<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
                    <atom:link href="https://www.itpro.com/feeds/tag/security" rel="self" type="application/rss+xml" />
                            <title><![CDATA[ Latest from ITPro in Security ]]></title>
                <link>https://www.itpro.com/security</link>
        <description><![CDATA[ All the latest security content from the ITPro team ]]></description>
                                    <lastBuildDate>Fri, 08 May 2026 09:32:30 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ Claude users beware, hackers are using a fake website to dupe developers and deliver malware ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/claude-users-beware-hackers-are-using-a-fake-website-to-dupe-developers-and-deliver-malware</link>
                                                                            <description>
                            <![CDATA[ 'Beagle' is deployed through a Dynamic Link Library (DLL) sideloading chain, and gives attackers remote access to the system ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">QFnS23ZWZmYxkq5Kk2FrWd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 08 May 2026 09:32:30 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:description>                                                            <media:text><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:text>
                                <media:title type="plain"><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 2026 in IoT attacks: the biggest threats so far and what businesses can do ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/iot-attacks-the-biggest-attacks-so-far-and-what-businesses-can-do</link>
                                                                            <description>
                            <![CDATA[ Internet of Things devices are more useful than ever – but security is still playing catch-up ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">aFfZ6vAwc6aFdQZMPYvtkJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/2LvDwLLQ8jfBDzQBX5WER9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 07 May 2026 16:56:30 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Praharsha Anand ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/2LvDwLLQ8jfBDzQBX5WER9-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[IoT security concept image showing network symbols on a blue background.]]></media:description>                                                            <media:text><![CDATA[IoT security concept image showing network symbols on a blue background.]]></media:text>
                                <media:title type="plain"><![CDATA[IoT security concept image showing network symbols on a blue background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/2LvDwLLQ8jfBDzQBX5WER9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ UK workers are shockingly relaxed about selling access to company systems ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/uk-workers-are-shockingly-relaxed-about-selling-access-to-company-systems</link>
                                                                            <description>
                            <![CDATA[ Research from UK fraud prevention service Cifas shows that insider fraud is rife ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vSmUzNaYN8imR4v6vrgyag</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QGJdnzL5ujgBmZvWfYVyk7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 07 May 2026 10:59:45 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QGJdnzL5ujgBmZvWfYVyk7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ethical hacker concept image showing hands of a female pentester typing on a laptop keyboard.]]></media:description>                                                            <media:text><![CDATA[Ethical hacker concept image showing hands of a female pentester typing on a laptop keyboard.]]></media:text>
                                <media:title type="plain"><![CDATA[Ethical hacker concept image showing hands of a female pentester typing on a laptop keyboard.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QGJdnzL5ujgBmZvWfYVyk7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft joins competitors in handing over AI models for advanced testing ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/technology/artificial-intelligence/microsoft-joins-competitors-in-handing-over-ai-models-for-advanced-testing</link>
                                                                            <description>
                            <![CDATA[ US and UK government agencies will evaluate the firm's frontier models, along with those from Google and xAI ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">FFZSDHS7GHj4dS3DnXrWnW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Deb4XXCJdzDg8DCaViLow3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 07 May 2026 10:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Artificial Intelligence]]></category>
                                                    <category><![CDATA[Technology]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Deb4XXCJdzDg8DCaViLow3-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft logo and branding pictured at Mobile World Congress (MWC) 2025 in Barcelona, Spain. ]]></media:description>                                                            <media:text><![CDATA[Microsoft logo and branding pictured at Mobile World Congress (MWC) 2025 in Barcelona, Spain. ]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft logo and branding pictured at Mobile World Congress (MWC) 2025 in Barcelona, Spain. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Deb4XXCJdzDg8DCaViLow3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The sovereignty gap: why MSPs must rethink recovery in the SaaS era ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-protection/the-sovereignty-gap-why-msps-must-rethink-recovery-in-the-saas-era</link>
                                                                            <description>
                            <![CDATA[ SaaS growth exposes sovereignty gap, forcing MSPs to rethink recovery ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">wR55Bm2WZsh9CLHDYQnFw3</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/EUpDF4vK4HDQ9BNPsEv8qZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 07 May 2026 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Protection]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Alex Walsh ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/EUpDF4vK4HDQ9BNPsEv8qZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cloud symbol sitting on top of storage pods with data flows linking each individual pod together.]]></media:description>                                                            <media:text><![CDATA[Cloud symbol sitting on top of storage pods with data flows linking each individual pod together.]]></media:text>
                                <media:title type="plain"><![CDATA[Cloud symbol sitting on top of storage pods with data flows linking each individual pod together.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/EUpDF4vK4HDQ9BNPsEv8qZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Beware of emails threatening a code of conduct review ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/beware-of-emails-threatening-a-code-of-conduct-review</link>
                                                                            <description>
                            <![CDATA[ A widespread phishing campaign has targeted tens of thousands of employees ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">77y4eje5T825eD49NpbPGa</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/BwgyDzFJ2YV3ja2RZQJT9b-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 06 May 2026 09:34:02 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/BwgyDzFJ2YV3ja2RZQJT9b-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing concept image showing an email symbol with a fishing hook pierced through, with glowing padlock symbols in background.]]></media:description>                                                            <media:text><![CDATA[Phishing concept image showing an email symbol with a fishing hook pierced through, with glowing padlock symbols in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing concept image showing an email symbol with a fishing hook pierced through, with glowing padlock symbols in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/BwgyDzFJ2YV3ja2RZQJT9b-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘We’re not investing as much as we should in their skills and development’: Skills shortages remain a key factor in security breaches — and things could get worse with AI in the equation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/were-not-investing-as-much-as-we-should-in-their-skills-and-development-skills-shortages-remain-a-key-factor-in-security-breaches-and-things-could-get-worse-with-ai-in-the-equation</link>
