<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/security/feed" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro ]]></title>
                <link>https://www.itpro.com/security/feed</link>
        <description><![CDATA[ All the latest content from the ITPro team ]]></description>
                                    <lastBuildDate>Fri, 17 Apr 2026 11:37:23 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ The race to become quantum-safe ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-race-to-become-quantum-safe</link>
                                                                            <description>
                            <![CDATA[ Efforts to run AI in trusted regions can clash with access to frontier model updates, business scalability ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mqhk2ZQDzeuB9kmaBrG8FQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/sbR2XhcDWZzbmY4ERVqobZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 17 Apr 2026 11:37:23 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/sbR2XhcDWZzbmY4ERVqobZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The text &quot;The race to become quantum-safe&quot; against a blue ECC graph, with the ITPro Podcast logo in the corner. The words &quot;quantum-safe&quot; are in yellow, the rest are in white.]]></media:description>                                                            <media:text><![CDATA[The text &quot;The race to become quantum-safe&quot; against a blue ECC graph, with the ITPro Podcast logo in the corner. The words &quot;quantum-safe&quot; are in yellow, the rest are in white.]]></media:text>
                                <media:title type="plain"><![CDATA[The text &quot;The race to become quantum-safe&quot; against a blue ECC graph, with the ITPro Podcast logo in the corner. The words &quot;quantum-safe&quot; are in yellow, the rest are in white.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/sbR2XhcDWZzbmY4ERVqobZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Tycoon 2FA is down, but not out – researchers warn the phishing as a service operation is still a huge threat to businesses ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/tycoon-2fa-phishing-risk-takedown-barracuda</link>
                                                                            <description>
                            <![CDATA[ Millions of Tycoon 2FA attacks are still hitting businesses, according to research from Barracuda ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vXDsxDKKWbMUkuvkVXXwHC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 17 Apr 2026 11:05:53 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing attack concept image showing an email symbol with red alert symbol on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/FEpm7PoPiWegwbyvEVshN7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI is now a ‘standard part of the attacker toolkit’ ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-is-now-a-standard-part-of-the-attacker-toolkit</link>
                                                                            <description>
                            <![CDATA[ Cyber attacks are increasing in scale, intensity, and velocity thanks to AI, and it’s forcing defenders to react faster than ever before ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">DqEmGSrrE9d4TbkQUfA2TR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/YZjwEwYDJbKftH9VvKGnNZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 16 Apr 2026 13:46:59 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/YZjwEwYDJbKftH9VvKGnNZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Digital technology toolkit symbol surrounded by email, internet, telephone, and communications symbols. ]]></media:description>                                                            <media:text><![CDATA[Digital technology toolkit symbol surrounded by email, internet, telephone, and communications symbols. ]]></media:text>
                                <media:title type="plain"><![CDATA[Digital technology toolkit symbol surrounded by email, internet, telephone, and communications symbols. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/YZjwEwYDJbKftH9VvKGnNZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NIST is overhauling the National Vulnerability Database due to skyrocketing reports – experts worry it will ‘leave many CVEs on the table’ ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/nist-national-vulnerability-database-overhaul-increased-cve-submissions</link>
                                                                            <description>
                            <![CDATA[ Drowning in CVEs, the NIST agency will now fully analyze only the most severe vulnerabilities ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">3Lam554yt6kJYYjv5YT2A8</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/cVdekj6xWYLY3nH5Lam3vZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 16 Apr 2026 11:11:04 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/cVdekj6xWYLY3nH5Lam3vZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Red glowing fiber optic cables touching a screen with computer source code and highlighting code snippet in red. ]]></media:description>                                                            <media:text><![CDATA[Red glowing fiber optic cables touching a screen with computer source code and highlighting code snippet in red. ]]></media:text>
                                <media:title type="plain"><![CDATA[Red glowing fiber optic cables touching a screen with computer source code and highlighting code snippet in red. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/cVdekj6xWYLY3nH5Lam3vZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI and Data are reshaping the MSP landscape, but hackers are getting in on the hot AI action ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-and-data-are-reshaping-the-msp-landscape-but-hackers-are-getting-in-on-the-hot-ai-action</link>
                                                                            <description>
                            <![CDATA[ AI is no longer just a buzzword; it's a hacker's dream and the channel's biggest opportunity ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mUbhnMn8zbQFxvU3uEVKxe</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mUyZnUdbkdkCc9yQXwt7cX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Apr 2026 14:39:04 +0000</pubDate>                                                                                                                                <updated>Wed, 15 Apr 2026 14:47:39 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (Rene Millman) ]]></author>                    <dc:creator><![CDATA[ Rene Millman ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mUyZnUdbkdkCc9yQXwt7cX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An abstract image of green code with two blue speech bubbles on top, one reading &#039;AI&#039; and the other showing three dots.]]></media:description>                                                            <media:text><![CDATA[An abstract image of green code with two blue speech bubbles on top, one reading &#039;AI&#039; and the other showing three dots.]]></media:text>
