<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/feeds/tag/social-engineering" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro in Social-engineering ]]></title>
                <link>https://www.itpro.com/tag/social-engineering</link>
        <description><![CDATA[ All the latest social-engineering content from the ITPro team ]]></description>
                                    <lastBuildDate>Fri, 03 Apr 2026 06:00:00 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ Microsoft and NCSC issue alerts over hacker campaigns targeting WhatsApp, Signal messaging apps ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/microsoft-and-ncsc-issue-alerts-over-hacker-campaigns-targeting-whatsapp-signal-messaging-apps</link>
                                                                            <description>
                            <![CDATA[ Microsoft warns about a sophisticated attack that starts with WhatsApp messages, while the NCSC says such incidents are on the rise ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">LJTnJm6NstRzVvKFnCmeyd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Pxt7furBergTPQRSi3WUA-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 03 Apr 2026 06:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Pxt7furBergTPQRSi3WUA-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[iOS app icons for WhatsApp and Signal messaging platforms, with top half of Instagram icon pictured in bottom right hand corner.]]></media:description>                                                            <media:text><![CDATA[iOS app icons for WhatsApp and Signal messaging platforms, with top half of Instagram icon pictured in bottom right hand corner.]]></media:text>
                                <media:title type="plain"><![CDATA[iOS app icons for WhatsApp and Signal messaging platforms, with top half of Instagram icon pictured in bottom right hand corner.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Pxt7furBergTPQRSi3WUA-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Is your new hire an AI clone? Microsoft says North Korean hackers are using AI to impersonate job seekers and steal company secrets ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/is-your-new-hire-an-ai-clone-microsoft-says-north-korean-hackers-are-using-ai-to-impersonate-job-seekers-and-steal-company-secrets</link>
                                                                            <description>
                            <![CDATA[ The groups are increasingly using face-changing or voice-changing software to make their fake identities more plausible ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9jyHo9d4gA83CkaZBtmvcQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/U7xFHys4ZqNqAUYxH7V7Sa-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 09 Mar 2026 12:23:15 +0000</pubDate>                                                                                                                                <updated>Tue, 10 Mar 2026 12:00:49 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/U7xFHys4ZqNqAUYxH7V7Sa-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Side profile view of a human head with brain synapses and flowing data lines. ]]></media:description>                                                            <media:text><![CDATA[Side profile view of a human head with brain synapses and flowing data lines. ]]></media:text>
                                <media:title type="plain"><![CDATA[Side profile view of a human head with brain synapses and flowing data lines. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/U7xFHys4ZqNqAUYxH7V7Sa-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google issues warning over ShinyHunters-branded vishing campaigns ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/google-issues-warning-over-shinyhunters-branded-vishing-campaigns</link>
                                                                            <description>
                            <![CDATA[ Related groups are stealing data through voice phishing  and fake credential harvesting websites ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zHr8MESTqLrM7FdPM6unGB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 04 Feb 2026 08:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:description>                                                            <media:text><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:text>
                                <media:title type="plain"><![CDATA[Device code phishing concept image showing cartoon cell phone with a hook attached to a sign-in page. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6UMt7L8cwrivqQPjJWN3eX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Thousands of Microsoft Teams users are being targeted in a new phishing campaign ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/microsoft-teams-phishing-scam-fake-billing-check-point</link>
                                                                            <description>
                            <![CDATA[ Microsoft Teams users should be on the alert, according to researchers at Check Point ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">xYBLYYi6CQjeTaVUDQ9sSk</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WwZJrcyz5jLppWLVcEFL8m-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 26 Jan 2026 10:45:59 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/WwZJrcyz5jLppWLVcEFL8m-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft Teams login page on desktop app pictured on a laptop screen.]]></media:description>                                                            <media:text><![CDATA[Microsoft Teams login page on desktop app pictured on a laptop screen.]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft Teams login page on desktop app pictured on a laptop screen.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WwZJrcyz5jLppWLVcEFL8m-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft warns of rising AitM phishing attacks on energy sector ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/microsoft-warns-of-rising-aitm-phishing-attacks-on-energy-sector</link>
                                                                            <description>
                            <![CDATA[ The campaign abused SharePoint file sharing services to deliver phishing payloads and altered inbox rules to maintain persistence ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Bt6xNvsN2W3SWsSesfhL95</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 23 Jan 2026 11:10:09 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:description>                                                            <media:text><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft logo illuminated on the side of a building a night time in Tromso, Norway.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7F8eeczqdKrpFNsWATj8VL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Warning issued as surge in OAuth device code phishing leads to M365 account takeovers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/warning-issued-as-surge-in-oauth-device-code-phishing-leads-to-m365-account-takeovers</link>
                                                                            <description>
                            <![CDATA[ Successful attacks enable full M365 account access, opening the door to data theft, lateral movement, and persistent compromise ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">KvYoW3sdJ4wDkctJHg82bk</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/cH6m7NRbNRSksBtYe4xHVH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 22 Dec 2025 10:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/cH6m7NRbNRSksBtYe4xHVH-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft 365 logo pictured on a smartphone with Microsoft logo pictured in background.]]></media:description>                                                            <media:text><![CDATA[Microsoft 365 logo pictured on a smartphone with Microsoft logo pictured in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft 365 logo pictured on a smartphone with Microsoft logo pictured in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/cH6m7NRbNRSksBtYe4xHVH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Amazon CSO Stephen Schmidt says the company has rejected more than 1,800 fake North Korean job applicants in 18 months – but one managed to slip through the net ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/amazon-cso-stephen-schmidt-says-the-company-has-rejected-more-than-1-800-fake-north-korean-job-applicants-in-18-months-but-one-managed-to-slip-through-the-net</link>
                                                                            <description>