                                                                            <description>
                            <![CDATA[ Skills capabilities remain a key factor in security breaches, according to a new study ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jqLYgMMvvNDMjPqz6dSJ33</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/bWktWKQFiA8atBMpJ56M2i-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 06 May 2026 07:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/bWktWKQFiA8atBMpJ56M2i-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Two cybersecurity professionals in a modern office.]]></media:description>                                                            <media:text><![CDATA[Two cybersecurity professionals in a modern office.]]></media:text>
                                <media:title type="plain"><![CDATA[Two cybersecurity professionals in a modern office.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/bWktWKQFiA8atBMpJ56M2i-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ransomware negotiator sentenced for role in major cyber crime group ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/ransomware-negotiator-sentenced-for-role-in-major-cyber-crime-group</link>
                                                                            <description>
                            <![CDATA[ Deniss Zolotarjovs was a key player in a group associated with Conti ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">st2Lrg9NDXZQZ4mgYomUod</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 05 May 2026 14:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:description>                                                            <media:text><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber crime concept image showing hacker typing on keyboard in dimly-lit room with tablet pictured on desk. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4w6boC4sd6Rmk2mt6aw3Ud-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Everything you need to know about ChatGPT’s new Advanced Account Security features ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/everything-you-need-to-know-about-chatgpts-new-advanced-account-security-features</link>
                                                                            <description>
                            <![CDATA[ OpenAI has introduced new tools to tightening up access to ChatGPT, Codex, and its other AI tools ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MUK4HCdmNs8tBN5wjLrg49</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/AM7ReJDhZZWMAqjKqACmJL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 05 May 2026 14:03:27 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/AM7ReJDhZZWMAqjKqACmJL-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ChatGPT logo and branding pictured in white coloring against a black backdrop.]]></media:description>                                                            <media:text><![CDATA[ChatGPT logo and branding pictured in white coloring against a black backdrop.]]></media:text>
                                <media:title type="plain"><![CDATA[ChatGPT logo and branding pictured in white coloring against a black backdrop.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/AM7ReJDhZZWMAqjKqACmJL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Five Eyes agencies sound alarm over risky agentic AI deployments ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/five-eyes-agencies-sound-alarm-over-risky-agentic-ai-deployments</link>
                                                                            <description>
                            <![CDATA[ Security agencies have urged organizations to establish clear boundaries and guardrails for AI agents ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MiufYjDJwbR3ZhKEHZpEL7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/eA94AYk6DLNFxKRQtGuKoT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 05 May 2026 10:44:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/eA94AYk6DLNFxKRQtGuKoT-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[AI concept image showing digitized human eye monitoring digital interfaces and software.]]></media:description>                                                            <media:text><![CDATA[AI concept image showing digitized human eye monitoring digital interfaces and software.]]></media:text>
                                <media:title type="plain"><![CDATA[AI concept image showing digitized human eye monitoring digital interfaces and software.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/eA94AYk6DLNFxKRQtGuKoT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘Panthalassa has opened the ocean frontier’: Thiel-backed startup secures $140 million to deploy floating AI data centers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/panthalassa-has-opened-the-ocean-frontier-thiel-backed-startup-secures-usd140-million-to-deploy-floating-ai-data-centers</link>
                                                                            <description>
                            <![CDATA[ Panthalassa plans to deploy autonomous AI data centers in the North Pacific Ocean ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">AoeHv2xsVNrGrwcBYRFG44</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/afdGpJwagZ3iFuRCasAijm-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 05 May 2026 09:25:30 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/afdGpJwagZ3iFuRCasAijm-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Peter Thiel, co-founder of PayPal and Palantir, speaking on stage during the Bitcoin 2022 conference in Miami, Florida.]]></media:description>                                                            <media:text><![CDATA[Peter Thiel, co-founder of PayPal and Palantir, speaking on stage during the Bitcoin 2022 conference in Miami, Florida.]]></media:text>
                                <media:title type="plain"><![CDATA[Peter Thiel, co-founder of PayPal and Palantir, speaking on stage during the Bitcoin 2022 conference in Miami, Florida.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/afdGpJwagZ3iFuRCasAijm-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘The inbox is no longer the only frontline’: Phishing attacks are evolving as cyber criminals ramp up ‘multi-channel’ campaigns over email and Microsoft Teams ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/the-inbox-is-no-longer-the-only-frontline-phishing-attacks-are-evolving-as-cyber-criminals-ramp-up-multi-channel-campaigns-over-email-and-microsoft-teams</link>
                                                                            <description>
                            <![CDATA[ New research shows threat actors are ramping up “multi-channel” phishing attacks by combining lures via email and Microsoft Teams ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">KeqM2mhYx8M92mZgtJqven</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 04 May 2026 05:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Anthropic targets vulnerability detection gains with Claude Security public beta — here's what users can expect ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/anthropic-targets-vulnerability-detection-gains-with-claude-security-public-beta-heres-what-users-can-expect</link>
                                                                            <description>
                            <![CDATA[ The Claude Mythos developer is aiming for a more limited approach to cyber tooling for public consumption ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VZuzQB29v52Gzepb44YBZi</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/SnWyqmbsH5h3PJcvC44zkH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 04 May 2026 04:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/SnWyqmbsH5h3PJcvC44zkH-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Anthropic Claude logo and branding imposed over a background of computer source code. ]]></media:description>                                                            <media:text><![CDATA[Anthropic Claude logo and branding imposed over a background of computer source code. ]]></media:text>