                                <media:title type="plain"><![CDATA[An abstract image of green code with two blue speech bubbles on top, one reading &#039;AI&#039; and the other showing three dots.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mUyZnUdbkdkCc9yQXwt7cX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI agents using Anthropic MCP could be a vector for supply chain attacks, claim researchers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-agents-using-anthropic-mcp-supply-chain-attacks-claim-researchers</link>
                                                                            <description>
                            <![CDATA[ The flaw in Anthropic’s Model Context Protocol agent communication standard could put millions of agents and 200,000 servers at risk, report says ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">pCRDgxhtKFCjEcbXEWtrjJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/B5sequrZU2Sim7e6k6gTnH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Apr 2026 13:32:17 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ jane.mccallion@futurenet.com (Jane McCallion) ]]></author>                    <dc:creator><![CDATA[ Jane McCallion ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/B5sequrZU2Sim7e6k6gTnH-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Anthropic logo, in white on a dark background lit by a web-like light.]]></media:description>                                                            <media:text><![CDATA[The Anthropic logo, in white on a dark background lit by a web-like light.]]></media:text>
                                <media:title type="plain"><![CDATA[The Anthropic logo, in white on a dark background lit by a web-like light.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/B5sequrZU2Sim7e6k6gTnH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Brace yourselves for a vulnerability explosion, Forescout warns ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/brace-yourselves-for-a-vulnerability-explosion-forescout-warns</link>
                                                                            <description>
                            <![CDATA[ AI advances are helping identify software flaws at record pace and scale, but that's not the good news some would think ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">B5ZMSGYc6xxyRVXqD2VVdB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ti9GYKR64HDc4yjvanrRyJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Apr 2026 13:26:20 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ti9GYKR64HDc4yjvanrRyJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[the Forescout logo]]></media:description>                                                            <media:text><![CDATA[the Forescout logo]]></media:text>
                                <media:title type="plain"><![CDATA[the Forescout logo]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ti9GYKR64HDc4yjvanrRyJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Security leaders overconfident about ransomware recovery ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/security-leaders-overconfident-about-ransomware-recovery</link>
                                                                            <description>
                            <![CDATA[ Few manage to recover all their data, and many experience business disruption ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">bV89CY9avfhwgcdKxFmGWV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 15 Apr 2026 12:21:24 +0000</pubDate>                                                                                                                                <updated>Wed, 15 Apr 2026 13:30:22 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:description>                                                            <media:text><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ransomware concept image showing a warning symbol in red with binary code in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LrXBU2G7X45b6NeaQsxQsN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Most organizations make a mess of handling digital disruption ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/most-organizations-make-a-mess-of-handling-digital-disruption</link>
                                                                            <description>
                            <![CDATA[ Poor governance and a lack of collaboration with suppliers and partners can lead to disaster ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">owBpxF4E8GNwJ54H7iBFFh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/R9xjBCdRw6ruDKaYUtp4c4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 14 Apr 2026 13:00:11 +0000</pubDate>                                                                                                                                <updated>Tue, 14 Apr 2026 14:02:42 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/R9xjBCdRw6ruDKaYUtp4c4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity alert concept image showing a red glowing warning symbol placed on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity alert concept image showing a red glowing warning symbol placed on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity alert concept image showing a red glowing warning symbol placed on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/R9xjBCdRw6ruDKaYUtp4c4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Only 34% of cyber professionals plan to stay in their current role ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/only-34-percent-of-cyber-professionals-plan-to-stay-in-their-current-role</link>
                                                                            <description>
                            <![CDATA[ Offer regular wage progression, invest in culture and security, and offer flexible work arrangements if you want them to stay, advises IANS. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fPLw6vKVKejYwD9pnmdgv6</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/c4vixg5fYCJtq279vimmp8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 14 Apr 2026 12:24:34 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/c4vixg5fYCJtq279vimmp8-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[An illustration of three office workers dashing between one red doorway and into another, to represent professionals leaving their roles.]]></media:description>                                                            <media:text><![CDATA[An illustration of three office workers dashing between one red doorway and into another, to represent professionals leaving their roles.]]></media:text>