                            <![CDATA[ Analysis from Amazon highlights the growing scale of North Korean-backed "fake IT worker" campaigns ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">gyGFEr784jSEooH59LhWxb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/3Tm7p8bfs26mzt83tSMjwC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 22 Dec 2025 08:57:02 +0000</pubDate>                                                                                                                                <updated>Mon, 22 Dec 2025 08:57:52 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/3Tm7p8bfs26mzt83tSMjwC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Amazon senior vice president and chief security officer (CSO) Stephen Schmidt pictured speaking on stage during the HumanX AI Conference 2025 at Fontainebleau Las Vegas.]]></media:description>                                                            <media:text><![CDATA[Amazon senior vice president and chief security officer (CSO) Stephen Schmidt pictured speaking on stage during the HumanX AI Conference 2025 at Fontainebleau Las Vegas.]]></media:text>
                                <media:title type="plain"><![CDATA[Amazon senior vice president and chief security officer (CSO) Stephen Schmidt pictured speaking on stage during the HumanX AI Conference 2025 at Fontainebleau Las Vegas.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/3Tm7p8bfs26mzt83tSMjwC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Complacent Gen Z and Millennial workers are more likely to be duped by social engineering attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/complacent-gen-z-and-millennial-workers-are-more-likely-to-be-duped-by-social-engineering-attacks</link>
                                                                            <description>
                            <![CDATA[ Overconfidence and a lack of security training are putting organizations at risk ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">487j6euuWzVzHbTfjp59jF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QGJdnzL5ujgBmZvWfYVyk7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 16 Dec 2025 11:00:35 +0000</pubDate>                                                                                                                                <updated>Tue, 16 Dec 2025 11:01:19 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QGJdnzL5ujgBmZvWfYVyk7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ethical hacker concept image showing hands of a female pentester typing on a laptop keyboard.]]></media:description>                                                            <media:text><![CDATA[Ethical hacker concept image showing hands of a female pentester typing on a laptop keyboard.]]></media:text>
                                <media:title type="plain"><![CDATA[Ethical hacker concept image showing hands of a female pentester typing on a laptop keyboard.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QGJdnzL5ujgBmZvWfYVyk7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are abusing ConnectWise ScreenConnect, again ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/watch-out-for-fake-zoom-invites-hackers-are-abusing-connectwise-screenconnect-to-take-over-devices</link>
                                                                            <description>
                            <![CDATA[ A new spear phishing campaign has targeted more than 900 organizations with fake invitations from platforms like Zoom and Microsoft Teams. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">aufhxNMDzjp8GwNMjv2ojN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 28 Aug 2025 10:10:00 +0000</pubDate>                                                                                                                                <updated>Thu, 28 Aug 2025 11:34:51 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:description>                                                            <media:text><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The Allianz Life data breach just took a huge turn for the worse ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/allianz-life-data-breach-customer-accounts-impacted</link>
                                                                            <description>
                            <![CDATA[ Around 1.1 million Allianz Life customers are believed to have been impacted in a recent data breach, making up the vast majority of the insurer's North American customers. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ADG2qEJ4qjUX9B5Uh9ZWSX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WyQDsXrph78RGRusAv8L7g-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 20 Aug 2025 10:40:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/WyQDsXrph78RGRusAv8L7g-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of Allianz, parent company of Allianz Life, pictured in Berlin city center.]]></media:description>                                                            <media:text><![CDATA[Logo of Allianz, parent company of Allianz Life, pictured in Berlin city center.]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of Allianz, parent company of Allianz Life, pictured in Berlin city center.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WyQDsXrph78RGRusAv8L7g-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A new, silent social engineering attack is being used by hackers – and your security systems might not notice until it’s too late ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/a-new-silent-social-engineering-attack-is-being-used-by-hackers-and-your-security-systems-might-not-notice-until-its-too-late</link>
                                                                            <description>
                            <![CDATA[ Security researchers have warned the 'FileFix' technique, which builds on the notorious 'ClickFix' tactic, is being used in the wild by threat actors. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VvF4D4ZKrsTsygTTsZZexn</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/PTMwqLuzdRt65NSfijHDcL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 17 Jul 2025 10:41:29 +0000</pubDate>                                                                                                                                <updated>Thu, 17 Jul 2025 10:41:48 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ jane.mccallion@futurenet.com (Jane McCallion) ]]></author>                    <dc:creator><![CDATA[ Jane McCallion ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/PTMwqLuzdRt65NSfijHDcL-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Woman using keyboard with illuminated keys in a darkened room.]]></media:description>                                                            <media:text><![CDATA[Woman using keyboard with illuminated keys in a darkened room.]]></media:text>
                                <media:title type="plain"><![CDATA[Woman using keyboard with illuminated keys in a darkened room.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/PTMwqLuzdRt65NSfijHDcL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The FBI says hackers are using AI voice clones to impersonate US government officials ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-fbi-says-hackers-are-using-ai-voice-clones-to-impersonate-us-government-officials</link>
                                                                            <description>
                            <![CDATA[ The campaign uses AI voice generation to send messages pretending to be from high-ranking figures ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3JJQ6ioJ3wdYnc9LwVTMbm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 16 May 2025 10:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:description>                                                            <media:text><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:text>
                                <media:title type="plain"><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Employee phishing training is working – but don’t get complacent ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/employee-phishing-training-is-working-but-dont-get-complacent</link>
                                                                            <description>
                            <![CDATA[ Educating staff on how to avoid phishing attacks can cut the rate by 80% ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">37z7vZ2GgU3rttv3wGMRRe</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 15 May 2025 11:22:11 +0000</pubDate>                                                                                                                                <updated>Thu, 15 May 2025 11:22:17 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:description>                                                            <media:text><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing email attack concept image showing letter symbols being held by dark colored hands.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GXhsxEguUZLXXPu6ptYrtW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Russian hackers tried to lure diplomats with wine tasting – sound familiar? It’s an update to a previous campaign by the notorious Midnight Blizzard group ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/midnight-blizzard-grapeloader-campaign</link>