                                <media:title type="plain"><![CDATA[Anthropic Claude logo and branding imposed over a background of computer source code. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/SnWyqmbsH5h3PJcvC44zkH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Researchers warn millions of RDP and VNC servers are wide open to exploitation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/researchers-warn-millions-of-rdp-and-vnc-servers-are-wide-open-to-exploitation</link>
                                                                            <description>
                            <![CDATA[ Researchers at Forescout spotted millions of RDP and VNC servers exposed online ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">gkWGoJ8YRpZKiuFzLmL6kj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/rcgqGm2k9qbr9K4kHhEmvU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 01 May 2026 10:39:01 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/rcgqGm2k9qbr9K4kHhEmvU-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An abstract image showing a skull over a pixelated background to symbolise a cyber security vulnerability]]></media:description>                                                            <media:text><![CDATA[An abstract image showing a skull over a pixelated background to symbolise a cyber security vulnerability]]></media:text>
                                <media:title type="plain"><![CDATA[An abstract image showing a skull over a pixelated background to symbolise a cyber security vulnerability]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/rcgqGm2k9qbr9K4kHhEmvU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 'Depressingly familiar': Cyber Security Breaches Survey shows work still to be done on cyber preparedness ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/depressingly-familiar-cyber-security-breaches-survey-shows-work-still-to-be-done-on-cyber-preparedness</link>
                                                                            <description>
                            <![CDATA[ The government's annual cybersecurity report shows organizations are failing to shore up security capabilities ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3kPgaf3eXCUXY8R2ucCh9Q</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 01 May 2026 10:06:59 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:description>                                                            <media:text><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:text>
                                <media:title type="plain"><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Enterprises are adopting agents faster than they can secure and govern them – experts warn it’s a disaster waiting to happen ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/enterprises-are-adopting-agents-faster-than-they-can-secure-and-govern-them-experts-warn-its-a-disaster-waiting-to-happen</link>
                                                                            <description>
                            <![CDATA[ Identity systems developed for human interaction fail to cope with the new demands ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ZNS99FFXfZRPCT59whwfcf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/PbaraXgyBf5cecgbD4TJLU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 30 Apr 2026 11:22:53 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/PbaraXgyBf5cecgbD4TJLU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An illustration showing an AI agent side profile, depicted as a blue robot, with seven human faces in varying earthy metallic tones shown to the right.]]></media:description>                                                            <media:text><![CDATA[An illustration showing an AI agent side profile, depicted as a blue robot, with seven human faces in varying earthy metallic tones shown to the right.]]></media:text>
                                <media:title type="plain"><![CDATA[An illustration showing an AI agent side profile, depicted as a blue robot, with seven human faces in varying earthy metallic tones shown to the right.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/PbaraXgyBf5cecgbD4TJLU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ UK firms left in the dark over what workers are sharing with AI ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-protection/uk-firms-left-in-the-dark-over-what-workers-are-sharing-with-ai</link>
                                                                            <description>
                            <![CDATA[ Security teams can’t keep track of what workers are sharing with AI applications, regardless of whether they’re approved or unauthorized ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Eo7ShySuZws95AM5KSTsqD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/agHuoixY7A7CvZEbCApv4g-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 30 Apr 2026 07:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Protection]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/agHuoixY7A7CvZEbCApv4g-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Businesswoman holding handheld device while walking in an abstract data center environment made up of blocks with bright colored data lines flowing on ground.]]></media:description>                                                            <media:text><![CDATA[Businesswoman holding handheld device while walking in an abstract data center environment made up of blocks with bright colored data lines flowing on ground.]]></media:text>
                                <media:title type="plain"><![CDATA[Businesswoman holding handheld device while walking in an abstract data center environment made up of blocks with bright colored data lines flowing on ground.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/agHuoixY7A7CvZEbCApv4g-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ North Korean hackers are duping freelance developers with fake interviews to steal cryptocurrency and deliver malware — Sophos warns the 'Nickel Alley' group is using LinkedIn, Upwork, and Fiverr to target victims ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/north-korean-hackers-are-duping-freelance-developers-with-fake-interviews-to-steal-cryptocurrency-and-deliver-malware-sophos-warns-the-nickel-alley-group-is-using-linkedin-upwork-and-fiverr-to-target-victims</link>
                                                                            <description>
                            <![CDATA[ A fake interview process uses coding tests and repo downloads to deliver malware ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VLS4GwTGb87a7DRvRmQrAm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/rBaWcKkPGkJSvaRS3NHzSB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 29 Apr 2026 11:06:16 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/rBaWcKkPGkJSvaRS3NHzSB-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[North Korean hacker concept image showing a man in military uniform working on a laptop computer with flag of North Korea pictured on screen in background.]]></media:description>                                                            <media:text><![CDATA[North Korean hacker concept image showing a man in military uniform working on a laptop computer with flag of North Korea pictured on screen in background.]]></media:text>
                                <media:title type="plain"><![CDATA[North Korean hacker concept image showing a man in military uniform working on a laptop computer with flag of North Korea pictured on screen in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/rBaWcKkPGkJSvaRS3NHzSB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Monetizing the quantum shift: 11 PQC channel opportunities ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/monetizing-the-quantum-shift-11-pqc-channel-opportunities</link>
                                                                            <description>
