<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/feeds/tag/security" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro in Security ]]></title>
                <link>https://www.itpro.com</link>
         <description><![CDATA[ All the latest security content from the ITPro team ]]></description>
                                    <lastBuildDate>Fri, 06 Mar 2026 14:42:19 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ Organizations hit by 90 zero-day vulnerabilities last year ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/organizations-hit-by-90-zero-day-vulnerabilities-last-year</link>
                                                                            <description>
                            <![CDATA[ Google Threat Intelligence researchers warn that edge devices and security appliances are prime entry points ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">aBDtJP2N9WmFv6kdYih6RY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/fYKuh3bzyfULPuXQVcRyxK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 06 Mar 2026 14:42:19 +0000</pubDate>                                                                            <updated>Fri, 06 Mar 2026 14:42:20 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/fYKuh3bzyfULPuXQVcRyxK-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a skull superimposed over a digital interface with computer code in the background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a skull superimposed over a digital interface with computer code in the background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a skull superimposed over a digital interface with computer code in the background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/fYKuh3bzyfULPuXQVcRyxK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ FBI and Europol take down major data leak forum ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/fbi-and-europol-take-down-major-data-leak-forum</link>
                                                                            <description>
                            <![CDATA[ LeakBase enabled the sale and purchase of a huge amount of personal data and had more than 142,000 members ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">TYRPEayNdJ8ACHHZzSQkMm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/X8SLtm2YmMKNBeG8ZeCDXf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 06 Mar 2026 14:31:00 +0000</pubDate>                                                                            <updated>Fri, 06 Mar 2026 15:34:29 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/X8SLtm2YmMKNBeG8ZeCDXf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Europol logo and badge pictured on the exterior of the Europol headquarters in The Hague, Netherlands.]]></media:description>                                                            <media:text><![CDATA[Europol logo and badge pictured on the exterior of the Europol headquarters in The Hague, Netherlands.]]></media:text>
                                <media:title type="plain"><![CDATA[Europol logo and badge pictured on the exterior of the Europol headquarters in The Hague, Netherlands.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/X8SLtm2YmMKNBeG8ZeCDXf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ International Women’s Day 2026: why are there still so few women working in cybersecurity? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/why-are-there-still-so-few-women-working-in-cybersecurity</link>
                                                                            <description>
                            <![CDATA[ The figures show a stagnating number of women entering the cybersecurity industry: why is this, and what needs to be done to change? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zvKgP6m6gNMkqM7FxhaTi6</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/sMRSsQaLJNRC2rPrAKBjbM-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 06 Mar 2026 12:11:28 +0000</pubDate>                                                                            <updated>Fri, 06 Mar 2026 17:00:33 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/sMRSsQaLJNRC2rPrAKBjbM-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A photo of a woman in cybersecurity holding a tablet, surrounded by a dark cityscape lit with holographic data points.]]></media:description>                                                            <media:text><![CDATA[A photo of a woman in cybersecurity holding a tablet, surrounded by a dark cityscape lit with holographic data points.]]></media:text>
                                <media:title type="plain"><![CDATA[A photo of a woman in cybersecurity holding a tablet, surrounded by a dark cityscape lit with holographic data points.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/sMRSsQaLJNRC2rPrAKBjbM-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Law enforcement and security firms take down huge PhaaS platform ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/law-enforcement-and-security-firms-take-down-huge-phaas-platform</link>
                                                                            <description>
                            <![CDATA[ Tycoon 2FA has been responsible for tens of millions of phishing messages, reaching over 500,000 organizations each month worldwide ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tNhGfU3M78qDnNEoakTNaA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/HoZtCmwBXTjKRszdxC2LML-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 05 Mar 2026 11:52:32 +0000</pubDate>                                                                            <updated>Thu, 05 Mar 2026 11:52:33 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/HoZtCmwBXTjKRszdxC2LML-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Concept image of 2FA showing a man on a laptop using phone to authenticate login details.]]></media:description>                                                            <media:text><![CDATA[Concept image of 2FA showing a man on a laptop using phone to authenticate login details.]]></media:text>
                                <media:title type="plain"><![CDATA[Concept image of 2FA showing a man on a laptop using phone to authenticate login details.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/HoZtCmwBXTjKRszdxC2LML-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ LastPass issues alert as customers face second major phishing campaign of 2026 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/lastpass-issues-alert-as-customers-face-second-major-phishing-campaign-of-2026</link>
                                                                            <description>
                            <![CDATA[ The campaign is the third to hit LastPass users in six months ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MoCaRUcUDxBBuWzHCWEBw8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ocP3dX4tjhaXs2GSGBykGh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 04 Mar 2026 11:42:09 +0000</pubDate>                                                                            <updated>Wed, 04 Mar 2026 11:42:09 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ocP3dX4tjhaXs2GSGBykGh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[LastPass logo and branding reflected on the internal discs of a hard drive.]]></media:description>                                                            <media:text><![CDATA[LastPass logo and branding reflected on the internal discs of a hard drive.]]></media:text>
                                <media:title type="plain"><![CDATA[LastPass logo and branding reflected on the internal discs of a hard drive.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ocP3dX4tjhaXs2GSGBykGh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cloudflare warns state-backed hackers are ‘weaponizing legitimate enterprise ecosystems’ as ‘living off the land’ attacks surge ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/cloudflare-warns-state-backed-hackers-are-weaponizing-legitimate-enterprise-ecosystems-as-living-off-the-land-attacks-surge</link>
                                                                            <description>
                            <![CDATA[ Chinese, North Korean, and Russian-backed threat groups now favor longer-term compromises over brute force attacks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tDHyWXyTh5PSUqWYrFAqbV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 04 Mar 2026 09:23:15 +0000</pubDate>                                                                            <updated>Wed, 04 Mar 2026 09:23:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Flaw in Chrome’s Gemini Live gave attackers access to user cameras and microphones ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/flaw-in-chromes-gemini-live-gave-attackers-access-to-user-cameras-and-microphones</link>
                                                                            <description>