                                                                            <description>
                            <![CDATA[ The Midnight Blizzard threat group has been targeting European diplomats with malicious emails offering an invite to wine tasting events, according to Check Point. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">gfj5NaQ622X4dJM3a496XK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N7Ps3tz7EftxHFVrboGb6g-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 06 May 2025 23:05:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N7Ps3tz7EftxHFVrboGb6g-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Wine tasting concept image showing a man holding up a glass of red wine in a cellar surrounded by barrels. ]]></media:description>                                                            <media:text><![CDATA[Wine tasting concept image showing a man holding up a glass of red wine in a cellar surrounded by barrels. ]]></media:text>
                                <media:title type="plain"><![CDATA[Wine tasting concept image showing a man holding up a glass of red wine in a cellar surrounded by barrels. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N7Ps3tz7EftxHFVrboGb6g-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ This hacker group is posing as IT helpdesk workers to target enterprises – and researchers warn its social engineering techniques are exceptionally hard to spot ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/this-hacker-group-is-posing-as-it-helpdesk-workers-to-target-enterprises-and-researchers-warn-its-social-engineering-techniques-are-exceptionally-hard-to-spot</link>
                                                                            <description>
                            <![CDATA[ The Luna Moth hacker group is ramping up attacks on firms across a range of industries with its 'callback phishing' campaign, according to security researchers. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">askdj8bRPN3gJq5xf8wMCL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/WyQFFy6TAF7mzUvPhASUCd-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 06 May 2025 11:29:54 +0000</pubDate>                                                                                                                                <updated>Tue, 06 May 2025 11:29:59 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/WyQFFy6TAF7mzUvPhASUCd-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Luna Moth concept image showing cartoon mothman figure with red eyes and wings hovering against the night sky. ]]></media:description>                                                            <media:text><![CDATA[Luna Moth concept image showing cartoon mothman figure with red eyes and wings hovering against the night sky. ]]></media:text>
                                <media:title type="plain"><![CDATA[Luna Moth concept image showing cartoon mothman figure with red eyes and wings hovering against the night sky. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/WyQFFy6TAF7mzUvPhASUCd-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers are using Zoom’s remote control feature to infect devices with malware ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hackers-are-using-zooms-remote-control-feature-to-infect-devices-with-malware</link>
                                                                            <description>
                            <![CDATA[ Security experts have issued an alert over a new social engineering campaign using Zoom’s remote control features to take over victim devices. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">m5BG2PenTC4nHGhF3tsKeH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 24 Apr 2025 09:07:03 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:description>                                                            <media:text><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:text>
                                <media:title type="plain"><![CDATA[Silhouetted hand typing on an illuminated laptop keyboard.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N8h7uACYqQfmXe3eapwCRD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ State-sponsored cyber groups are flocking to the 'ClickFix' social engineering technique ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/clickfix-social-engineering-state-sponsored-hackers</link>
                                                                            <description>
                            <![CDATA[ State-sponsored hackers from North Korea, Iran, and Russia are exploiting the ‘ClickFix’ social engineering technique for the first time – and to great success. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">MbjDgvpVURk5QxAqfYAxYg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/PqyG2CKVqrAxfQPt47jHN7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 23 Apr 2025 08:23:01 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/PqyG2CKVqrAxfQPt47jHN7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[ClickFix social engineering technique concept image showing hand pressing a laptop keyboard button in low light.]]></media:description>                                                            <media:text><![CDATA[ClickFix social engineering technique concept image showing hand pressing a laptop keyboard button in low light.]]></media:text>
                                <media:title type="plain"><![CDATA[ClickFix social engineering technique concept image showing hand pressing a laptop keyboard button in low light.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/PqyG2CKVqrAxfQPt47jHN7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Have I Been Pwned owner Troy Hunt’s mailing list compromised in phishing attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/have-i-been-pwned-owner-troy-hunts-mailing-list-compromised-in-phishing-attack</link>
                                                                            <description>
                            <![CDATA[ Troy Hunt, the security blogger behind data-breach site Have I Been Pwned, has fallen victim to a phishing attack targeting his email subscriber list. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">DeZk4b24SkqhNduybCNMUS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/cNZLBdbFMucebEe8kjq7di-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 26 Mar 2025 08:30:00 +0000</pubDate>                                                                                                                                <updated>Wed, 26 Mar 2025 11:20:43 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ jane.mccallion@futurenet.com (Jane McCallion) ]]></author>                    <dc:creator><![CDATA[ Jane McCallion ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/cNZLBdbFMucebEe8kjq7di-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing concept image showing an email symbol with fishing hook.]]></media:description>                                                            <media:text><![CDATA[Phishing concept image showing an email symbol with fishing hook.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing concept image showing an email symbol with fishing hook.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/cNZLBdbFMucebEe8kjq7di-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ LinkedIn has become a prime hunting ground for cyber criminals – here’s what you need to know ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/linkedin-social-engineering-attacks</link>
                                                                            <description>
                            <![CDATA[ Cyber criminals are flocking to LinkedIn to conduct social engineering campaigns, research shows. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">s98jboyhATwa4KKMUy99tU</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/czRFNitgEevSvBPszapgWG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 06 Feb 2025 10:43:52 +0000</pubDate>                                                                                                                                <updated>Thu, 06 Feb 2025 14:35:55 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/czRFNitgEevSvBPszapgWG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Linkedin logo on a mobile phone in landscape orientation with blue linkedin background behind]]></media:description>                                                            <media:text><![CDATA[Linkedin logo on a mobile phone in landscape orientation with blue linkedin background behind]]></media:text>
