</link>
                                                                            <description>
                            <![CDATA[ The Akira and Lynx ransomware groups are focusing on small businesses and MSPs using stolen or purchased admin credentials ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">iYKGuHwcAdM99gzoZEaQbB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 12 Aug 2025 10:30:25 +0000</pubDate>                                                                                                                                <updated>Tue, 12 Aug 2025 19:34:37 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google cyber researchers were tracking the ShinyHunters group’s Salesforce attacks – then realized they’d also fallen victim ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/google-cyber-researchers-were-tracking-the-shinyhunters-groups-salesforce-attacks-then-realized-theyd-fallen-victim</link>
                                                                            <description>
                            <![CDATA[ In an update to an investigation on the ShinyHunters group, Google revealed it had also been affected ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">PsyEru2dq69wS89exzDHEB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RZ7UvjBTtZr8WMgy6yjh96-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 07 Aug 2025 08:34:13 +0000</pubDate>                                                                                                                                <updated>Thu, 07 Aug 2025 08:43:48 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RZ7UvjBTtZr8WMgy6yjh96-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Google logo pictured above the entrance to the company&#039;s King&#039;s Cross office in London, UK. ]]></media:description>                                                            <media:text><![CDATA[Google logo pictured above the entrance to the company&#039;s King&#039;s Cross office in London, UK. ]]></media:text>
                                <media:title type="plain"><![CDATA[Google logo pictured above the entrance to the company&#039;s King&#039;s Cross office in London, UK. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RZ7UvjBTtZr8WMgy6yjh96-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Nearly one-third of ransomware victims are hit multiple times, even after paying hackers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/nearly-one-third-of-ransomware-victims-are-hit-multiple-times-even-after-paying-up-to-hackers</link>
                                                                            <description>
                            <![CDATA[ Many ransomware victims are being hit more than once, largely thanks to fragmented security tactics ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">2up8JpF5uyEG7pPZdQW5PF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/bBfHCREVCzyehuRCbKWheD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 06 Aug 2025 11:03:09 +0000</pubDate>                                                                                                                                <updated>Wed, 06 Aug 2025 11:53:05 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/bBfHCREVCzyehuRCbKWheD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing digitized padlock pictured on a laptop screen on red background]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing digitized padlock pictured on a laptop screen on red background]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing digitized padlock pictured on a laptop screen on red background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/bBfHCREVCzyehuRCbKWheD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 75% of UK business leaders are willing to risk criminal penalties to pay ransoms ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/75-percent-of-uk-business-leaders-are-willing-to-risk-criminal-penalties-to-pay-ransoms</link>
                                                                            <description>
                            <![CDATA[ A ransom payment ban is a great idea - until you're the one being targeted... ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">GABuJs7zEFaxkHGcZJmRo4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/hm7qyYp9PbhjVaXbk3hMkE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 04 Aug 2025 09:55:03 +0000</pubDate>                                                                                                                                <updated>Mon, 04 Aug 2025 10:19:40 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/hm7qyYp9PbhjVaXbk3hMkE-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware criminal concept image showing hacker in a hooded top working on a laptop in a dark room.]]></media:description>                                                            <media:text><![CDATA[Ransomware criminal concept image showing hacker in a hooded top working on a laptop in a dark room.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware criminal concept image showing hacker in a hooded top working on a laptop in a dark room.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/hm7qyYp9PbhjVaXbk3hMkE-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The Scattered Spider ransomware group is infiltrating Slack and Microsoft Teams to target vulnerable employees ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/the-scattered-spider-ransomware-group-is-infiltrating-slack-and-microsoft-teams-to-target-vulnerable-employees</link>
                                                                            <description>
                            <![CDATA[ The group is using new ransomware variants and new social engineering techniques - including sneaking into corporate teleconferences ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">TLzbaEokr9d7yfzVE4c5fP</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QagRwe2HUXfJ8yFu2Q7UQD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 30 Jul 2025 11:30:57 +0000</pubDate>                                                                                                                                <updated>Wed, 30 Jul 2025 11:31:15 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QagRwe2HUXfJ8yFu2Q7UQD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Scattered Spider cyber crime group concept image showing a robotic spider climbing up a web with glowing digital data points. ]]></media:description>                                                            <media:text><![CDATA[Scattered Spider cyber crime group concept image showing a robotic spider climbing up a web with glowing digital data points. ]]></media:text>
                                <media:title type="plain"><![CDATA[Scattered Spider cyber crime group concept image showing a robotic spider climbing up a web with glowing digital data points. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QagRwe2HUXfJ8yFu2Q7UQD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers breached a 158 year old company by guessing an employee password – experts say it’s a ‘pertinent reminder’ of the devastating impact of cyber crime ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hackers-breached-a-158-year-old-company-by-guessing-an-employee-password-experts-say-its-a-pertinent-reminder-of-the-devastating-impact-of-cyber-crime</link>
                                                                            <description>
                            <![CDATA[ A Panorama documentary exposed hackers' techniques and talked to the teams trying to tackle them ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Eyma7X3eTPRVZJwCzjCWQR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 28 Jul 2025 11:47:21 +0000</pubDate>                                                                                                                                <updated>Mon, 28 Jul 2025 11:47:42 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Can the UK ban ransomware payments? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/can-the-uk-ban-ransomware-payments</link>
                                                                            <description>