                            <![CDATA[ Channel partners must lead clients through the post-quantum cryptography transition now. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MYNZ56iPZtxwcFXAZGe2wE</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GFpMfj9q29UoFDQyuwcQuh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 28 Apr 2026 07:00:00 +0000</pubDate>                                                                                                                                <updated>Fri, 01 May 2026 14:53:55 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Todd Beldham ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GFpMfj9q29UoFDQyuwcQuh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[&#039;Q-Day&#039; quantum computing attack showing a data storage container with encryption key unlocked, placed on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[&#039;Q-Day&#039; quantum computing attack showing a data storage container with encryption key unlocked, placed on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[&#039;Q-Day&#039; quantum computing attack showing a data storage container with encryption key unlocked, placed on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GFpMfj9q29UoFDQyuwcQuh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Pay up or expect attrition: 77% of cyber professionals missed out on pay rises last year – and almost half now plan to switch roles ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/pay-up-or-expect-attrition-77-percent-of-cyber-professionals-missed-out-on-pay-rises-last-year-and-almost-half-now-plan-to-switch-roles</link>
                                                                            <description>
                            <![CDATA[ Organizations are overlooking cyber pros when it comes to pay increases, and it could cost them dearly ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">CoeMP7KTNSy5cvcNaifhZ5</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/oRFZnA3a5Z9hTEPbjNLnGV-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 27 Apr 2026 10:56:38 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/oRFZnA3a5Z9hTEPbjNLnGV-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Concept image showing female office worker quitting her job and leaving with office supplies in a cardboard box.]]></media:description>                                                            <media:text><![CDATA[Concept image showing female office worker quitting her job and leaving with office supplies in a cardboard box.]]></media:text>
                                <media:title type="plain"><![CDATA[Concept image showing female office worker quitting her job and leaving with office supplies in a cardboard box.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/oRFZnA3a5Z9hTEPbjNLnGV-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Threat actors ditch ‘spray and pray’ attacks in shift to targeted exploitation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/threat-actors-ditch-spray-and-pray-attacks-in-shift-to-targeted-exploitation</link>
                                                                            <description>
                            <![CDATA[ A dip in ransomware volumes points to a more targeted approach focused on vulnerability exploitation ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">aXZoaaEbmpsecTfCYFaZAL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 24 Apr 2026 11:19:06 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:description>                                                            <media:text><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:text>
                                <media:title type="plain"><![CDATA[AI ransomware and cyber crime concept image showing a digitized human eye observing networks with computer code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/SDJ7bts4q7L4Ni743DoLPD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Why supply chain resilience is under the spotlight ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/why-is-supply-chain-resilience-under-the-spotlight</link>
                                                                            <description>
                            <![CDATA[ As attackers continue to target third party suppliers, what can firms do to boost resilience? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hbqvq9oqVQoU6gzZeYTNGW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/DD7oSG7mL3LVWBrNQQCQu7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 24 Apr 2026 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/DD7oSG7mL3LVWBrNQQCQu7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Digital chain concept art]]></media:description>                                                            <media:text><![CDATA[Digital chain concept art]]></media:text>
                                <media:title type="plain"><![CDATA[Digital chain concept art]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/DD7oSG7mL3LVWBrNQQCQu7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A ‘perfect storm’: NCSC chief issues warning over quantum threats, nation-state hackers, and the dangers of global ‘hacktivism’  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/a-perfect-storm-ncsc-chief-issues-warning-over-quantum-threats-nation-state-hackers-and-the-dangers-of-global-hacktivism</link>
                                                                            <description>
                            <![CDATA[ NCSC CEO Richard Horne says nation-state attacks, AI and the looming quantum threat require stronger global collaboration ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jkUTJkTdCc6AQEQJN3uNAB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/u6Lpwu2Ps7tF8A9vNo4Q5K-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 23 Apr 2026 12:25:06 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/u6Lpwu2Ps7tF8A9vNo4Q5K-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Dr Richard Horne, CEO of the UK&#039;s National Cyber Security Centre (NCSC) speaking on stage at the CyberUK conference in Glasgow, Scotland.]]></media:description>                                                            <media:text><![CDATA[Dr Richard Horne, CEO of the UK&#039;s National Cyber Security Centre (NCSC) speaking on stage at the CyberUK conference in Glasgow, Scotland.]]></media:text>
                                <media:title type="plain"><![CDATA[Dr Richard Horne, CEO of the UK&#039;s National Cyber Security Centre (NCSC) speaking on stage at the CyberUK conference in Glasgow, Scotland.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/u6Lpwu2Ps7tF8A9vNo4Q5K-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The NCSC says it’s time to switch to passkeys ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-ncsc-says-its-time-to-switch-to-passkeys</link>
                                                                            <description>
                            <![CDATA[ UK security organization calls for companies to step up and offer more secure ways to login ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jaYhRKhMTS3hbYHkehkCrY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/snMXVfJvpiJmLoNb66WzBR-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 23 Apr 2026 11:21:25 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/snMXVfJvpiJmLoNb66WzBR-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Smartphone with authentication icon on screen with passkey hovering above.]]></media:description>                                                            <media:text><![CDATA[Smartphone with authentication icon on screen with passkey hovering above.]]></media:text>
                                <media:title type="plain"><![CDATA[Smartphone with authentication icon on screen with passkey hovering above.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/snMXVfJvpiJmLoNb66WzBR-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 'The goal for this year will be to automate all security processes': Google Cloud is betting on Wiz to usher in a new era of AI security ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-goal-for-this-year-will-be-to-automate-all-security-processes-google-cloud-is-betting-on-wiz-to-usher-in-a-new-era-of-ai-security</link>
                                                                            <description>
                            <![CDATA[ Wiz wants to deploy its agents for continuous penetration testing, and in Google it’s found a parent company that can achieve this vision at scale ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ctMeUtSErHFYBMQui96CMY</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N3B3FC3PLDnt7g9MWxz368-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 23 Apr 2026 09:24:25 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N3B3FC3PLDnt7g9MWxz368-1280-80.jpg">