                                <media:title type="plain"><![CDATA[An illustration of three office workers dashing between one red doorway and into another, to represent professionals leaving their roles.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/c4vixg5fYCJtq279vimmp8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ How the explosion in machine identities is changing cyber defense ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/how-machine-identities-changing-cyber-defense</link>
                                                                            <description>
                            <![CDATA[ The rapid adoption of machine identities such as AI agents is creating new vulnerabilities and fresh challenges for IT teams ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">PxskTThjGGy5ef9P4ZDoo7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/44bS4XVWGfXnqLkeywEJkm-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 13 Apr 2026 12:20:16 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Justin Pugsley ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/44bS4XVWGfXnqLkeywEJkm-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A visualization of machine identities, shown as blue nodes in the shape of the world with code surrounding them, against a black background.]]></media:description>                                                            <media:text><![CDATA[A visualization of machine identities, shown as blue nodes in the shape of the world with code surrounding them, against a black background.]]></media:text>
                                <media:title type="plain"><![CDATA[A visualization of machine identities, shown as blue nodes in the shape of the world with code surrounding them, against a black background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/44bS4XVWGfXnqLkeywEJkm-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Beyond wipers: Iran-backed cyber attacks and the threat to businesses ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/beyond-wipers-iran-backed-cyber-attacks-and-the-threat-to-businesses</link>
                                                                            <description>
                            <![CDATA[ What’s the real risk to business in the US and UK during this critical situation? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ZSqjakTNDPMf7AhXB8NrHC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/VHuoRHN7D2BMLU3pbN3Xv4-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:54:47 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Apr 2026 10:57:36 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/VHuoRHN7D2BMLU3pbN3Xv4-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A stylized image showing a glowing red cyber attack warning on top of a reflective metal surface bearing the flag of Iran.]]></media:description>                                                            <media:text><![CDATA[A stylized image showing a glowing red cyber attack warning on top of a reflective metal surface bearing the flag of Iran.]]></media:text>
                                <media:title type="plain"><![CDATA[A stylized image showing a glowing red cyber attack warning on top of a reflective metal surface bearing the flag of Iran.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/VHuoRHN7D2BMLU3pbN3Xv4-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI is raising the stakes for cyber professionals – Claude Mythos just took things to another level ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-is-raising-the-stakes-for-cyber-professionals-claude-mythos-just-took-things-to-another-level</link>
                                                                            <description>
                            <![CDATA[ AI efficiency gains work both ways, and threat actors are already capitalizing on powerful new tools ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">dBWcYZ5aLKUG9LP9zn3Zb4</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/obPtLjrgVEbzsKJRkqAVKS-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:39:34 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/obPtLjrgVEbzsKJRkqAVKS-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Anthropic logo and branding pictured on a smartphone screen placed on a reflective surface.]]></media:description>                                                            <media:text><![CDATA[Anthropic logo and branding pictured on a smartphone screen placed on a reflective surface.]]></media:text>
                                <media:title type="plain"><![CDATA[Anthropic logo and branding pictured on a smartphone screen placed on a reflective surface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/obPtLjrgVEbzsKJRkqAVKS-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Zephyr Energy hackers swiped £700,000 after redirecting a contractor payment ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/zephyr-energy-hackers-swiped-gbp700-000-after-redirecting-a-contractor-payment</link>
                                                                            <description>
                            <![CDATA[ Payment to a Zephyr Energy contractor was siphoned off, but the incident has been contained and new security measures implemented ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">m6aEtDpzcUUX6suSr8UbWg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Apr 2026 10:17:04 +0000</pubDate>                                                                                                                                <updated>Fri, 10 Apr 2026 10:45:34 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:description>                                                            <media:text><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Email security attack concept image showing mail symbol with a red warning symbol imposed over a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/MY2WgJEVTBewbYoYNy8qFJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Agent identity governance can't keeping up with adoption rates – and it’s creating a security nightmare ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/agent-identity-governance-cant-keeping-up-with-adoption-rates-and-its-creating-a-security-nightmare</link>
                                                                            <description>
                            <![CDATA[ Enterprises are leaving high-privilege keys unchanged for months or years at a time ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">N82g7W3zaCU9k6GTFjUXbE</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zY3UeEvLTfczgZYTQY6hh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Apr 2026 11:37:17 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zY3UeEvLTfczgZYTQY6hh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Identity security concept image showing a fingerprint placed on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[Identity security concept image showing a fingerprint placed on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[Identity security concept image showing a fingerprint placed on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zY3UeEvLTfczgZYTQY6hh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Why incident response has become a core responsibility for MSPs ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/why-incident-response-has-become-a-core-responsibility-for-msps</link>