                                <media:title type="plain"><![CDATA[Linkedin logo on a mobile phone in landscape orientation with blue linkedin background behind]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/czRFNitgEevSvBPszapgWG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Phishing campaign targets developers with fake CrowdStrike job offers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing-campaign-targets-developers-with-fake-crowdstrike-job-offers</link>
                                                                            <description>
                            <![CDATA[ Victims are drawn in with the promise of an interview for a junior developer role at CrowdStrike ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8KsJD5vq3ieSnxtDxoyEVP</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/p6mimCvEVhrkHzupt2m8sc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 13 Jan 2025 12:51:17 +0000</pubDate>                                                                                                                                <updated>Tue, 14 Jan 2025 16:40:07 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ solomon.klappholz@futurenet.com (Solomon Klappholz) ]]></author>                    <dc:creator><![CDATA[ Solomon Klappholz ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/p6mimCvEVhrkHzupt2m8sc-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Envelope with job offer on the laptop screen. Workplace in office. Vector flat graphic.]]></media:description>                                                            <media:text><![CDATA[Envelope with job offer on the laptop screen. Workplace in office. Vector flat graphic.]]></media:text>
                                <media:title type="plain"><![CDATA[Envelope with job offer on the laptop screen. Workplace in office. Vector flat graphic.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/p6mimCvEVhrkHzupt2m8sc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Iranian hackers targeted nuclear expert, ported Windows infection chain to Mac in a week ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/iranian-hackers-targeted-nuclear-expert-ported-windows-infection-chain-to-mac-in-a-week</link>
                                                                            <description>
                            <![CDATA[ Fresh research demonstrates the sophistication and capability of state-sponsored threat actors to compromise diverse targets ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">Wa6FcqEdzsGaaHytker7tT</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/RBmH3m9HDsh4cfAWBqaJqf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 06 Jul 2023 09:36:20 +0000</pubDate>                                                                                                                                <updated>Thu, 06 Jul 2023 13:19:08 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ richard.speed@futurenet.com (Richard Speed) ]]></author>                    <dc:creator><![CDATA[ Richard Speed ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/RBmH3m9HDsh4cfAWBqaJqf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Iranian hackers: Iran flag digital distorted to denote a disruption caused by a hack]]></media:description>                                                            <media:text><![CDATA[Iranian hackers: Iran flag digital distorted to denote a disruption caused by a hack]]></media:text>
                                <media:title type="plain"><![CDATA[Iranian hackers: Iran flag digital distorted to denote a disruption caused by a hack]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/RBmH3m9HDsh4cfAWBqaJqf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Malware being pushed to businesses by search engines remains a pervasive threat ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware-being-pushed-to-businesses-by-search-engines-remains-a-pervasive-threat</link>
                                                                            <description>
                            <![CDATA[ High-profile malvertising campaigns in recent months have surged ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">pchGDUBTRbnkWNFyK5X3N3</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FRRDLEFjuVCi2yG5QJMqoU-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 02 May 2023 11:37:34 +0000</pubDate>                                                                                                                                <updated>Tue, 02 May 2023 12:55:05 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FRRDLEFjuVCi2yG5QJMqoU-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware and security denoted by blue and gold mockup of motherboard with lock]]></media:description>                                                            <media:text><![CDATA[Malware and security denoted by blue and gold mockup of motherboard with lock]]></media:text>
                                <media:title type="plain"><![CDATA[Malware and security denoted by blue and gold mockup of motherboard with lock]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FRRDLEFjuVCi2yG5QJMqoU-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Novel social engineering attacks soar 135% amid uptake of generative AI ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/technology/artificial-intelligence-ai/370366/social-engineering-attacks-generative-ai-soar-135</link>
                                                                            <description>
                            <![CDATA[ 82% of employees are worried about hackers using generative AI to create scam emails ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9cQnS99X2wdNYiaMqhYwyW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/eNr8jgtoakTWYJA7GBQr6m-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 03 Apr 2023 07:00:06 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Artificial Intelligence]]></category>
                                                    <category><![CDATA[Technology]]></category>
                                                                                                                    <dc:creator><![CDATA[ Zach Marzouk ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/eNr8jgtoakTWYJA7GBQr6m-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Abstract image showing an envelope floating above digital blocks to symbolise phishing emails]]></media:description>                                                            <media:text><![CDATA[Abstract image showing an envelope floating above digital blocks to symbolise phishing emails]]></media:text>
                                <media:title type="plain"><![CDATA[Abstract image showing an envelope floating above digital blocks to symbolise phishing emails]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/eNr8jgtoakTWYJA7GBQr6m-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ CISA: Phishing campaign targeting US federal agencies went undetected for months ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/369942/cisa-phishing-campaign-federal-agencies-undetected-for-months</link>
                                                                            <description>
                            <![CDATA[ Threat actors used legitimate remote access software to maliciously target federal employees ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">gRhdcSP5BVzXPatsqLBvLs</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/oajyUSRG44FA5WTmRw4Jcg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 26 Jan 2023 13:08:42 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/oajyUSRG44FA5WTmRw4Jcg-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Abstract image of a fishing hook through a red email to represent a phishing attack]]></media:description>                                                            <media:text><![CDATA[Abstract image of a fishing hook through a red email to represent a phishing attack]]></media:text>
                                <media:title type="plain"><![CDATA[Abstract image of a fishing hook through a red email to represent a phishing attack]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/oajyUSRG44FA5WTmRw4Jcg-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google Ads malvertising campaign prompts questions around Search security ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/369892/google-ads-malvertising-campaign-prompts-questions-around-search-security</link>
                                                                            <description>