                                                            <media:credit><![CDATA[ITPro/Rory Bathgate]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Francis deSouza, COO and president of security products at Google Cloud, pictured speaking on stage at Google Cloud Next 2026 in Las Vegas. ]]></media:description>                                                            <media:text><![CDATA[Francis deSouza, COO and president of security products at Google Cloud, pictured speaking on stage at Google Cloud Next 2026 in Las Vegas. ]]></media:text>
                                <media:title type="plain"><![CDATA[Francis deSouza, COO and president of security products at Google Cloud, pictured speaking on stage at Google Cloud Next 2026 in Las Vegas. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N3B3FC3PLDnt7g9MWxz368-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ "Consumer messaging apps were never designed to handle sensitive communications" – Government decision-makers are confused about messaging security, BlackBerry report finds  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/consumer-messaging-apps-were-never-designed-to-handle-sensitive-communications-government-decision-makers-are-confused-about-messaging-security-blackberry-report-finds</link>
                                                                            <description>
                            <![CDATA[ Despite official warnings, they're still routinely using WhatsApp for confidential communications ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fGsoY59uzYUrvLLHNCL5jj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WawfjQpvXwUCFfi5h3GuB9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 22 Apr 2026 09:43:53 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/WawfjQpvXwUCFfi5h3GuB9-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ business man using a smartphone]]></media:description>                                                            <media:text><![CDATA[ business man using a smartphone]]></media:text>
                                <media:title type="plain"><![CDATA[ business man using a smartphone]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WawfjQpvXwUCFfi5h3GuB9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Enterprises are preparing for a post-quantum world – experts worry it could be too late for many ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/post-quantum-encryption-enterprise-preparation-juniper-research</link>
                                                                            <description>
                            <![CDATA[ More than 100 million firms are expected to embrace post-quantum algorithms by 2035, but that's just a drop in the ocean ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">C7HBQAwgvxFWMcdasKuS34</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/d5ftRe88HMZW8wcJtCZDsJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 21 Apr 2026 23:05:00 +0000</pubDate>                                                                                                                                <updated>Wed, 22 Apr 2026 08:08:03 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/d5ftRe88HMZW8wcJtCZDsJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Quantum cybersecurity concept image showing a quantum chip with glowing lights connected to a digital interface and circuit board. ]]></media:description>                                                            <media:text><![CDATA[Quantum cybersecurity concept image showing a quantum chip with glowing lights connected to a digital interface and circuit board. ]]></media:text>
                                <media:title type="plain"><![CDATA[Quantum cybersecurity concept image showing a quantum chip with glowing lights connected to a digital interface and circuit board. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/d5ftRe88HMZW8wcJtCZDsJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Everything we know about the Vercel data breach so far ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/everything-we-know-about-the-vercel-data-breach-so-far</link>
                                                                            <description>
                            <![CDATA[ An OAuth supply chain compromise saw 'non-sensitive' Vercel data compromised and some internal systems accessed ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">R8bnDH65phHDUjYQcpj2v</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/nVJtF4erHdUjd43hfPHEeE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 21 Apr 2026 11:07:53 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/nVJtF4erHdUjd43hfPHEeE-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo and branding of cloud development platform Vercel pictured on a smartphone screen with blurred multi-colored background.]]></media:description>                                                            <media:text><![CDATA[Logo and branding of cloud development platform Vercel pictured on a smartphone screen with blurred multi-colored background.]]></media:text>
                                <media:title type="plain"><![CDATA[Logo and branding of cloud development platform Vercel pictured on a smartphone screen with blurred multi-colored background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/nVJtF4erHdUjd43hfPHEeE-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Zoom launches new verification features to tackle AI impersonation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/zoom-ai-impersonation-verification-tools-for-humanity-world-id-deep-face</link>
                                                                            <description>
                            <![CDATA[ Growing concerns over AI impersonation techniques have prompted new features from Zoom ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">22NAC7spCMeSMV6Ys2bEUA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/JkT3uQefMSXSwVZ246RijJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 20 Apr 2026 14:58:42 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/JkT3uQefMSXSwVZ246RijJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Zoom logo illuminated in white against a black background at the company&#039;s exhibitor stall at ISE 2025 in Barcelona, Spain.]]></media:description>                                                            <media:text><![CDATA[Zoom logo illuminated in white against a black background at the company&#039;s exhibitor stall at ISE 2025 in Barcelona, Spain.]]></media:text>
                                <media:title type="plain"><![CDATA[Zoom logo illuminated in white against a black background at the company&#039;s exhibitor stall at ISE 2025 in Barcelona, Spain.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/JkT3uQefMSXSwVZ246RijJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Brit pleads guilty amid Scattered Spider hacking spree claims ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/scattered-spider-alleged-hacker-pleads-guilt-us</link>
                                                                            <description>
                            <![CDATA[ Tyler Robert Buchanan faces 10 years in jail if found guilty ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Bq2ME3BkRZW4Mz79qoUzUa</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/BydygnrmuGZSc59ZaH58w3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 20 Apr 2026 14:40:19 +0000</pubDate>                                                                                                                                <updated>Tue, 21 Apr 2026 11:41:37 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/BydygnrmuGZSc59ZaH58w3-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber crime concept image showing hands illuminated by laptop keyboard buttons while typing in a dimly lit room.]]></media:description>                                                            <media:text><![CDATA[Cyber crime concept image showing hands illuminated by laptop keyboard buttons while typing in a dimly lit room.]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber crime concept image showing hands illuminated by laptop keyboard buttons while typing in a dimly lit room.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/BydygnrmuGZSc59ZaH58w3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The race to become quantum-safe ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-race-to-become-quantum-safe</link>
                                                                            <description>