                                                                            <description>
                            <![CDATA[ MSPs must prioritise incident response as core capability amid rising cyber threats ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">PABAqp8dpYi6cBwutrqXbL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/gAZQGXquzahjQHwSbSp9WN-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Apr 2026 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Phil Chapman ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/gAZQGXquzahjQHwSbSp9WN-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Neon blue padlock with code flowing over it, floating above small plinths raised at different heights, each with code underneath their platforms]]></media:description>                                                            <media:text><![CDATA[Neon blue padlock with code flowing over it, floating above small plinths raised at different heights, each with code underneath their platforms]]></media:text>
                                <media:title type="plain"><![CDATA[Neon blue padlock with code flowing over it, floating above small plinths raised at different heights, each with code underneath their platforms]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/gAZQGXquzahjQHwSbSp9WN-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC issues alert over Russian hacker campaign targeting SOHO routers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ncsc-issues-alert-over-russian-hacker-campaign-targeting-soho-routers</link>
                                                                            <description>
                            <![CDATA[ The APT28 group has exploited vulnerable internet routers to covertly reroute internet traffic through malicious servers ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zMzke9FPNtPBx5CW9Pdyrb</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 08 Apr 2026 09:46:20 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:description>                                                            <media:text><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of the UK&#039;s National Cyber Security Centre (NCSC) pictured on a television screen in London, England. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/upmScpMzZKB4C5Wt2y3h7N-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ German authorities want your help finding the hackers behind GandCrab and REvil  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ransomware/german-authorities-want-your-help-finding-the-hackers-behind-gandcrab-and-revil</link>
                                                                            <description>
                            <![CDATA[ Daniil Maksimovich Shchukin and Anatoly Sergeevitsch Kravchuk are believed to have made millions from ransomware as a service schemes ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fdDCDsuwTqeNGjcqnLSn5n</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 07 Apr 2026 11:12:24 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Ransomware]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:description>                                                            <media:text><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker concept image showing silhouette of a hooded individual using a laptop computer with binary code imposed against a red backdrop. ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pjqoPws66yCB4ujEfq3dte-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ "If you think your day to day job as a CISO is hard, wait until you're dealing with a major breach": why your business needs cyber insurance ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/why-your-business-needs-cyber-insurance</link>
                                                                            <description>
                            <![CDATA[ As the cyber insurance market matures, do firms actually need it and if so, how should they choose a policy? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jXdMuyyrUfAef5DdgWC2bM</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LfC7XKNUhPuUKbdrGBq4uK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 03 Apr 2026 07:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LfC7XKNUhPuUKbdrGBq4uK-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A CGI shield stylized like a computer chip, hovering above polished blue metal, to represent cyber insurance.]]></media:description>                                                            <media:text><![CDATA[A CGI shield stylized like a computer chip, hovering above polished blue metal, to represent cyber insurance.]]></media:text>
                                <media:title type="plain"><![CDATA[A CGI shield stylized like a computer chip, hovering above polished blue metal, to represent cyber insurance.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LfC7XKNUhPuUKbdrGBq4uK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft and NCSC issue alerts over hacker campaigns targeting WhatsApp, Signal messaging apps ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/microsoft-and-ncsc-issue-alerts-over-hacker-campaigns-targeting-whatsapp-signal-messaging-apps</link>
                                                                            <description>
                            <![CDATA[ Microsoft warns about a sophisticated attack that starts with WhatsApp messages, while the NCSC says such incidents are on the rise ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">LJTnJm6NstRzVvKFnCmeyd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Pxt7furBergTPQRSi3WUA-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 03 Apr 2026 06:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Pxt7furBergTPQRSi3WUA-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[iOS app icons for WhatsApp and Signal messaging platforms, with top half of Instagram icon pictured in bottom right hand corner.]]></media:description>                                                            <media:text><![CDATA[iOS app icons for WhatsApp and Signal messaging platforms, with top half of Instagram icon pictured in bottom right hand corner.]]></media:text>
                                <media:title type="plain"><![CDATA[iOS app icons for WhatsApp and Signal messaging platforms, with top half of Instagram icon pictured in bottom right hand corner.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Pxt7furBergTPQRSi3WUA-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Everything we know about the Hasbro hack so far ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/everything-we-know-about-the-hasbro-hack-so-far</link>