                            <![CDATA[ The in-browser AI assistant loads differently in the side panel, rather than a regular tab, exposing users to risks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">UdSTXkcBXzUKRPebieMZLA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/S6twCPTChD63x4UanBL4sJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 03 Mar 2026 10:55:13 +0000</pubDate>                                                                            <updated>Tue, 03 Mar 2026 10:55:14 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/S6twCPTChD63x4UanBL4sJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Google Chrome logo pictured on a smartphone screen placed on top of a desktop computer keyboard in a dimly lit room.]]></media:description>                                                            <media:text><![CDATA[Google Chrome logo pictured on a smartphone screen placed on top of a desktop computer keyboard in a dimly lit room.]]></media:text>
                                <media:title type="plain"><![CDATA[Google Chrome logo pictured on a smartphone screen placed on top of a desktop computer keyboard in a dimly lit room.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/S6twCPTChD63x4UanBL4sJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ DIY hackers are turning to ‘flat-pack’ malware components to speed up attacks and cut costs ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/diy-hackers-are-turning-to-flat-pack-malware-components-to-speed-up-attacks-and-cut-costs</link>
                                                                            <description>
                            <![CDATA[ While these malware campaigns are very basic, researchers noted “they still work” ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9micgTJB6ymCrHncsBFWMm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/oo8cMGiY5DwjHYxKQ8VLsB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 03 Mar 2026 09:00:00 +0000</pubDate>                                                                            <updated>Tue, 03 Mar 2026 11:24:46 +0000</updated>
                                                                                                                                            <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/oo8cMGiY5DwjHYxKQ8VLsB-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware vector image showing alert symbol with exclamation mark and &#039;malware&#039; written underneath imposed over a digital interface.]]></media:description>                                                            <media:text><![CDATA[Malware vector image showing alert symbol with exclamation mark and &#039;malware&#039; written underneath imposed over a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Malware vector image showing alert symbol with exclamation mark and &#039;malware&#039; written underneath imposed over a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/oo8cMGiY5DwjHYxKQ8VLsB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Russian DDoS: what’s the threat to businesses? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/russian-ddos-whats-the-threat-to-businesses</link>
                                                                            <description>
                            <![CDATA[ The UK National Cyber Security Centre (NCSC) has issued a warning that Russian-aligned hacktivist groups are targeting organizations ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ccTmK5nKuUhmHLYMEQgLEd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WaAZGD2aJwzNdfFfUmokSn-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 03 Mar 2026 08:30:00 +0000</pubDate>                                                                            <updated>Tue, 03 Mar 2026 08:30:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/WaAZGD2aJwzNdfFfUmokSn-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Russian flag, overlaid on a glowing blue digital image of binary code.]]></media:description>                                                            <media:text><![CDATA[The Russian flag, overlaid on a glowing blue digital image of binary code.]]></media:text>
                                <media:title type="plain"><![CDATA[The Russian flag, overlaid on a glowing blue digital image of binary code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WaAZGD2aJwzNdfFfUmokSn-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ CISOs are keen on agentic AI, but they’re not going all-in yet ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cisos-are-keen-on-agentic-ai-but-theyre-not-going-all-in-yet</link>
                                                                            <description>
                            <![CDATA[ Many security leaders face acute talent shortages and are looking to upskill workers ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jmhzCf3SFWZDeX55vuRGNX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RsxvmUinC8pBjYifD2swgj-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 02 Mar 2026 12:52:46 +0000</pubDate>                                                                            <updated>Mon, 02 Mar 2026 12:52:47 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RsxvmUinC8pBjYifD2swgj-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Agentic AI concept image with human heads lined up with larger robotic humanoid head in background.]]></media:description>                                                            <media:text><![CDATA[Agentic AI concept image with human heads lined up with larger robotic humanoid head in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Agentic AI concept image with human heads lined up with larger robotic humanoid head in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RsxvmUinC8pBjYifD2swgj-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cyber resilience tunnel vision is leaving enterprises open to external threats ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-resilience-tunnel-vision-is-leaving-enterprises-open-to-external-threats</link>
                                                                            <description>
                            <![CDATA[ Many enterprises are overlooking supply chain risks as part of their cyber resilience strategies ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3AEcrqTiBrmYp6L2mTMB4o</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/tjoYANjztGSPmTL2KeDXbG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 02 Mar 2026 11:39:18 +0000</pubDate>                                                                            <updated>Mon, 02 Mar 2026 11:39:31 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/tjoYANjztGSPmTL2KeDXbG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber resilience concept image showing three shields in a layered formation with front-facing shield slightly cracked.]]></media:description>                                                            <media:text><![CDATA[Cyber resilience concept image showing three shields in a layered formation with front-facing shield slightly cracked.]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber resilience concept image showing three shields in a layered formation with front-facing shield slightly cracked.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/tjoYANjztGSPmTL2KeDXbG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ UK Government says it’s ‘cut cyber attack fix times by 84%’ with new vulnerability monitoring service ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business/public-sector/uk-government-says-its-cut-cyber-attack-fix-times-by-84-percent-with-new-vulnerability-monitoring-service</link>
                                                                            <description>
                            <![CDATA[ A new scanning service spots weaknesses in government DNS records for 6,000 UK public sector bodies ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8rH2RGhtwefdU44CgiEYh4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/DmESZYJHbxtArjUoLghyhU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 27 Feb 2026 11:15:33 +0000</pubDate>                                                                            <updated>Fri, 27 Feb 2026 11:15:33 +0000</updated>
                                                                                                                                            <category><![CDATA[Public Sector]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/DmESZYJHbxtArjUoLghyhU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity concept image showing padlock symbols on data storage blocks in a larger data storage array.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity concept image showing padlock symbols on data storage blocks in a larger data storage array.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity concept image showing padlock symbols on data storage blocks in a larger data storage array.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/DmESZYJHbxtArjUoLghyhU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security agencies issue warning over critical Cisco Catalyst SD-WAN vulnerability ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/security-agencies-issue-warning-over-critical-cisco-catalyst-sd-wan-vulnerability</link>
                                                                            <description>