                            <![CDATA[ Efforts to run AI in trusted regions can clash with access to frontier model updates, business scalability ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mqhk2ZQDzeuB9kmaBrG8FQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/sbR2XhcDWZzbmY4ERVqobZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 17 Apr 2026 11:37:23 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/sbR2XhcDWZzbmY4ERVqobZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The text &quot;The race to become quantum-safe&quot; against a blue ECC graph, with the ITPro Podcast logo in the corner. The words &quot;quantum-safe&quot; are in yellow, the rest are in white.]]></media:description>                                                            <media:text><![CDATA[The text &quot;The race to become quantum-safe&quot; against a blue ECC graph, with the ITPro Podcast logo in the corner. The words &quot;quantum-safe&quot; are in yellow, the rest are in white.]]></media:text>
                                <media:title type="plain"><![CDATA[The text &quot;The race to become quantum-safe&quot; against a blue ECC graph, with the ITPro Podcast logo in the corner. The words &quot;quantum-safe&quot; are in yellow, the rest are in white.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/sbR2XhcDWZzbmY4ERVqobZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Tycoon 2FA is down, but not out – researchers warn the phishing as a service operation is still a huge threat to businesses ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/tycoon-2fa-phishing-risk-takedown-barracuda</link>
                                                                            <description>
                            <![CDATA[ Millions of Tycoon 2FA attacks are still hitting businesses, according to research from Barracuda ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vXDsxDKKWbMUkuvkVXXwHC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 17 Apr 2026 11:05:53 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI is now a ‘standard part of the attacker toolkit’ ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-is-now-a-standard-part-of-the-attacker-toolkit</link>
                                                                            <description>
                            <![CDATA[ Cyber attacks are increasing in scale, intensity, and velocity thanks to AI, and it’s forcing defenders to react faster than ever before ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">DqEmGSrrE9d4TbkQUfA2TR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/YZjwEwYDJbKftH9VvKGnNZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 16 Apr 2026 13:46:59 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/YZjwEwYDJbKftH9VvKGnNZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Digital technology toolkit symbol surrounded by email, internet, telephone, and communications symbols. ]]></media:description>                                                            <media:text><![CDATA[Digital technology toolkit symbol surrounded by email, internet, telephone, and communications symbols. ]]></media:text>
                                <media:title type="plain"><![CDATA[Digital technology toolkit symbol surrounded by email, internet, telephone, and communications symbols. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/YZjwEwYDJbKftH9VvKGnNZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NIST is overhauling the National Vulnerability Database due to skyrocketing reports – experts worry it will ‘leave many CVEs on the table’ ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/nist-national-vulnerability-database-overhaul-increased-cve-submissions</link>
                                                                            <description>
                            <![CDATA[ Drowning in CVEs, the NIST agency will now fully analyze only the most severe vulnerabilities ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3Lam554yt6kJYYjv5YT2A8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/cVdekj6xWYLY3nH5Lam3vZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 16 Apr 2026 11:11:04 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/cVdekj6xWYLY3nH5Lam3vZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Red glowing fiber optic cables touching a screen with computer source code and highlighting code snippet in red. ]]></media:description>                                                            <media:text><![CDATA[Red glowing fiber optic cables touching a screen with computer source code and highlighting code snippet in red. ]]></media:text>
                                <media:title type="plain"><![CDATA[Red glowing fiber optic cables touching a screen with computer source code and highlighting code snippet in red. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/cVdekj6xWYLY3nH5Lam3vZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI and Data are reshaping the MSP landscape, but hackers are getting in on the hot AI action ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-and-data-are-reshaping-the-msp-landscape-but-hackers-are-getting-in-on-the-hot-ai-action</link>
                                                                            <description>
                            <![CDATA[ AI is no longer just a buzzword; it's a hacker's dream and the channel's biggest opportunity ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mUbhnMn8zbQFxvU3uEVKxe</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mUyZnUdbkdkCc9yQXwt7cX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Apr 2026 14:39:04 +0000</pubDate>                                                                                                                                <updated>Wed, 15 Apr 2026 14:47:39 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Rene Millman) ]]></author>                    <dc:creator><![CDATA[ Rene Millman ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mUyZnUdbkdkCc9yQXwt7cX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An abstract image of green code with two blue speech bubbles on top, one reading &#039;AI&#039; and the other showing three dots.]]></media:description>                                                            <media:text><![CDATA[An abstract image of green code with two blue speech bubbles on top, one reading &#039;AI&#039; and the other showing three dots.]]></media:text>
                                <media:title type="plain"><![CDATA[An abstract image of green code with two blue speech bubbles on top, one reading &#039;AI&#039; and the other showing three dots.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mUyZnUdbkdkCc9yQXwt7cX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI agents using Anthropic MCP could be a vector for supply chain attacks, claim researchers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-agents-using-anthropic-mcp-supply-chain-attacks-claim-researchers</link>
                                                                            <description>
                            <![CDATA[ The flaw in Anthropic’s Model Context Protocol agent communication standard could put millions of agents and 200,000 servers at risk, report says ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">pCRDgxhtKFCjEcbXEWtrjJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/B5sequrZU2Sim7e6k6gTnH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Apr 2026 13:32:17 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ jane.mccallion@futurenet.com (Jane McCallion) ]]></author>                    <dc:creator><![CDATA[ Jane McCallion ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/B5sequrZU2Sim7e6k6gTnH-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Anthropic logo, in white on a dark background lit by a web-like light.]]></media:description>                                                            <media:text><![CDATA[The Anthropic logo, in white on a dark background lit by a web-like light.]]></media:text>
                                <media:title type="plain"><![CDATA[The Anthropic logo, in white on a dark background lit by a web-like light.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/B5sequrZU2Sim7e6k6gTnH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Brace yourselves for a vulnerability explosion, Forescout warns ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/brace-yourselves-for-a-vulnerability-explosion-forescout-warns</link>