                                                                            <description>
                            <![CDATA[ The toy-maker keeps running thanks to business continuity plans, but nature of attack remains unclear ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">pq7yt8ovg9sPv6isiVGHmW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/TtnikUHZqpREnPmBqPrYie-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 02 Apr 2026 11:55:20 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/TtnikUHZqpREnPmBqPrYie-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Illuminated Hasbro sign at Comic-Con International in San Diego, California.]]></media:description>                                                            <media:text><![CDATA[Illuminated Hasbro sign at Comic-Con International in San Diego, California.]]></media:text>
                                <media:title type="plain"><![CDATA[Illuminated Hasbro sign at Comic-Con International in San Diego, California.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/TtnikUHZqpREnPmBqPrYie-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Proton is launching its own ‘private alternative’ to Google Workspace and Microsoft 365 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/proton-is-launching-its-own-private-alternative-to-google-workspace-and-microsoft-365</link>
                                                                            <description>
                            <![CDATA[ The launch of Proton Workspace comes amid rising tensions over data sovereignty and privacy ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ZobRzdLbNTxJQReKuk3cpR</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/u2PDmAGAXR36UZCRJhSNzf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 02 Apr 2026 09:54:59 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/u2PDmAGAXR36UZCRJhSNzf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Proton logo and branding, including &#039;Privacy by Default&#039; term, pictured in blue lettering on a white wall.]]></media:description>                                                            <media:text><![CDATA[Proton logo and branding, including &#039;Privacy by Default&#039; term, pictured in blue lettering on a white wall.]]></media:text>
                                <media:title type="plain"><![CDATA[Proton logo and branding, including &#039;Privacy by Default&#039; term, pictured in blue lettering on a white wall.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/u2PDmAGAXR36UZCRJhSNzf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 78% of UK manufacturers have experienced a cyber incident in the last year – and more than half have taken a revenue hit ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/78-percent-of-uk-manufacturers-have-experienced-a-cyber-incident-in-the-last-year-and-more-than-half-have-taken-a-revenue-hit</link>
                                                                            <description>
                            <![CDATA[ Last year's attack on Jaguar Land Rover shows the costs can be very significant indeed ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ht53X8coopDXx6QSFPRBKf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 01 Apr 2026 23:05:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:description>                                                            <media:text><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:text>
                                <media:title type="plain"><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘There was a manual deploy step that should have been better automated’: Claude Code creator confirms cause of massive source code leak  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/there-was-a-manual-deploy-step-that-should-have-been-better-automated-claude-code-creator-confirms-cause-of-massive-source-code-leak</link>
                                                                            <description>
                            <![CDATA[ Over half a million lines of Claude Code source code was leaked, with the company attributing the blunder to human error ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4p7UxnQFNVUTER5HGoCWaC</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/bKWbECsE5Qnj7e5jMR7JqR-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 01 Apr 2026 15:58:52 +0000</pubDate>                                                                                                                                <updated>Thu, 02 Apr 2026 11:09:09 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/bKWbECsE5Qnj7e5jMR7JqR-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Logo of Anthropic&#039;s Claude AI tool imposed over computer source code.]]></media:description>                                                            <media:text><![CDATA[Logo of Anthropic&#039;s Claude AI tool imposed over computer source code.]]></media:text>
                                <media:title type="plain"><![CDATA[Logo of Anthropic&#039;s Claude AI tool imposed over computer source code.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/bKWbECsE5Qnj7e5jMR7JqR-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘The build pipeline is becoming the new frontline’: Axios npm compromise highlights growing software supply chain risks, experts warn ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/the-build-pipeline-is-becoming-the-new-frontline-axios-npm-compromise-highlights-growing-software-supply-chain-risks-experts-warn</link>
                                                                            <description>
                            <![CDATA[ Cyber criminals exploited a hijacked maintainer account to compromise one of the world's most widely used JavaScript libraries ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">FtT83GNxmPjbmsmBPsDEnS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4XZYfjMuoUwrLG8MTcaQBi-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 01 Apr 2026 10:32:11 +0000</pubDate>                                                                                                                                <updated>Wed, 01 Apr 2026 14:13:01 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4XZYfjMuoUwrLG8MTcaQBi-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity concept image showing digital data storage modules with padlock symbols in a storage environment.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity concept image showing digital data storage modules with padlock symbols in a storage environment.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity concept image showing digital data storage modules with padlock symbols in a storage environment.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4XZYfjMuoUwrLG8MTcaQBi-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ European Commission confirms data breach as ShinyHunters group claims responsibility ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-breaches/european-commission-confirms-data-breach-as-shinyhunters-group-claims-responsibility</link>