                            <![CDATA[ Threat actors have been exploiting the vulnerability to achieve root access since 2023 ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">W3nhLCHBdhW9sQ8LSdtdbU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/tS8HTW7yrXNbExyfrJHDUN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 26 Feb 2026 10:12:05 +0000</pubDate>                                                                            <updated>Thu, 26 Feb 2026 10:12:06 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/tS8HTW7yrXNbExyfrJHDUN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of Cisco, developer of the Cisco ASA (Adaptive Security Appliance) device range, pictured at Mobile World Congress Barcelona 2023.]]></media:description>                                                            <media:text><![CDATA[Logo of Cisco, developer of the Cisco ASA (Adaptive Security Appliance) device range, pictured at Mobile World Congress Barcelona 2023.]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of Cisco, developer of the Cisco ASA (Adaptive Security Appliance) device range, pictured at Mobile World Congress Barcelona 2023.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/tS8HTW7yrXNbExyfrJHDUN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ How to use cyber deception in your security strategy ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/how-to-use-cyber-deception-in-your-security-strategy</link>
                                                                            <description>
                            <![CDATA[ Cyber deception allows firms to play adversaries at their own game – but how is it achieved? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VTGzbUQrYHgjgmmWbWfHvP</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/CnhsiMqdGDG8p4PLu43KMo-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 24 Feb 2026 15:18:23 +0000</pubDate>                                                                            <updated>Wed, 25 Feb 2026 11:06:41 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/CnhsiMqdGDG8p4PLu43KMo-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A digital image of a smartphone being used as a mousetrap, to represent cyber deception and honeytraps.]]></media:description>                                                            <media:text><![CDATA[A digital image of a smartphone being used as a mousetrap, to represent cyber deception and honeytraps.]]></media:text>
                                <media:title type="plain"><![CDATA[A digital image of a smartphone being used as a mousetrap, to represent cyber deception and honeytraps.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/CnhsiMqdGDG8p4PLu43KMo-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ CrowdStrike says AI is officially supercharging cyber attacks: Average breakout times hit just 29 minutes in 2025, 65% faster than in 2024 – and some attacks take just seconds ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/crowdstrike-says-ai-is-officially-supercharging-cyber-attacks-average-breakout-times-hit-just-29-minutes-in-2025-65-percent-faster-than-in-2024-and-some-attacks-take-just-seconds</link>
                                                                            <description>
                            <![CDATA[ Cyber criminals are actively exploiting AI systems and injecting malicious prompts into legitimate generative AI tools ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4wYR7NQGARJdDKgNPgC7eT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/KPEWS3STaenADFirZ97RV3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 24 Feb 2026 10:46:33 +0000</pubDate>                                                                            <updated>Tue, 24 Feb 2026 10:46:34 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/KPEWS3STaenADFirZ97RV3-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber attack concept image showing orange glowing alert symbol imposed over digital systems mesh. ]]></media:description>                                                            <media:text><![CDATA[Cyber attack concept image showing orange glowing alert symbol imposed over digital systems mesh. ]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber attack concept image showing orange glowing alert symbol imposed over digital systems mesh. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/KPEWS3STaenADFirZ97RV3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Securing the supply chain:  Why zero trust and recovery readiness are non-negotiable ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/securing-the-supply-chain-why-zero-trust-and-recovery-readiness-are-non-negotiable</link>
                                                                            <description>
                            <![CDATA[ To prevent supply chain attacks, suppliers must be embedded in trusted business architecture ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eXy3QjJKkFye7rubkZF8wE</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/DD7oSG7mL3LVWBrNQQCQu7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 24 Feb 2026 08:00:00 +0000</pubDate>                                                                            <updated>Fri, 27 Feb 2026 14:04:36 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Matt Saunders ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/DD7oSG7mL3LVWBrNQQCQu7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Digital chain concept art]]></media:description>                                                            <media:text><![CDATA[Digital chain concept art]]></media:text>
                                <media:title type="plain"><![CDATA[Digital chain concept art]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/DD7oSG7mL3LVWBrNQQCQu7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Everything we know so far about the PayPal data breach ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/everything-we-know-so-far-about-the-paypal-data-breach</link>
                                                                            <description>
                            <![CDATA[ While few PayPal customers saw their data exposed, some did experience unauthorized activity on their accounts ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eiZBp8ARFqgdLyDV2WEZCn</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dQqgjrZGynKbJAwruTzL9G-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 23 Feb 2026 10:21:03 +0000</pubDate>                                                                            <updated>Mon, 23 Feb 2026 10:21:03 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dQqgjrZGynKbJAwruTzL9G-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[PayPal logo and branding pictured on a smartphone screen with company coloring in the background.]]></media:description>                                                            <media:text><![CDATA[PayPal logo and branding pictured on a smartphone screen with company coloring in the background.]]></media:text>
                                <media:title type="plain"><![CDATA[PayPal logo and branding pictured on a smartphone screen with company coloring in the background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dQqgjrZGynKbJAwruTzL9G-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A single compromised account gave hackers access to 1.2 million French banking records ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/a-single-compromised-account-gave-hackers-access-to-1-2-million-french-banking-records</link>
                                                                            <description>
                            <![CDATA[ Ficoba has warned that “numerous” scams are already in circulation following the data breach ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MctzL27C9DgHoFVWrZYiq4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 20 Feb 2026 10:55:22 +0000</pubDate>                                                                            <updated>Fri, 20 Feb 2026 13:17:05 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Starkiller: Cyber experts issue warning over new phishing kit that proxies real login pages ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/starkiller-cyber-experts-issue-warning-over-new-phishing-kit-that-proxies-real-login-pages</link>
                                                                            <description>
                            <![CDATA[ The Starkiller package offers monthly framework updates and documentation, meaning no technical ability is needed ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mHwEJejwdhDhzJt7KvMCBA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/tjxtfTzqYUV5qV2FNQQYVM-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 19 Feb 2026 12:06:46 +0000</pubDate>                                                                            <updated>Thu, 19 Feb 2026 12:22:07 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/tjxtfTzqYUV5qV2FNQQYVM-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Close-up image of a web browser URL bar with https code.]]></media:description>                                                            <media:text><![CDATA[Close-up image of a web browser URL bar with https code.]]></media:text>
                                <media:title type="plain"><![CDATA[Close-up image of a web browser URL bar with https code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/tjxtfTzqYUV5qV2FNQQYVM-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Using AI to generate passwords is a terrible idea, experts warn ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/using-ai-to-generate-passwords-is-a-terrible-idea-experts-warn</link>