                                                                            <description>
                            <![CDATA[ AI advances are helping identify software flaws at record pace and scale, but that's not the good news some would think ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">B5ZMSGYc6xxyRVXqD2VVdB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ti9GYKR64HDc4yjvanrRyJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Apr 2026 13:26:20 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ti9GYKR64HDc4yjvanrRyJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[the Forescout logo]]></media:description>                                                            <media:text><![CDATA[the Forescout logo]]></media:text>
                                <media:title type="plain"><![CDATA[the Forescout logo]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ti9GYKR64HDc4yjvanrRyJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security leaders overconfident about ransomware recovery ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/security-leaders-overconfident-about-ransomware-recovery</link>
                                                                            <description>
                            <![CDATA[ Few manage to recover all their data, and many experience business disruption ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">bV89CY9avfhwgcdKxFmGWV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Apr 2026 12:21:24 +0000</pubDate>                                                                                                                                <updated>Wed, 15 Apr 2026 13:30:22 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Most organizations make a mess of handling digital disruption ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/most-organizations-make-a-mess-of-handling-digital-disruption</link>
                                                                            <description>
                            <![CDATA[ Poor governance and a lack of collaboration with suppliers and partners can lead to disaster ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">owBpxF4E8GNwJ54H7iBFFh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/R9xjBCdRw6ruDKaYUtp4c4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 14 Apr 2026 13:00:11 +0000</pubDate>                                                                                                                                <updated>Tue, 14 Apr 2026 14:02:42 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/R9xjBCdRw6ruDKaYUtp4c4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity alert concept image showing a red glowing warning symbol placed on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity alert concept image showing a red glowing warning symbol placed on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity alert concept image showing a red glowing warning symbol placed on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/R9xjBCdRw6ruDKaYUtp4c4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Only 34% of cyber professionals plan to stay in their current role ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/only-34-percent-of-cyber-professionals-plan-to-stay-in-their-current-role</link>
                                                                            <description>
                            <![CDATA[ Offer regular wage progression, invest in culture and security, and offer flexible work arrangements if you want them to stay, advises IANS. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fPLw6vKVKejYwD9pnmdgv6</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/c4vixg5fYCJtq279vimmp8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 14 Apr 2026 12:24:34 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/c4vixg5fYCJtq279vimmp8-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An illustration of three office workers dashing between one red doorway and into another, to represent professionals leaving their roles.]]></media:description>                                                            <media:text><![CDATA[An illustration of three office workers dashing between one red doorway and into another, to represent professionals leaving their roles.]]></media:text>
                                <media:title type="plain"><![CDATA[An illustration of three office workers dashing between one red doorway and into another, to represent professionals leaving their roles.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/c4vixg5fYCJtq279vimmp8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ How the explosion in machine identities is changing cyber defense ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/how-machine-identities-changing-cyber-defense</link>
                                                                            <description>
                            <![CDATA[ The rapid adoption of machine identities such as AI agents is creating new vulnerabilities and fresh challenges for IT teams ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">PxskTThjGGy5ef9P4ZDoo7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/44bS4XVWGfXnqLkeywEJkm-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 13 Apr 2026 12:20:16 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Justin Pugsley ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/44bS4XVWGfXnqLkeywEJkm-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A visualization of machine identities, shown as blue nodes in the shape of the world with code surrounding them, against a black background.]]></media:description>                                                            <media:text><![CDATA[A visualization of machine identities, shown as blue nodes in the shape of the world with code surrounding them, against a black background.]]></media:text>
                                <media:title type="plain"><![CDATA[A visualization of machine identities, shown as blue nodes in the shape of the world with code surrounding them, against a black background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/44bS4XVWGfXnqLkeywEJkm-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Beyond wipers: Iran-backed cyber attacks and the threat to businesses ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/beyond-wipers-iran-backed-cyber-attacks-and-the-threat-to-businesses</link>
                                                                            <description>
                            <![CDATA[ What’s the real risk to business in the US and UK during this critical situation? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ZSqjakTNDPMf7AhXB8NrHC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/VHuoRHN7D2BMLU3pbN3Xv4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:54:47 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Apr 2026 10:57:36 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/VHuoRHN7D2BMLU3pbN3Xv4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A stylized image showing a glowing red cyber attack warning on top of a reflective metal surface bearing the flag of Iran.]]></media:description>                                                            <media:text><![CDATA[A stylized image showing a glowing red cyber attack warning on top of a reflective metal surface bearing the flag of Iran.]]></media:text>
                                <media:title type="plain"><![CDATA[A stylized image showing a glowing red cyber attack warning on top of a reflective metal surface bearing the flag of Iran.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/VHuoRHN7D2BMLU3pbN3Xv4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI is raising the stakes for cyber professionals – Claude Mythos just took things to another level ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-is-raising-the-stakes-for-cyber-professionals-claude-mythos-just-took-things-to-another-level</link>
                                                                            <description>
                            <![CDATA[ AI efficiency gains work both ways, and threat actors are already capitalizing on powerful new tools ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">dBWcYZ5aLKUG9LP9zn3Zb4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/obPtLjrgVEbzsKJRkqAVKS-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:39:34 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/obPtLjrgVEbzsKJRkqAVKS-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Anthropic logo and branding pictured on a smartphone screen placed on a reflective surface.]]></media:description>                                                            <media:text><![CDATA[Anthropic logo and branding pictured on a smartphone screen placed on a reflective surface.]]></media:text>