                                                                            <description>
                            <![CDATA[ The extortion group is believed to be behind a cyber attack affecting the Commission's cloud systems ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hq482EVjAgSjmX4sJSjdDM</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Aaozf8FqfVDo3iYRAoFZtg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 30 Mar 2026 09:57:32 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Aaozf8FqfVDo3iYRAoFZtg-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Facade of the Berlaymont building, headquarters of the European Commission, in Brussels, with EU flags fluttering in the wind.]]></media:description>                                                            <media:text><![CDATA[Facade of the Berlaymont building, headquarters of the European Commission, in Brussels, with EU flags fluttering in the wind.]]></media:text>
                                <media:title type="plain"><![CDATA[Facade of the Berlaymont building, headquarters of the European Commission, in Brussels, with EU flags fluttering in the wind.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Aaozf8FqfVDo3iYRAoFZtg-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI challenges mean it's time to shine for cyber professionals – but they need a helping hand ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ai-challenges-time-to-shine-for-cyber-professionals-but-they-need-a-helping-hand</link>
                                                                            <description>
                            <![CDATA[ Keep your security pros close, you never know when you’ll need them to solve an AI-related crisis ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">TaJQF8PmQPZKPrrUCUzXwi</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/bWktWKQFiA8atBMpJ56M2i-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 27 Mar 2026 13:07:44 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/bWktWKQFiA8atBMpJ56M2i-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Two cybersecurity professionals in a modern office.]]></media:description>                                                            <media:text><![CDATA[Two cybersecurity professionals in a modern office.]]></media:text>
                                <media:title type="plain"><![CDATA[Two cybersecurity professionals in a modern office.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/bWktWKQFiA8atBMpJ56M2i-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ March rundown: RSAC warnings and Arm's AGI CPU ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/march-rundown-rsac-warnings-and-arms-agi-cpu</link>
                                                                            <description>
                            <![CDATA[ AI agents are complicating the jobs of cyber professionals, with broken permissions and a lack of oversight posing major risks ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">magHjcbrLU5hpi2ceBGV7n</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/7id7L8fhU8ZsMxnCymQurH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 27 Mar 2026 13:01:20 +0000</pubDate>                                                                                                                                <updated>Wed, 01 Apr 2026 15:54:57 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/7id7L8fhU8ZsMxnCymQurH-1280-80.jpg">
                                                            <media:credit><![CDATA[Future]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The text &quot;RSAC warnings and Arm&#039;s AGI CPU&quot; against noisy, purple glowing outline of a chip. The words &quot;RSAC&quot; and &quot;Arm&#039;s&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:description>                                                            <media:text><![CDATA[The text &quot;RSAC warnings and Arm&#039;s AGI CPU&quot; against noisy, purple glowing outline of a chip. The words &quot;RSAC&quot; and &quot;Arm&#039;s&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:text>
                                <media:title type="plain"><![CDATA[The text &quot;RSAC warnings and Arm&#039;s AGI CPU&quot; against noisy, purple glowing outline of a chip. The words &quot;RSAC&quot; and &quot;Arm&#039;s&quot; are in yellow, the rest are in white. In the bottom-right corner, the ITPro Podcast logo is shown.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/7id7L8fhU8ZsMxnCymQurH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google just revised its ‘Q-Day’ timeline: Quantum computers could break existing encryption techniques within three years – and enterprises are nowhere near ready ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/google-just-revised-its-q-day-timeline-quantum-computers-could-break-existing-encryption-techniques-within-three-years-and-enterprises-are-nowhere-near-ready</link>
                                                                            <description>
                            <![CDATA[ Google has warned that “Q-Day”, the point where a quantum computer is powerful enough to crack current encryption techniques, could come as soon as 2029. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tkw3hgP3bfnfhYdj7dLPZV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GFpMfj9q29UoFDQyuwcQuh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 27 Mar 2026 10:30:29 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GFpMfj9q29UoFDQyuwcQuh-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[&#039;Q-Day&#039; quantum computing attack showing a data storage container with encryption key unlocked, placed on top of a digital interface.]]></media:description>                                                            <media:text><![CDATA[&#039;Q-Day&#039; quantum computing attack showing a data storage container with encryption key unlocked, placed on top of a digital interface.]]></media:text>
                                <media:title type="plain"><![CDATA[&#039;Q-Day&#039; quantum computing attack showing a data storage container with encryption key unlocked, placed on top of a digital interface.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GFpMfj9q29UoFDQyuwcQuh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ OpenAI is cracking down on AI misuse with a new bug bounty program ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/open-ai-targets-ai-misuse-crackdown-with-new-bug-bounty-program</link>
                                                                            <description>