                                                                            <description>
                            <![CDATA[ Researchers have warned the use of AI-generated passwords puts users and businesses at risk ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">6x7b3jyuFeqHYS7jPDG9nj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dWWadtMsk3uez4rsjhdxv8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 19 Feb 2026 10:46:05 +0000</pubDate>                                                                            <updated>Thu, 19 Feb 2026 10:46:06 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dWWadtMsk3uez4rsjhdxv8-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Password security concept image showing person typing on keyboard with digitized password entry screen. ]]></media:description>                                                            <media:text><![CDATA[Password security concept image showing person typing on keyboard with digitized password entry screen. ]]></media:text>
                                <media:title type="plain"><![CDATA[Password security concept image showing person typing on keyboard with digitized password entry screen. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dWWadtMsk3uez4rsjhdxv8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Millions of developers could be impacted by flaws in Visual Studio Code extensions – here's what you need to know and how to protect yourself ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/millions-of-developers-could-be-impacted-by-flaws-in-visual-studio-code-extensions-heres-what-you-need-to-know-and-how-to-protect-yourself</link>
                                                                            <description>
                            <![CDATA[ The VS Code vulnerabilities highlight broader IDE security risks, said OX Security ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sfsAo2JH92UfvphyyS46Zd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/j3T9oonprqXvME6SbDuSLM-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 18 Feb 2026 11:03:37 +0000</pubDate>                                                                            <updated>Thu, 19 Feb 2026 09:11:35 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/j3T9oonprqXvME6SbDuSLM-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Software vulnerability concept image showing bug highlighted by magnifying glass placed over a computer screen with programming code.]]></media:description>                                                            <media:text><![CDATA[Software vulnerability concept image showing bug highlighted by magnifying glass placed over a computer screen with programming code.]]></media:text>
                                <media:title type="plain"><![CDATA[Software vulnerability concept image showing bug highlighted by magnifying glass placed over a computer screen with programming code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/j3T9oonprqXvME6SbDuSLM-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ransomware protection for all: How consumption-based subscription models can lower the entry point for cyber resilience ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/ransomware-protection-for-all-how-consumption-based-subscription-models-can-lower-the-entry-point-for-cyber-resilience</link>
                                                                            <description>
                            <![CDATA[ Consumption-based immutable backup makes enterprise-grade ransomware resilience affordable to all ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ATGHvAADU6C5qmh3hGqVDZ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 18 Feb 2026 08:00:00 +0000</pubDate>                                                                            <updated>Wed, 18 Feb 2026 08:00:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Pete Hannah ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Researchers called on LastPass, Dashlane, and Bitwarden to up defenses after severe flaws put 60 million users at risk – here’s how each company responded ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/researchers-called-on-lastpass-dashlane-and-bitwarden-to-up-defenses-after-severe-flaws-put-60-million-users-at-risk-heres-how-each-company-responded</link>
                                                                            <description>
                            <![CDATA[ Analysts at ETH Zurich called for cryptographic standard improvements after a host of password managers were found lacking ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">NfFxTg6XRsaJYwtUPGvTad</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/b3uNg73ogqmmGDNjaScXE3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 17 Feb 2026 12:56:51 +0000</pubDate>                                                                            <updated>Tue, 17 Feb 2026 12:56:51 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/b3uNg73ogqmmGDNjaScXE3-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Password security concept image showing person logging into an account on a laptop while using password manager authenticator on smartphone.]]></media:description>                                                            <media:text><![CDATA[Password security concept image showing person logging into an account on a laptop while using password manager authenticator on smartphone.]]></media:text>
                                <media:title type="plain"><![CDATA[Password security concept image showing person logging into an account on a laptop while using password manager authenticator on smartphone.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/b3uNg73ogqmmGDNjaScXE3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Vast majority of breaches enabled by preventable gaps, identity weaknesses says Palo Alto Networks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/vast-majority-breaches-enabled-preventable-gaps-identity-weaknesses-palo-alto-networks</link>
                                                                            <description>
                            <![CDATA[ Identity controls and better understanding of threat surface are key to rebuffing increasingly threatening cyber attacks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jMQGbFuJ3ArUEA5ehhEHbk</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/qqCnL6Mg4ATgEBpvadSuQi-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 17 Feb 2026 11:38:51 +0000</pubDate>                                                                            <updated>Tue, 17 Feb 2026 12:03:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/qqCnL6Mg4ATgEBpvadSuQi-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A visualization of a green padlock surrounded by open orange padlocks, to represent identity attacks.]]></media:description>                                                            <media:text><![CDATA[A visualization of a green padlock surrounded by open orange padlocks, to represent identity attacks.]]></media:text>
                                <media:title type="plain"><![CDATA[A visualization of a green padlock surrounded by open orange padlocks, to represent identity attacks.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/qqCnL6Mg4ATgEBpvadSuQi-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Harnessing AI to secure the future of identity ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/harnessing-ai-to-secure-the-future-of-identity</link>
                                                                            <description>
                            <![CDATA[ Channel partners must lead on securing AI identities through governance and support ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">P8t7xcVM9gLEL3DKUEYqiT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zY3UeEvLTfczgZYTQY6hh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 17 Feb 2026 08:00:00 +0000</pubDate>                                                                            <updated>Tue, 17 Feb 2026 11:47:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Paul Squires ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zY3UeEvLTfczgZYTQY6hh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Identity security concept image showing a fingerprint placed on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[Identity security concept image showing a fingerprint placed on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Identity security concept image showing a fingerprint placed on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zY3UeEvLTfczgZYTQY6hh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘They are able to move fast now’: AI is expanding attack surfaces – and hackers are looking to reap the same rewards as enterprises with the technology ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/they-are-able-to-move-fast-now-ai-is-expanding-attack-surfaces-and-hackers-are-looking-to-reap-the-same-rewards-as-enterprises-with-the-technology</link>
                                                                            <description>