                            <![CDATA[ A leading security researcher has called into question why Google still allows malware links to top search results ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">5PuVkfbQkhJvcdrRaRKqs6</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/H2CzH5wHcCjNXMDWfqbmpX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 18 Jan 2023 12:59:28 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/H2CzH5wHcCjNXMDWfqbmpX-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Google logo shown on a landscape phone, held by a hand in silhouette against a dark blue background]]></media:description>                                                            <media:text><![CDATA[The Google logo shown on a landscape phone, held by a hand in silhouette against a dark blue background]]></media:text>
                                <media:title type="plain"><![CDATA[The Google logo shown on a landscape phone, held by a hand in silhouette against a dark blue background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/H2CzH5wHcCjNXMDWfqbmpX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Uber hacked via basic smishing attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/369091/uber-hack-started-with-smishing-social-engineering-attack</link>
                                                                            <description>
                            <![CDATA[ The self-taught hacker impersonated an IT worker to gain an Uber employee's password, obtaining broad access to internal systems and posting taunting messages ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vLbKrTfMtRYf5ycwWUEDhh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/PKwJ8kpXaP8pPN3aFsFbAK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 16 Sep 2022 11:25:01 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/PKwJ8kpXaP8pPN3aFsFbAK-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Black cards of Uber logos lined up in a row]]></media:description>                                                            <media:text><![CDATA[Black cards of Uber logos lined up in a row]]></media:text>
                                <media:title type="plain"><![CDATA[Black cards of Uber logos lined up in a row]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/PKwJ8kpXaP8pPN3aFsFbAK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Signal confirms 1,900 of its users were hit by Twilio breach ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/368815/signal-confirms-1900-users-impacted-by-twilio-breach</link>
                                                                            <description>
                            <![CDATA[ Last week's phishing attack on Twilio has exposed phone numbers exposed and compromised user accounts ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jZzZsHxtNptnmQut9gm4Vt</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/najgS7VeKqTawCG5Th9gXC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 16 Aug 2022 11:58:11 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/najgS7VeKqTawCG5Th9gXC-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A smartphone sat on top of a white keyboard with the Signal app logo superimposed onto the phone&amp;#039;s display - an image all set in dark blue and black lighting]]></media:description>                                                            <media:text><![CDATA[A smartphone sat on top of a white keyboard with the Signal app logo superimposed onto the phone&amp;#039;s display - an image all set in dark blue and black lighting]]></media:text>
                                <media:title type="plain"><![CDATA[A smartphone sat on top of a white keyboard with the Signal app logo superimposed onto the phone&amp;#039;s display - an image all set in dark blue and black lighting]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/najgS7VeKqTawCG5Th9gXC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Twilio account breach result of sophisticated social engineering campaign ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/368768/twilio-account-breach-result-of-sophisticated-social-engineering-campaign</link>
                                                                            <description>
                            <![CDATA[ Employees were subjected to personalised texts that impersonated Twilio's IT department, in a strategic credential harvesting operation ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">bAduugM21z9zexTEHn8NP4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QuF5R6vL3xkkxUAYNY8XSd-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 09 Aug 2022 10:32:42 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QuF5R6vL3xkkxUAYNY8XSd-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Man typing code on a laptop]]></media:description>                                                            <media:text><![CDATA[Man typing code on a laptop]]></media:text>
                                <media:title type="plain"><![CDATA[Man typing code on a laptop]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QuF5R6vL3xkkxUAYNY8XSd-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers hiding malicious links in top Google search results, researchers warn ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/368621/hackers-hiding-malicious-links-in-top-google-search-results</link>
                                                                            <description>
                            <![CDATA[ Malicious adverts made to resemble links to websites are targeting some of the world’s most popular websites ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">nCRefqmh6MDgEgK8MJrmQk</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/gVasdn9tFbj3pTsMGTj2TP-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 21 Jul 2022 14:48:25 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Malware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/gVasdn9tFbj3pTsMGTj2TP-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A phone showing the google homepage is held in someone&amp;#039;s hand in close-up, with a dimly-lit red wall in the background]]></media:description>                                                            <media:text><![CDATA[A phone showing the google homepage is held in someone&amp;#039;s hand in close-up, with a dimly-lit red wall in the background]]></media:text>
                                <media:title type="plain"><![CDATA[A phone showing the google homepage is held in someone&amp;#039;s hand in close-up, with a dimly-lit red wall in the background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/gVasdn9tFbj3pTsMGTj2TP-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Roblox hacker posts stolen documents online ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/368570/roblox-hacker-posts-stolen-documents-online</link>
                                                                            <description>
                            <![CDATA[ The company said that it has been investigating a phishing incident in which an employee was targeted through social engineering ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9KMC5w5oityezXFqJKumj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/E7KidiHhAmqLrjK5Uncted-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 18 Jul 2022 09:54:08 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Zach Marzouk ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/E7KidiHhAmqLrjK5Uncted-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A smartphone with Roblox characters and logo on the screen]]></media:description>                                                            <media:text><![CDATA[A smartphone with Roblox characters and logo on the screen]]></media:text>
                                <media:title type="plain"><![CDATA[A smartphone with Roblox characters and logo on the screen]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/E7KidiHhAmqLrjK5Uncted-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Marriott hit by data breach through social engineering ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/368456/marriott-hit-by-data-breach-through-social-engineering</link>
                                                                            <description>
                            <![CDATA[ Unknown attackers were reportedly able to exfiltrate 20GB of information from the company ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">dvcgK8tKUiapA6TiovgJzn</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/CFxwA7UAstGuhYrP76KiES-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 06 Jul 2022 11:22:36 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Zach Marzouk ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/CFxwA7UAstGuhYrP76KiES-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Marriott International logo as seen on one of its hotels]]></media:description>                                                            <media:text><![CDATA[The Marriott International logo as seen on one of its hotels]]></media:text>