                            <![CDATA[ Attempts to cut off ransomware group profits could instead harm businesses ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">viEeLUGan7dWG4RE4MQkN7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/cHmzDg3BHekpRgvDeLcC3e-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 25 Jul 2025 14:58:04 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/cHmzDg3BHekpRgvDeLcC3e-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The text &quot;Can the UK ban ransomware payments?&quot; against an abstract background of a red circle on a blue gradient. The words &quot;ransomware payments&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro podcast is shown.]]></media:description>                                                            <media:text><![CDATA[The text &quot;Can the UK ban ransomware payments?&quot; against an abstract background of a red circle on a blue gradient. The words &quot;ransomware payments&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro podcast is shown.]]></media:text>
                                <media:title type="plain"><![CDATA[The text &quot;Can the UK ban ransomware payments?&quot; against an abstract background of a red circle on a blue gradient. The words &quot;ransomware payments&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro podcast is shown.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/cHmzDg3BHekpRgvDeLcC3e-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Interlock ransomware gang is ramping up activity, CISA warns ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/interlock-ransomware-gang-is-ramping-up-activity-cisa-warns</link>
                                                                            <description>
                            <![CDATA[ The threat group, which uses a double-extortion technique, has been attacking organizations across North America and Europe ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">KdKWbNZrAK3zEUkxGAji3V</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iYfDDDfVYNFEDBMdcZc62A-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 23 Jul 2025 12:34:49 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iYfDDDfVYNFEDBMdcZc62A-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A glowing blue padlock with coiled red CGI data around it, representing new ransomware.]]></media:description>                                                            <media:text><![CDATA[A glowing blue padlock with coiled red CGI data around it, representing new ransomware.]]></media:text>
                                <media:title type="plain"><![CDATA[A glowing blue padlock with coiled red CGI data around it, representing new ransomware.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iYfDDDfVYNFEDBMdcZc62A-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Nearly half of MSPs admit to having a ransomware kitty ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/nearly-half-of-msps-admit-to-having-a-ransomware-kitty</link>
                                                                            <description>
                            <![CDATA[ The firm’s annual MSP report highlights the mounting pressure on MSPs as attackers increasingly leverage the latest AI advancements ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">L2GvZCr5yXz6Mm8XRV6zC6</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 23 Jul 2025 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Daniel Todd) ]]></author>                    <dc:creator><![CDATA[ Daniel Todd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The ransomware boom shows no signs of letting up – and these groups are causing the most chaos ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/the-ransomware-boom-shows-no-signs-of-letting-up-and-these-groups-are-causing-the-most-chaos</link>
                                                                            <description>
                            <![CDATA[ Thousands of ransomware cases have already been posted on the dark web this year ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4MattisaTARV5LNqb6YqBC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/bBfHCREVCzyehuRCbKWheD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 14 Jul 2025 10:15:20 +0000</pubDate>                                                                                                                                <updated>Mon, 14 Jul 2025 11:01:29 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/bBfHCREVCzyehuRCbKWheD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing digitized padlock pictured on a laptop screen on red background]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing digitized padlock pictured on a laptop screen on red background]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing digitized padlock pictured on a laptop screen on red background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/bBfHCREVCzyehuRCbKWheD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ransomware attacks carry huge financial impacts – but CISO worries still aren’t stopping firms from paying out ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/ransomware-attacks-carry-huge-financial-impacts-but-ciso-worries-still-arent-stopping-firms-from-paying-out</link>
                                                                            <description>
                            <![CDATA[ Increased anxiety over ransomware links directly to its devastating impact on business processes and one’s bottom line ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">RAq5B84fFvQGGpTTAhqcFf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9s9AUXad7LHrtEdLWybwvE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 10 Jul 2025 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/9s9AUXad7LHrtEdLWybwvE-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a digitized padlock symbol placed on top of a digital interface, symbolizing locked files. ]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a digitized padlock symbol placed on top of a digital interface, symbolizing locked files. ]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a digitized padlock symbol placed on top of a digital interface, symbolizing locked files. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9s9AUXad7LHrtEdLWybwvE-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Everything we know about the Ingram Micro cyber attack so far ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/everything-we-know-about-the-ingram-micro-cyber-attack-so-far</link>
                                                                            <description>
                            <![CDATA[ A cyber attack on Ingram Micro severely disrupted operations and has been claimed by the SafePay ransomware group. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">bezVLzLuqnNaWhHAkNrsfV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mJfYyZvh8k5gkrArFsfHiX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 07 Jul 2025 10:03:14 +0000</pubDate>                                                                                                                                <updated>Mon, 07 Jul 2025 11:25:54 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mJfYyZvh8k5gkrArFsfHiX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing skull and cross bones on a computer chip sitting on a circuit board.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing skull and cross bones on a computer chip sitting on a circuit board.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing skull and cross bones on a computer chip sitting on a circuit board.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mJfYyZvh8k5gkrArFsfHiX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A prolific ransomware group says it’s shutting down and giving out free decryption keys to victims – but cyber experts warn it's not exactly a 'gesture of goodwill' ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/hunters-international-ransomware-shut-down</link>
                                                                            <description>
                            <![CDATA[ The Hunters International ransomware group is rebranding and switching tactics ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">UmY75KiocYa47WmtuR3wme</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 04 Jul 2025 09:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A major ransomware hosting provider just got hit US with sanctions ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/aeza-group-ransomware-hosting-us-sanctions</link>
                                                                            <description>
                            <![CDATA[ Aeza Group's services were being used for ransomware, infostealers, and disinformation ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">nPvsivzvTw7C3uPhwA6bDT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 03 Jul 2025 11:13:39 +0000</pubDate>                                                                                                                                <updated>Thu, 03 Jul 2025 11:13:54 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>