                            <![CDATA[ Potent new malware strains, faster attack times, and the rise of shadow AI are causing havoc ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3pVpmH9oN7uEFGuHcNqtg4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Hv5eL6mTr2kv7Y4y2nEKmT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 16 Feb 2026 12:12:02 +0000</pubDate>                                                                            <updated>Mon, 16 Feb 2026 12:12:03 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Hv5eL6mTr2kv7Y4y2nEKmT-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[AI vector illustration showing digitized human brain surrounded by digital storage systems. ]]></media:description>                                                            <media:text><![CDATA[AI vector illustration showing digitized human brain surrounded by digital storage systems. ]]></media:text>
                                <media:title type="plain"><![CDATA[AI vector illustration showing digitized human brain surrounded by digital storage systems. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Hv5eL6mTr2kv7Y4y2nEKmT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ransomware gangs are using employee monitoring software as a springboard for cyber attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware-gangs-are-using-employee-monitoring-software-as-a-springboard-for-cyber-attacks</link>
                                                                            <description>
                            <![CDATA[ Two attempted attacks aimed to exploit Net Monitor for Employees Professional and SimpleHelp ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">UxUKdS2z5Viemd7oCX52w4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 16 Feb 2026 11:10:15 +0000</pubDate>                                                                            <updated>Mon, 16 Feb 2026 11:10:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:description>                                                            <media:text><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Deepfake business risks are growing – here's what leaders need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/deepfake-business-risks-are-growing-what-leaders-need-to-know</link>
                                                                            <description>
                            <![CDATA[ As the risk of being targeted by deepfakes increases, what should businesses be looking out for? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">miQpNeYemM4AToESqErYHD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/CykdjjvtLDtn9MdH93PrQ8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Feb 2026 12:44:03 +0000</pubDate>                                                                            <updated>Fri, 13 Feb 2026 12:46:36 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/CykdjjvtLDtn9MdH93PrQ8-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A visualization of an executive shown on a screen with their face mapped and tracked by software, to represent the creation of deepfakes.]]></media:description>                                                            <media:text><![CDATA[A visualization of an executive shown on a screen with their face mapped and tracked by software, to represent the creation of deepfakes.]]></media:text>
                                <media:title type="plain"><![CDATA[A visualization of an executive shown on a screen with their face mapped and tracked by software, to represent the creation of deepfakes.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/CykdjjvtLDtn9MdH93PrQ8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Fake North Korean IT workers are rampant on LinkedIn – security experts warn operatives are stealing profiles to apply for jobs and infiltrate firms ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/fake-north-korean-it-workers-are-rampant-on-linkedin-security-experts-warn-operatives-are-stealing-profiles-to-apply-for-jobs-and-infiltrate-firms</link>
                                                                            <description>
                            <![CDATA[ The scammers' latest efforts mark a significant escalation in tactics, experts have warned ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">GBoCQkJnwqrVVYpodxWmJj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RSjE8LWxBzgjnadXPUW8mB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Feb 2026 12:38:38 +0000</pubDate>                                                                            <updated>Fri, 13 Feb 2026 12:38:38 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RSjE8LWxBzgjnadXPUW8mB-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing a silhouetted person in a black hat with binary code in background. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing a silhouetted person in a black hat with binary code in background. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing a silhouetted person in a black hat with binary code in background. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RSjE8LWxBzgjnadXPUW8mB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ CVEs are set to top 50,000 this year, marking a record high – here’s how CISOs and security teams can prepare for a looming onslaught ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cves-are-set-to-top-50-000-this-year-marking-a-record-high-heres-how-cisos-and-security-teams-can-prepare-for-a-looming-onslaught</link>
                                                                            <description>
                            <![CDATA[ While the CVE figures might be daunting, they won't all be relevant to your organization ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">QoYZM9ZLKWeBxLQwmqmLiF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zhVVvM4P9nyoKbXWWyUD8Q-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Feb 2026 10:12:30 +0000</pubDate>                                                                            <updated>Fri, 13 Feb 2026 10:12:30 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zhVVvM4P9nyoKbXWWyUD8Q-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Red warning symbol hovering above a digital interface with computer code, symbolizing a CVE alert.]]></media:description>                                                            <media:text><![CDATA[Red warning symbol hovering above a digital interface with computer code, symbolizing a CVE alert.]]></media:text>
                                <media:title type="plain"><![CDATA[Red warning symbol hovering above a digital interface with computer code, symbolizing a CVE alert.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zhVVvM4P9nyoKbXWWyUD8Q-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft patches six zero-days targeting Windows, Word, and more – here’s what you need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/microsoft-patches-six-zero-days-targeting-windows-word-and-more-heres-what-you-need-to-know</link>
                                                                            <description>
                            <![CDATA[ Patch Tuesday update targets large number of vulnerabilities already being used by attackers ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">e9AepTaRWDR3JhsQ26xqff</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Feb 2026 10:37:31 +0000</pubDate>                                                                            <updated>Thu, 12 Feb 2026 10:37:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:description>                                                            <media:text><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ CISA shares lessons learned from Polish power grid hack – and how to prevent disaster striking again ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cisa-shares-lessons-learned-from-polish-power-grid-hack-and-how-to-prevent-disaster-striking-again</link>
                                                                            <description>
                            <![CDATA[ New CISA guidance aims to help CNI operators implement secure communications ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">h3gh7YzbvmbQRo7dMLNkUh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dFiSMke7iCE59e29NuVMg8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 12 Feb 2026 10:02:11 +0000</pubDate>                                                                            <updated>Thu, 12 Feb 2026 10:02:12 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dFiSMke7iCE59e29NuVMg8-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Insignia of the Cybersecurity and Infrastructure Security Agency (CISA) pictured on a smartphone screen.]]></media:description>                                                            <media:text><![CDATA[Insignia of the Cybersecurity and Infrastructure Security Agency (CISA) pictured on a smartphone screen.]]></media:text>
                                <media:title type="plain"><![CDATA[Insignia of the Cybersecurity and Infrastructure Security Agency (CISA) pictured on a smartphone screen.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dFiSMke7iCE59e29NuVMg8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ iOS and Android users beware: This new spyware kit allows hackers to take full control of your device ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/technology/artificial-intelligence/this-new-mobile-compromise-toolkit-enables-spyware-surveillance-and-data-theft</link>