                                <media:title type="plain"><![CDATA[The Marriott International logo as seen on one of its hotels]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/CFxwA7UAstGuhYrP76KiES-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ BRATA malware has evolved to target online banking across Europe, researchers warn ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/368330/brata-malware-has-evolved-to-target-online-banking</link>
                                                                            <description>
                            <![CDATA[ The new variant can now access SMS, GPS, and device control to better steal financial data ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">kymLkrtaBkhXie5yhAfKFF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/vmH28pzrtFdvcUoS5Rnk6B-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 21 Jun 2022 13:43:21 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/vmH28pzrtFdvcUoS5Rnk6B-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An animated mockup of a login in form being lifted out of a laptop screen to symbolise a phishing attack]]></media:description>                                                            <media:text><![CDATA[An animated mockup of a login in form being lifted out of a laptop screen to symbolise a phishing attack]]></media:text>
                                <media:title type="plain"><![CDATA[An animated mockup of a login in form being lifted out of a laptop screen to symbolise a phishing attack]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/vmH28pzrtFdvcUoS5Rnk6B-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security BSides commits to greater conference diversity after speaker backlash ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-security/368327/security-bsides-conference-diversity-after-speaker-backlash</link>
                                                                            <description>
                            <![CDATA[ A surprise booking of a divisive social engineer prompted a number of cyber security experts to pull out of BSides Cleveland ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">kRpiWLT2rv85Ni6GcAuLi7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/XWquzj52tUqi8c5SQFJHdc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 21 Jun 2022 10:47:14 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/XWquzj52tUqi8c5SQFJHdc-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A close up of a man stood at lectern speaking at business conference]]></media:description>                                                            <media:text><![CDATA[A close up of a man stood at lectern speaking at business conference]]></media:text>
                                <media:title type="plain"><![CDATA[A close up of a man stood at lectern speaking at business conference]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/XWquzj52tUqi8c5SQFJHdc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Deepfake attacks expected to be next major threat to businesses ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/368299/deepfake-attacks-expected-to-be-next-big-threat-to-businesses</link>
                                                                            <description>
                            <![CDATA[ Cisco’s cyber security experts agreed that social norms may also become “super weird” as a result ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">w9Re8JS8C8n1fqPDgFFV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/NEaP2bkgWaYcnUW3jeQDTL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 16 Jun 2022 08:51:43 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/NEaP2bkgWaYcnUW3jeQDTL-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An abstract image showing two digital faces looking at each other]]></media:description>                                                            <media:text><![CDATA[An abstract image showing two digital faces looking at each other]]></media:text>
                                <media:title type="plain"><![CDATA[An abstract image showing two digital faces looking at each other]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/NEaP2bkgWaYcnUW3jeQDTL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ LAPSUS$ breached T-Mobile systems, stole source code ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/367483/lapsus-breached-t-mobile-systems-stole-source-code</link>
                                                                            <description>
                            <![CDATA[ T-Mobile has denied that the hackers obtained customer or government information ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">2Fcn3q3Ahi8FtWUUDpSWxH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zRLtQpjde4eD4Rxqtkapzc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 25 Apr 2022 11:23:26 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sabina Weston ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zRLtQpjde4eD4Rxqtkapzc-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A pink T-Mobile logo on a storefront in Aachen, Germany]]></media:description>                                                            <media:text><![CDATA[A pink T-Mobile logo on a storefront in Aachen, Germany]]></media:text>
                                <media:title type="plain"><![CDATA[A pink T-Mobile logo on a storefront in Aachen, Germany]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zRLtQpjde4eD4Rxqtkapzc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ IT Pro 20/20: The new frontier of innovation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/hardware/362979/it-pro-2020-the-new-frontier-of-innovation</link>
                                                                            <description>
                            <![CDATA[ Businesses are putting green tech at their heart of their buying decisions, and manufacturers and paying attention ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3Hw5YYDLsAqWCeqd41bWG8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/djYrrSSs7crFEWKMBxSgVk-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 23 Feb 2022 12:28:01 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Dale Walker ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/djYrrSSs7crFEWKMBxSgVk-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[IT Pro 20/20: The new frontier of innovation]]></media:description>                                                            <media:text><![CDATA[IT Pro 20/20: The new frontier of innovation]]></media:text>
                                <media:title type="plain"><![CDATA[IT Pro 20/20: The new frontier of innovation]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/djYrrSSs7crFEWKMBxSgVk-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ LinkedIn phishing attacks have surged 232% since start of February ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/362291/linkedin-phishing-attacks-increased-by-232-in-february</link>
                                                                            <description>
                            <![CDATA[ Hackers are tricking users into clicking on fake LinkedIn alerts in an effort to steal login information ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">uatpPFhLH7REHnLk9kesvF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/3ovKafEKKxutjECgSx7y9N-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 17 Feb 2022 12:47:31 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Zach Marzouk ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/3ovKafEKKxutjECgSx7y9N-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The LinkedIn logo displayed on a smartphone resting on a keyboard]]></media:description>                                                            <media:text><![CDATA[The LinkedIn logo displayed on a smartphone resting on a keyboard]]></media:text>
                                <media:title type="plain"><![CDATA[The LinkedIn logo displayed on a smartphone resting on a keyboard]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/3ovKafEKKxutjECgSx7y9N-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ A month in the life of a social engineer – part one ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/social-engineering/361911/month-in-the-life-of-social-engineer-week-one</link>
                                                                            <description>