                                <media:title type="plain"><![CDATA[Anthropic logo and branding pictured on a smartphone screen placed on a reflective surface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/obPtLjrgVEbzsKJRkqAVKS-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Zephyr Energy hackers swiped £700,000 after redirecting a contractor payment ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/zephyr-energy-hackers-swiped-gbp700-000-after-redirecting-a-contractor-payment</link>
                                                                            <description>
                            <![CDATA[ Payment to a Zephyr Energy contractor was siphoned off, but the incident has been contained and new security measures implemented ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">m6aEtDpzcUUX6suSr8UbWg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:17:04 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Apr 2026 10:45:34 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:description>                                                            <media:text><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Agent identity governance can't keeping up with adoption rates – and it’s creating a security nightmare ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/agent-identity-governance-cant-keeping-up-with-adoption-rates-and-its-creating-a-security-nightmare</link>
                                                                            <description>
                            <![CDATA[ Enterprises are leaving high-privilege keys unchanged for months or years at a time ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">N82g7W3zaCU9k6GTFjUXbE</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zY3UeEvLTfczgZYTQY6hh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Apr 2026 11:37:17 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zY3UeEvLTfczgZYTQY6hh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Identity security concept image showing a fingerprint placed on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[Identity security concept image showing a fingerprint placed on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Identity security concept image showing a fingerprint placed on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zY3UeEvLTfczgZYTQY6hh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Why incident response has become a core responsibility for MSPs ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/why-incident-response-has-become-a-core-responsibility-for-msps</link>
                                                                            <description>
                            <![CDATA[ MSPs must prioritise incident response as core capability amid rising cyber threats ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">PABAqp8dpYi6cBwutrqXbL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/gAZQGXquzahjQHwSbSp9WN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Apr 2026 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Phil Chapman ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/gAZQGXquzahjQHwSbSp9WN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Neon blue padlock with code flowing over it, floating above small plinths raised at different heights, each with code underneath their platforms]]></media:description>                                                            <media:text><![CDATA[Neon blue padlock with code flowing over it, floating above small plinths raised at different heights, each with code underneath their platforms]]></media:text>
                                <media:title type="plain"><![CDATA[Neon blue padlock with code flowing over it, floating above small plinths raised at different heights, each with code underneath their platforms]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/gAZQGXquzahjQHwSbSp9WN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC issues alert over Russian hacker campaign targeting SOHO routers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ncsc-issues-alert-over-russian-hacker-campaign-targeting-soho-routers</link>
                                                                            <description>
                            <![CDATA[ The APT28 group has exploited vulnerable internet routers to covertly reroute internet traffic through malicious servers ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zMzke9FPNtPBx5CW9Pdyrb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 08 Apr 2026 09:46:20 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:description>                                                            <media:text><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ German authorities want your help finding the hackers behind GandCrab and REvil  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/german-authorities-want-your-help-finding-the-hackers-behind-gandcrab-and-revil</link>
                                                                            <description>
                            <![CDATA[ Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fdDCDsuwTqeNGjcqnLSn5n</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 07 Apr 2026 11:12:24 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ "If you think your day to day job as a CISO is hard, wait until you're dealing with a major breach": why your business needs cyber insurance ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/why-your-business-needs-cyber-insurance</link>
                                                                            <description>
                            <![CDATA[ As the cyber insurance market matures, do firms actually need it and if so, how should they choose a policy? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jXdMuyyrUfAef5DdgWC2bM</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LfC7XKNUhPuUKbdrGBq4uK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 03 Apr 2026 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LfC7XKNUhPuUKbdrGBq4uK-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A CGI shield stylized like a computer chip, hovering above polished blue metal, to represent cyber insurance.]]></media:description>                                                            <media:text><![CDATA[A CGI shield stylized like a computer chip, hovering above polished blue metal, to represent cyber insurance.]]></media:text>
                                <media:title type="plain"><![CDATA[A CGI shield stylized like a computer chip, hovering above polished blue metal, to represent cyber insurance.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LfC7XKNUhPuUKbdrGBq4uK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft and NCSC issue alerts over hacker campaigns targeting WhatsApp, Signal messaging apps ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/microsoft-and-ncsc-issue-alerts-over-hacker-campaigns-targeting-whatsapp-signal-messaging-apps</link>
                                                                            <description>
                            <![CDATA[ Microsoft warns about a sophisticated attack that starts with WhatsApp messages, while the NCSC says such incidents are on the rise ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">LJTnJm6NstRzVvKFnCmeyd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Pxt7furBergTPQRSi3WUA-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 03 Apr 2026 06:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Pxt7furBergTPQRSi3WUA-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[iOS app icons for WhatsApp and Signal messaging platforms, with top half of Instagram icon pictured in bottom right hand corner.]]></media:description>                                                            <media:text><![CDATA[iOS app icons for WhatsApp and Signal messaging platforms, with top half of Instagram icon pictured in bottom right hand corner.]]></media:text>
                                <media:title type="plain"><![CDATA[iOS app icons for WhatsApp and Signal messaging platforms, with top half of Instagram icon pictured in bottom right hand corner.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Pxt7furBergTPQRSi3WUA-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>