                                                                            <description>
                            <![CDATA[ The professional package allows even unsophisticated attackers to take full control of devices ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8e2kXHdZCgHQWLHTozXZy3</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 11 Feb 2026 12:07:05 +0000</pubDate>                                                                            <updated>Fri, 13 Feb 2026 08:51:04 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:description>                                                            <media:text><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:text>
                                <media:title type="plain"><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security expert warns Salt Typhoon is becoming 'more dangerous' after Norwegian authorities lift lid on critical infrastructure hacking campaign ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/salt-typhoon-norway-cyber-espionage-warning</link>
                                                                            <description>
                            <![CDATA[ The Chinese state-backed hacking group has waged successful espionage campaigns against an array of organizations across Norway. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">5cKy9DBAE3N95B5r2F82im</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/uvuxUyoNcxZTsTdMdbPFKG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 09 Feb 2026 10:51:15 +0000</pubDate>                                                                            <updated>Mon, 09 Feb 2026 10:51:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/uvuxUyoNcxZTsTdMdbPFKG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Chinese hacker concept image symbolizing the Salt Typhoon threat group, with a man typing on keyboard with People&#039;s Republic of China (PRC) flag in background.]]></media:description>                                                            <media:text><![CDATA[Chinese hacker concept image symbolizing the Salt Typhoon threat group, with a man typing on keyboard with People&#039;s Republic of China (PRC) flag in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Chinese hacker concept image symbolizing the Salt Typhoon threat group, with a man typing on keyboard with People&#039;s Republic of China (PRC) flag in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/uvuxUyoNcxZTsTdMdbPFKG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security experts warn Substack users to brace for phishing attacks after breach ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/security-experts-warn-substack-users-to-brace-for-phishing-attacks-after-breach</link>
                                                                            <description>
                            <![CDATA[ Substack CEO Christ Best confirmed the incident occurred in October 2025 ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">o7MCXZ7M3JJJe6sM7bNT9B</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/k4Nndu7uQs2VrqAomgdw8R-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 06 Feb 2026 09:38:32 +0000</pubDate>                                                                            <updated>Fri, 06 Feb 2026 09:38:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/k4Nndu7uQs2VrqAomgdw8R-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Substack logo and branding pictured on a laptop screen with hand placed on keyboard and blurred user head in foreground.]]></media:description>                                                            <media:text><![CDATA[Substack logo and branding pictured on a laptop screen with hand placed on keyboard and blurred user head in foreground.]]></media:text>
                                <media:title type="plain"><![CDATA[Substack logo and branding pictured on a laptop screen with hand placed on keyboard and blurred user head in foreground.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/k4Nndu7uQs2VrqAomgdw8R-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI-generated code is fast becoming the biggest enterprise security risk as teams struggle with the ‘illusion of correctness’ ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/software/development/ai-generated-code-is-fast-becoming-the-biggest-enterprise-security-risk-as-teams-struggle-with-the-illusion-of-correctness</link>
                                                                            <description>
                            <![CDATA[ Security teams are scrambling to catch AI-generated flaws that appear correct before disaster strikes ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tpS2skWBhDwtvLdGKn58Si</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/45XM7VDiKtHZtv8qEvuvW5-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 05 Feb 2026 12:48:13 +0000</pubDate>                                                                            <updated>Thu, 05 Feb 2026 12:48:13 +0000</updated>
                                                                                                                                            <category><![CDATA[Development]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/45XM7VDiKtHZtv8qEvuvW5-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A visualization of agentic AI layers, shown as blue nodes of code connected by blue strands against a dark background.]]></media:description>                                                            <media:text><![CDATA[A visualization of agentic AI layers, shown as blue nodes of code connected by blue strands against a dark background.]]></media:text>
                                <media:title type="plain"><![CDATA[A visualization of agentic AI layers, shown as blue nodes of code connected by blue strands against a dark background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/45XM7VDiKtHZtv8qEvuvW5-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ransomware gangs are sharing virtual machines to wage cyber attacks on the cheap – but it could be their undoing ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/ransomware-gangs-are-sharing-virtual-machines-to-wage-cyber-attacks-on-the-cheap-but-it-could-be-their-undoing</link>
                                                                            <description>
                            <![CDATA[ Thousands of attacker servers all had the same autogenerated Windows hostnames, according to Sophos ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zLwJpcY9ZvURVNVFjzut46</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 05 Feb 2026 10:20:10 +0000</pubDate>                                                                            <updated>Thu, 05 Feb 2026 10:20:10 +0000</updated>
                                                                                                                                            <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing computer screen with binary code, with a skull imprinted over code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/YDWujEWW55Zc2hfESYZWb4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The CVE system isn’t working – what's next? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-cve-system-isnt-working-what-next</link>
                                                                            <description>
                            <![CDATA[ With 2025's funding issues underlining key issues with the CVE system, what should businesses be doing to source intelligence about security vulnerabilities? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">SChsZCdDX3pX4LWWBVa3VG</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/NhcVBxHWvQNoDkMNnxxwVF-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 04 Feb 2026 08:30:00 +0000</pubDate>                                                                            <updated>Wed, 04 Feb 2026 08:30:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/NhcVBxHWvQNoDkMNnxxwVF-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An illustration representing cybersecurity and CVEs, as shown by a tablet with a magnifying glass revealing malware, surrounded by symbols representing edge devices, cloud, and firewalls. The main colors in the image are blue and purple.]]></media:description>                                                            <media:text><![CDATA[An illustration representing cybersecurity and CVEs, as shown by a tablet with a magnifying glass revealing malware, surrounded by symbols representing edge devices, cloud, and firewalls. The main colors in the image are blue and purple.]]></media:text>
                                <media:title type="plain"><![CDATA[An illustration representing cybersecurity and CVEs, as shown by a tablet with a magnifying glass revealing malware, surrounded by symbols representing edge devices, cloud, and firewalls. The main colors in the image are blue and purple.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/NhcVBxHWvQNoDkMNnxxwVF-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google issues warning over ShinyHunters-branded vishing campaigns ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/google-issues-warning-over-shinyhunters-branded-vishing-campaigns</link>