                            <![CDATA[ With hackers finding more ingenious ways to exploit human flaws, we get inside the planning stages of a social engineering attack ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mZrd9tGzmrCpz2YgXkrFPB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/TAKzjjQEdiyosJwT5XWDgZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 06 Jan 2022 09:11:08 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Jane Hoskyn ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/TAKzjjQEdiyosJwT5XWDgZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The outline of a mysterious figure surrounded by red and blue lights]]></media:description>                                                            <media:text><![CDATA[The outline of a mysterious figure surrounded by red and blue lights]]></media:text>
                                <media:title type="plain"><![CDATA[The outline of a mysterious figure surrounded by red and blue lights]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/TAKzjjQEdiyosJwT5XWDgZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Education and government most at risk from email threats ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/361663/education-and-government-most-at-risk-from-email-threats</link>
                                                                            <description>
                            <![CDATA[ New report finds phishing remains most dominant threat to IT security ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vNnC2PPzH3zWJLmgzSueM4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/oajyUSRG44FA5WTmRw4Jcg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 26 Nov 2021 09:48:19 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rene Millman ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/oajyUSRG44FA5WTmRw4Jcg-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Abstract image of a fishing hook through a red email to represent a phishing attack]]></media:description>                                                            <media:text><![CDATA[Abstract image of a fishing hook through a red email to represent a phishing attack]]></media:text>
                                <media:title type="plain"><![CDATA[Abstract image of a fishing hook through a red email to represent a phishing attack]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/oajyUSRG44FA5WTmRw4Jcg-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Robinhood hack exposes data from millions of customers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/361479/robinhood-hack-social-engineering-exposes-millions-customers</link>
                                                                            <description>
                            <![CDATA[ An attacker socially engineered an employee at the stock-trading platform to gain access to customer support systems ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ofhoGcxM4WcCAsn4z5NcPz</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/fdppapxuM6M8ViJVosgUhT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 09 Nov 2021 10:53:04 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Zach Marzouk ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/fdppapxuM6M8ViJVosgUhT-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Robinhood logo displayed on a mobile phone with a stock trading chart in the background]]></media:description>                                                            <media:text><![CDATA[The Robinhood logo displayed on a mobile phone with a stock trading chart in the background]]></media:text>
                                <media:title type="plain"><![CDATA[The Robinhood logo displayed on a mobile phone with a stock trading chart in the background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/fdppapxuM6M8ViJVosgUhT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft warns of dangerous ‘BazaCall’ call centre ransomware scam ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/360428/microsoft-warns-of-dangerous-bazacall-call-centre-ransomware-scam</link>
                                                                            <description>
                            <![CDATA[ Human operators are tricking victims into manually downloading malware onto their systems ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vPjdXSQ2Cy6euaco1bXEWH</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/VESrDDAbYw2rrajvhqwvY9-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 30 Jul 2021 09:56:27 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keumars Afifi-Sabet ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/VESrDDAbYw2rrajvhqwvY9-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A fraudulent call centre agent in a dark room surrounded by monitors]]></media:description>                                                            <media:text><![CDATA[A fraudulent call centre agent in a dark room surrounded by monitors]]></media:text>
                                <media:title type="plain"><![CDATA[A fraudulent call centre agent in a dark room surrounded by monitors]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/VESrDDAbYw2rrajvhqwvY9-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers target US taxpayers with NetWire and Remcos malware ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/malware/358961/hackers-target-us-taxpayers-with-netwire-and-remcos-malware</link>
                                                                            <description>
                            <![CDATA[ Attackers are attempting to lure victims with malware-laced Word documents that purport to contain tax-related content ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">quqV6FVHHpRpnhgcSc6aif</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/vpHsn9vsq2uzXyRNKTvGs4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 19 Mar 2021 12:53:12 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rene Millman ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/vpHsn9vsq2uzXyRNKTvGs4-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Malware in code ]]></media:description>                                                            <media:text><![CDATA[Malware in code ]]></media:text>
                                <media:title type="plain"><![CDATA[Malware in code ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/vpHsn9vsq2uzXyRNKTvGs4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft remains the most-spoofed brand for the second quarter in a row ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/358316/microsoft-the-most-phished-brand-for-the-second-quarter-in-a-row</link>
                                                                            <description>
                            <![CDATA[ Malicious use of the tech giant's brand increased by 24% in the last quarter of 2020, according to Check Point ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">r4nqMvh1CrBNF7HJg77iNf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/bRe7SSwuWFQGLMoRXKUNRb-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 14 Jan 2021 12:53:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bobby Hellard ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/bRe7SSwuWFQGLMoRXKUNRb-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A sign in page for a Microsoft service ]]></media:description>                                                            <media:text><![CDATA[A sign in page for a Microsoft service ]]></media:text>
                                <media:title type="plain"><![CDATA[A sign in page for a Microsoft service ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/bRe7SSwuWFQGLMoRXKUNRb-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The IT Pro Podcast: The power of disinformation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/marketing-comms/social-media/358088/the-it-pro-podcast-the-power-of-disinformation</link>
                                                                            <description>
                            <![CDATA[ Social media is a great innovation - but falsehoods and manipulation are rife ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9DJ5KRb81kiAFDhQRuSsRu</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/qEE2TWDyCD6FuV7ppeaLkC-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 11 Dec 2020 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Social Media]]></category>
                                                    <category><![CDATA[Technology]]></category>
                                                                                                                    <dc:creator><![CDATA[ IT Pro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/qEE2TWDyCD6FuV7ppeaLkC-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The IT Pro Podcast: The power of disinformation]]></media:description>                                                            <media:text><![CDATA[The IT Pro Podcast: The power of disinformation]]></media:text>