                            <![CDATA[ Submissions don't have to be security vulnerabilities, OpenAI says, just the potential to cause material harm ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qdADLecdshLbpnnpRn8yt7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4CfCNLi89rRyAkt4Ut9qtV-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 27 Mar 2026 09:12:54 +0000</pubDate>                                                                                                                                <updated>Fri, 27 Mar 2026 12:25:33 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4CfCNLi89rRyAkt4Ut9qtV-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Close-up photograph of the OpenAI logo and branding on a smartphone screen, with faint warm orange lighting in background.]]></media:description>                                                            <media:text><![CDATA[Close-up photograph of the OpenAI logo and branding on a smartphone screen, with faint warm orange lighting in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Close-up photograph of the OpenAI logo and branding on a smartphone screen, with faint warm orange lighting in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4CfCNLi89rRyAkt4Ut9qtV-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ LiteLLM PyPI compromise: Everything we know so far ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/litellm-pypi-compromise-everything-we-know-so-far</link>
                                                                            <description>
                            <![CDATA[ The TeamPCP hacking group is believed to have successfully backdoored the package to harvest credentials ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vtaXFmN8hjj39BM8iGwyKJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 26 Mar 2026 10:56:03 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:description>                                                            <media:text><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:text>
                                <media:title type="plain"><![CDATA[Red warning symbol imposed over computer code denoting a data security compromise.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/P5BaAXwkDNyHNyRDcZNx5E-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Systems are deterministic, people are probabilistic – AI is both, and that's a headache for cyber teams  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/systems-are-deterministic-people-are-probabilistic-ai-is-both-and-thats-a-headache-for-cyber-teams</link>
                                                                            <description>
                            <![CDATA[ AI combines both the risks associated with IT systems and the people using them, creating headaches for practitioners ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8VLzS7mBsEbtwpxLM4mgBm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/4QoKscLUUMCfLwSt4SxwhH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 26 Mar 2026 07:29:41 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/4QoKscLUUMCfLwSt4SxwhH-1280-80.jpg">
                                                            <media:credit><![CDATA[RSAC™ 2026 Conference]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[RSAC 2026 Conference branding pictured on a banner at the Moscone Center in San Francisco, USA.]]></media:description>                                                            <media:text><![CDATA[RSAC 2026 Conference branding pictured on a banner at the Moscone Center in San Francisco, USA.]]></media:text>
                                <media:title type="plain"><![CDATA[RSAC 2026 Conference branding pictured on a banner at the Moscone Center in San Francisco, USA.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/4QoKscLUUMCfLwSt4SxwhH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Tenable co-CEO Stephen Vintz says enterprises need to get serious about tackling the AI “responsibility gap” ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/tenable-co-ceo-stephen-vintz-says-enterprises-need-to-get-serious-about-tackling-the-ai-responsibility-gap</link>
                                                                            <description>
                            <![CDATA[ The Tenable chief wants a serious conversation on AI ownership and accountability ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ty87LyLntCiNRFLDaUe8u7</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/x9sA2oW4PrD5HGM5o2k8RD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 26 Mar 2026 07:08:20 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/x9sA2oW4PrD5HGM5o2k8RD-1280-80.jpg">
                                                            <media:credit><![CDATA[RSAC™ 2026 Conference]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[RSAC 2026 conference logos and branding pictured on screens and projected onto carpet at the Moscone Center in San Francisco, USA.]]></media:description>                                                            <media:text><![CDATA[RSAC 2026 conference logos and branding pictured on screens and projected onto carpet at the Moscone Center in San Francisco, USA.]]></media:text>
                                <media:title type="plain"><![CDATA[RSAC 2026 conference logos and branding pictured on screens and projected onto carpet at the Moscone Center in San Francisco, USA.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/x9sA2oW4PrD5HGM5o2k8RD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘It’s not a good look for the PC ecosystem as a whole.”  HP to make fix for TPM vulnerability an industry standard  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/its-not-a-good-look-for-the-pc-ecosystem-as-a-whole-hp-to-make-fix-for-tpm-vulnerability-an-industry-standard</link>
                                                                            <description>
                            <![CDATA[ Just announced TPM Guard offers important protection against device data theft when attackers gain physical access ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">7dDPRdBSKdctQ2w6TrqDRe</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Lq6brmg8jRUNyRnyv5SBxe-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 25 Mar 2026 21:25:34 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ Maggie.holland@futurenet.com (Maggie Holland) ]]></author>                    <dc:creator><![CDATA[ Maggie Holland ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Lq6brmg8jRUNyRnyv5SBxe-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A glowing shield formed from glowing points and lines in an abstract landscape to represent security controls.]]></media:description>                                                            <media:text><![CDATA[A glowing shield formed from glowing points and lines in an abstract landscape to represent security controls.]]></media:text>
                                <media:title type="plain"><![CDATA[A glowing shield formed from glowing points and lines in an abstract landscape to represent security controls.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Lq6brmg8jRUNyRnyv5SBxe-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC warns vibe coding poses a major risk to businesses ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ncsc-warns-vibe-coding-poses-a-major-risk</link>