                                                                            <description>
                            <![CDATA[ Related groups are stealing data through voice phishing  and fake credential harvesting websites ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zHr8MESTqLrM7FdPM6unGB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 04 Feb 2026 08:30:00 +0000</pubDate>                                                                            <updated>Wed, 04 Feb 2026 08:30:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:description>                                                            <media:text><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:text>
                                <media:title type="plain"><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Notepad++ hackers remained undetected and pushed malicious updates for six months – here’s who’s responsible, how they did it, and how to check if you’ve been affected ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/notepad-hackers-remained-undetected-and-pushed-malicious-updates-for-six-months-heres-whos-responsible-how-they-did-it-and-how-to-check-if-youve-been-affected</link>
                                                                            <description>
                            <![CDATA[ Hackers remained undetected for months and distributed malicious updates to Notepad++ users after breaching the text editor software – here's how to check if you've been affected. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Z8JWmAJVxKDr3msciCHySN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/T88XCMBKcwGSg5qaEXtdDR-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 03 Feb 2026 11:15:21 +0000</pubDate>                                                                            <updated>Tue, 03 Feb 2026 11:15:35 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/T88XCMBKcwGSg5qaEXtdDR-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Chinese hackers concept image showing People&#039;s Republic of China (PRC) flag in background with shadowed hands typing on a laptop keyboard in foreground.]]></media:description>                                                            <media:text><![CDATA[Chinese hackers concept image showing People&#039;s Republic of China (PRC) flag in background with shadowed hands typing on a laptop keyboard in foreground.]]></media:text>
                                <media:title type="plain"><![CDATA[Chinese hackers concept image showing People&#039;s Republic of China (PRC) flag in background with shadowed hands typing on a laptop keyboard in foreground.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/T88XCMBKcwGSg5qaEXtdDR-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Phantom firms: The rise of fraudulent cybersecurity vendors ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phantom-firms-the-rise-of-fraudulent-cybersecurity-vendors</link>
                                                                            <description>
                            <![CDATA[ Channel partners need systematic vendor vetting to combat rising phantom firm scams ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">aRaoG58UVBSHx9P5GJoR4j</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9bG39dHepwjdwTbjrttSV7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 03 Feb 2026 08:00:00 +0000</pubDate>                                                                            <updated>Mon, 09 Feb 2026 14:10:52 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Grant Hutchons ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/9bG39dHepwjdwTbjrttSV7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A businessperson&#039;s hands using a laptop, with overlaid red and yellow, holographic warning symbols indicating a cyber scam and fraud.]]></media:description>                                                            <media:text><![CDATA[A businessperson&#039;s hands using a laptop, with overlaid red and yellow, holographic warning symbols indicating a cyber scam and fraud.]]></media:text>
                                <media:title type="plain"><![CDATA[A businessperson&#039;s hands using a laptop, with overlaid red and yellow, holographic warning symbols indicating a cyber scam and fraud.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9bG39dHepwjdwTbjrttSV7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What security teams need to know about the NSA's new zero trust guidelines ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/what-security-teams-need-to-know-about-the-nsas-new-zero-trust-guidelines</link>
                                                                            <description>
                            <![CDATA[ The new guidelines aim to move an organization from discovery to target-level implementation of zero trust practices ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Y5v4AuNEvJ47NT68HRhdQ6</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/g5X65gMXSQmxvDLDVikQVH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 02 Feb 2026 12:40:40 +0000</pubDate>                                                                            <updated>Mon, 02 Feb 2026 12:40:41 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/g5X65gMXSQmxvDLDVikQVH-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo and insignia of the United States National Security Agency (NSA) pictured on a smartphone screen held in hand above a laptop keyboard and screen.]]></media:description>                                                            <media:text><![CDATA[Logo and insignia of the United States National Security Agency (NSA) pictured on a smartphone screen held in hand above a laptop keyboard and screen.]]></media:text>
                                <media:title type="plain"><![CDATA[Logo and insignia of the United States National Security Agency (NSA) pictured on a smartphone screen held in hand above a laptop keyboard and screen.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/g5X65gMXSQmxvDLDVikQVH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ CISA’s interim chief uploaded sensitive documents to a public version of ChatGPT – security experts explain why you should never do that ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-protection/cisas-interim-chief-uploaded-sensitive-documents-to-a-public-version-of-chatgpt-security-experts-explain-why-you-should-never-do-that</link>
                                                                            <description>
                            <![CDATA[ The incident at CISA raises yet more concerns about the rise of ‘shadow AI’ and data protection risks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ag8EffcAihF68rt6w3GYZF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dFiSMke7iCE59e29NuVMg8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 30 Jan 2026 17:45:00 +0000</pubDate>                                                                            <updated>Fri, 30 Jan 2026 19:38:58 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Protection]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dFiSMke7iCE59e29NuVMg8-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Insignia of the Cybersecurity and Infrastructure Security Agency (CISA) pictured on a smartphone screen.]]></media:description>                                                            <media:text><![CDATA[Insignia of the Cybersecurity and Infrastructure Security Agency (CISA) pictured on a smartphone screen.]]></media:text>
                                <media:title type="plain"><![CDATA[Insignia of the Cybersecurity and Infrastructure Security Agency (CISA) pictured on a smartphone screen.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dFiSMke7iCE59e29NuVMg8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Former Google engineer convicted of economic espionage after stealing thousands of secret AI, supercomputing documents ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/former-google-engineer-convicted-of-economic-espionage-after-stealing-thousands-of-secret-ai-supercomputing-documents</link>
                                                                            <description>
                            <![CDATA[ Linwei Ding told Chinese investors he could build a world-class supercomputer ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jQr5CmnRVvBTHTN8vViHXf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RZ7UvjBTtZr8WMgy6yjh96-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 30 Jan 2026 12:41:44 +0000</pubDate>                                                                            <updated>Fri, 30 Jan 2026 12:41:45 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RZ7UvjBTtZr8WMgy6yjh96-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Google logo pictured above the entrance to the company&#039;s King&#039;s Cross office in London, UK. ]]></media:description>                                                            <media:text><![CDATA[Google logo pictured above the entrance to the company&#039;s King&#039;s Cross office in London, UK. ]]></media:text>