                                <media:title type="plain"><![CDATA[The IT Pro Podcast: The power of disinformation]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/qEE2TWDyCD6FuV7ppeaLkC-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ More than half of businesses saw rising fraud levels this year ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/357866/one-in-two-businesses-witnessed-rise-in-fraud-levels-this-year</link>
                                                                            <description>
                            <![CDATA[ Each individual identity fraud attempt could cost an organisation between £1,000 and £4,999 on average ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eeEdGCBVY5vVKnwUSBsP7N</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/AEaJn4dBVm2zS6KPMMVaVW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 23 Nov 2020 12:14:58 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Sabina Weston ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/AEaJn4dBVm2zS6KPMMVaVW-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A graphic presenting two people emerging from laptops with one person being a criminal posing as a customer]]></media:description>                                                            <media:text><![CDATA[A graphic presenting two people emerging from laptops with one person being a criminal posing as a customer]]></media:text>
                                <media:title type="plain"><![CDATA[A graphic presenting two people emerging from laptops with one person being a criminal posing as a customer]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/AEaJn4dBVm2zS6KPMMVaVW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Twitter investigates possibility that DMs were accessed during Bitcoin hack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/356472/twitter-targeted-by-social-engineering-attack-as-hackers-launch</link>
                                                                            <description>
                            <![CDATA[ Twitter maintains the attack was the result of 'social engineering', although reports suggest an employee may have been bribed ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">7gZAUxGPBpfRJWXQEBdrEX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/sALtP3tiD8GGSo385E6757-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Thu, 16 Jul 2020 09:24:27 +0000</pubDate>                                                                                                                                <updated>Fri, 17 Jul 2020 09:42:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keumars Afifi-Sabet ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/sALtP3tiD8GGSo385E6757-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                        <media:description><![CDATA[Screenshots of compromised accounts, obtained through Twitter]]></media:description>                                                            <media:text><![CDATA[The Twitter logo in the background of a a coin representing the physical embodiment of Bitcoin]]></media:text>
                                <media:title type="plain"><![CDATA[The Twitter logo in the background of a a coin representing the physical embodiment of Bitcoin]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/sALtP3tiD8GGSo385E6757-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Four quick tips to create an unbreakable password ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-security/354918/four-quick-tips-to-create-an-unbreakable-password</link>
                                                                            <description>
                            <![CDATA[ Sink password pirates with these password-creation tips ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3BKNPXuaSBCHC79Sm15rK3</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/nZqCzb7fAkhNFke8buoeeH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 04 Mar 2020 20:31:19 +0000</pubDate>                                                                                                                                <updated>Thu, 20 May 2021 20:31:19 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                                                                                    <dc:creator><![CDATA[ Justin Cupler ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/nZqCzb7fAkhNFke8buoeeH-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A website showing a sign in form with the password hidden]]></media:description>                                                            <media:text><![CDATA[A website showing a sign in form with the password hidden]]></media:text>
                                <media:title type="plain"><![CDATA[A website showing a sign in form with the password hidden]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/nZqCzb7fAkhNFke8buoeeH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Businesses stung by highly convincing Office 365 voicemail scam ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/phishing/34723/businesses-stung-by-highly-convincing-office-365-voicemail-scam</link>
                                                                            <description>
                            <![CDATA[ This latest wave of phishing attacks incorporates real audio recordings to create a sense of urgency ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jsvJjzoUBfoS1qw8x3uE2D</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/hSLnVL4CLBnx7xHzdFbCUM-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 31 Oct 2019 12:26:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keumars Afifi-Sabet ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/hSLnVL4CLBnx7xHzdFbCUM-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                                                                                                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/hSLnVL4CLBnx7xHzdFbCUM-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ How do hackers get your passwords? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/34616/the-top-password-cracking-techniques-used-by-hackers</link>
                                                                            <description>
                            <![CDATA[ Knowing how hackers get passwords, or at least the most common methods used, could help you keep yours safe from predatory cyber criminals ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4PrDC9RGfZQFJnxU2cBoB5</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6dPwiZwS44BaYhycKNoFrN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 14 Oct 2019 09:55:00 +0000</pubDate>                                                                                                                                <updated>Thu, 31 Aug 2023 14:43:48 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ dale.walker@futurenet.com (Dale Walker) ]]></author>                    <dc:creator><![CDATA[ Dale Walker ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6dPwiZwS44BaYhycKNoFrN-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A list of simple strings of text and numbers on a notepad that are being used to hack a password]]></media:description>                                                            <media:text><![CDATA[A list of simple strings of text and numbers on a notepad that are being used to hack a password]]></media:text>
                                <media:title type="plain"><![CDATA[A list of simple strings of text and numbers on a notepad that are being used to hack a password]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6dPwiZwS44BaYhycKNoFrN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NHS staff issued with fresh cyber security guidance ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/34475/nhs-staff-issued-with-fresh-cyber-security-guidance</link>
                                                                            <description>
                            <![CDATA[ New campaign focuses on password security, phishing, social engineering, and on-site 'tailgating' ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">35Zq112de86rTj9A8e1Xev</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/62cgAqbmJbLF3WAb8Y6wVF-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 23 Sep 2019 11:41:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keumars Afifi-Sabet ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/62cgAqbmJbLF3WAb8Y6wVF-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                                                                                                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/62cgAqbmJbLF3WAb8Y6wVF-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>