                                <media:title type="plain"><![CDATA[Google logo pictured above the entrance to the company&#039;s King&#039;s Cross office in London, UK. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RZ7UvjBTtZr8WMgy6yjh96-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The FBI has seized the RAMP hacking forum, but will the takedown stick? History tells us otherwise ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/the-fbi-has-seized-the-ramp-hacking-forum-but-will-the-takedown-stick-history-tells-us-otherwise</link>
                                                                            <description>
                            <![CDATA[ Billing itself as the “only place ransomware allowed", RAMP catered mainly for Russian-speaking cyber criminals ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9MuHqZhvZQ6Bwhq8kvCxDk</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RSjE8LWxBzgjnadXPUW8mB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 30 Jan 2026 10:56:12 +0000</pubDate>                                                                            <updated>Fri, 30 Jan 2026 10:56:12 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RSjE8LWxBzgjnadXPUW8mB-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing a silhouetted person in a black hat with binary code in background. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing a silhouetted person in a black hat with binary code in background. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing a silhouetted person in a black hat with binary code in background. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RSjE8LWxBzgjnadXPUW8mB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The open source ecosystem is booming thanks to AI, but hackers are taking advantage ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/software/open-source/the-open-source-ecosystem-is-booming-thanks-to-ai-but-hackers-are-taking-advantage</link>
                                                                            <description>
                            <![CDATA[ Analysis by Sonatype found that AI is giving attackers new opportunities to target victims ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">FfALgwDHucWYFSL64K8xFV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 29 Jan 2026 10:46:02 +0000</pubDate>                                                                            <updated>Thu, 29 Jan 2026 10:46:03 +0000</updated>
                                                                                                                                            <category><![CDATA[Open Source]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:description>                                                            <media:text><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:text>
                                <media:title type="plain"><![CDATA[Insider threat hacker concept image showing man typing on keyboard in a dimly lit room. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/UjWjTqk5HiFp2xWB4yo93k-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are using LLMs to generate malicious JavaScript in real time – and they’re going after web browsers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hackers-are-using-llms-to-generate-malicious-javascript-in-real-time-and-theyre-going-after-web-browsers</link>
                                                                            <description>
                            <![CDATA[ Defenders advised to use runtime behavioral analysis to detect and block malicious activity at the point of execution, directly within the browser ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jCEPJqp6YG8HwK82cTm96g</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/MNSH2GsMD6TfUQC4bpLHm-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 28 Jan 2026 12:57:52 +0000</pubDate>                                                                            <updated>Wed, 28 Jan 2026 13:11:31 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/MNSH2GsMD6TfUQC4bpLHm-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Generative AI attack concept image showing a robotic, AI-controlled hand holding an alert symbol.]]></media:description>                                                            <media:text><![CDATA[Generative AI attack concept image showing a robotic, AI-controlled hand holding an alert symbol.]]></media:text>
                                <media:title type="plain"><![CDATA[Generative AI attack concept image showing a robotic, AI-controlled hand holding an alert symbol.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/MNSH2GsMD6TfUQC4bpLHm-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Everything we know so far about the Nike data breach ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/everything-we-know-so-far-about-the-nike-data-breach</link>
                                                                            <description>
                            <![CDATA[ Hackers behind the WorldLeaks ransomware group claim to have accessed sensitive corporate data ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">RQPiXZQAgvbMN6mcFnWGYm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/hKDg9HJeNfft4roCAaoUod-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 27 Jan 2026 14:52:54 +0000</pubDate>                                                                            <updated>Tue, 27 Jan 2026 14:52:55 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/hKDg9HJeNfft4roCAaoUod-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Nike tick logo pictured on a storefront sign in San Francisco, USA.]]></media:description>                                                            <media:text><![CDATA[Nike tick logo pictured on a storefront sign in San Francisco, USA.]]></media:text>
                                <media:title type="plain"><![CDATA[Nike tick logo pictured on a storefront sign in San Francisco, USA.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/hKDg9HJeNfft4roCAaoUod-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI is “forcing a fundamental shift” in data privacy and governance ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/privacy/ai-is-forcing-a-fundamental-shift-in-data-privacy-and-governance</link>
                                                                            <description>
                            <![CDATA[ Organizations are working to define and establish the governance structures they need to manage AI responsibly at scale – and budgets are going up ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">j2ts9qHpTFsYN7yTaFKsU9</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ChVns2sZRm8ohNECYxRrPh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 27 Jan 2026 11:45:37 +0000</pubDate>                                                                            <updated>Tue, 27 Jan 2026 11:45:37 +0000</updated>
                                                                                                                                            <category><![CDATA[Privacy]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ChVns2sZRm8ohNECYxRrPh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Data privacy concept image showing digitized human eyeball surrounded by data platforms and statistical interface panels.]]></media:description>                                                            <media:text><![CDATA[Data privacy concept image showing digitized human eyeball surrounded by data platforms and statistical interface panels.]]></media:text>
                                <media:title type="plain"><![CDATA[Data privacy concept image showing digitized human eyeball surrounded by data platforms and statistical interface panels.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ChVns2sZRm8ohNECYxRrPh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Redefining resilience: Why MSP security must evolve to stay ahead ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/redefining-resilience-why-msp-security-must-evolve-to-stay-ahead</link>
                                                                            <description>
                            <![CDATA[ Basic endpoint protection is no more, but that leads to many opportunities for MSPs... ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">nPG9chPVBMt8kALJRjKpZK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9s9AUXad7LHrtEdLWybwvE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 27 Jan 2026 08:00:00 +0000</pubDate>                                                                            <updated>Tue, 27 Jan 2026 08:00:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Matt Knell ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/9s9AUXad7LHrtEdLWybwvE-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a digitized padlock symbol placed on top of a digital interface, symbolizing locked files. ]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a digitized padlock symbol placed on top of a digital interface, symbolizing locked files. ]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a digitized padlock symbol placed on top of a digital interface, symbolizing locked files. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9s9AUXad7LHrtEdLWybwvE-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>