                                                                            <description>
                            <![CDATA[ Vulnerability management approaches are not maturing fast enough to keep up with the downsides of AI-generated code ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">VAecj6CDFoWazXFV5tuCsN</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mBrtuEnXSQksScMmrYfW2B-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 25 Mar 2026 12:54:18 +0000</pubDate>                                                                                                                                <updated>Wed, 25 Mar 2026 18:02:27 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mBrtuEnXSQksScMmrYfW2B-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A visualization of bue code in a futuristic display, lit by red light, to represent vibe coding risks.]]></media:description>                                                            <media:text><![CDATA[A visualization of bue code in a futuristic display, lit by red light, to represent vibe coding risks.]]></media:text>
                                <media:title type="plain"><![CDATA[A visualization of bue code in a futuristic display, lit by red light, to represent vibe coding risks.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mBrtuEnXSQksScMmrYfW2B-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Google just launched a new Gemini-powered dark web monitoring service ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/google-just-launched-a-new-gemini-powered-dark-web-monitoring-service</link>
                                                                            <description>
                            <![CDATA[ A new AI-powered dark web monitoring service looks to give enterprises more "reasoned answers" and deeper insights ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">qktgSCCkPZWUji4v6eYJDS</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/fPKmiRTrPZpLKN6zEXmTch-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 25 Mar 2026 09:23:32 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/fPKmiRTrPZpLKN6zEXmTch-1280-80.jpg">
                                                            <media:credit><![CDATA[Future/Google ]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The Google Gemini logo on the ITPro background]]></media:description>                                                            <media:text><![CDATA[The Google Gemini logo on the ITPro background]]></media:text>
                                <media:title type="plain"><![CDATA[The Google Gemini logo on the ITPro background]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/fPKmiRTrPZpLKN6zEXmTch-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The key risks security teams face in 2026 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/the-key-risks-security-teams-face-in-2026</link>
                                                                            <description>
                            <![CDATA[ From AI-related flaws to supply chain risks, cyber professionals now contend with overlapping challenges ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">WXfubcmG5VW6RFrygjza9Z</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ZZBk2W8yYtYzKKgYiwvfAD-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 25 Mar 2026 08:29:37 +0000</pubDate>                                                                                                                                <updated>Wed, 25 Mar 2026 15:21:19 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ZZBk2W8yYtYzKKgYiwvfAD-1280-80.jpg">
                                                            <media:credit><![CDATA[RSAC™ 2026 Conference]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The front of the Moscone Center South Entrance decked out in RSAC Conference 2026 livery]]></media:description>                                                            <media:text><![CDATA[The front of the Moscone Center South Entrance decked out in RSAC Conference 2026 livery]]></media:text>
                                <media:title type="plain"><![CDATA[The front of the Moscone Center South Entrance decked out in RSAC Conference 2026 livery]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ZZBk2W8yYtYzKKgYiwvfAD-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ US bans foreign-made routers over security risks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/us-bans-foreign-made-routers-over-security-risks</link>
                                                                            <description>
                            <![CDATA[ FCC says routers can be approved for sale, but so far, none are ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tja9LC75piwTz8ViPNFLGA</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/wjmhR78mm7yoSdLL6Zk3pH-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 24 Mar 2026 13:55:59 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/wjmhR78mm7yoSdLL6Zk3pH-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Home Wi-Fi router with ethernet cable inserted for broadband connectivity in a remote office.]]></media:description>                                                            <media:text><![CDATA[Home Wi-Fi router with ethernet cable inserted for broadband connectivity in a remote office.]]></media:text>
                                <media:title type="plain"><![CDATA[Home Wi-Fi router with ethernet cable inserted for broadband connectivity in a remote office.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/wjmhR78mm7yoSdLL6Zk3pH-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Russian sentenced to jail for his part in ransomware attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/russian-sentenced-to-jail-for-his-part-in-ransomware-attacks</link>
                                                                            <description>
                            <![CDATA[ Aleksei Volkov operated as an initial access broker, helping cybercrime groups, including the Yanluowang ransomware group ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">AnhsFhZvLzDoJ6zSYYPReP</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/KpS95oHnuSP6NJZBCVzd7N-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 24 Mar 2026 11:06:19 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/KpS95oHnuSP6NJZBCVzd7N-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Flag of russia]]></media:description>                                                            <media:text><![CDATA[Flag of russia]]></media:text>
                                <media:title type="plain"><![CDATA[Flag of russia]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/KpS95oHnuSP6NJZBCVzd7N-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Observability will be key to agentic AI safety, says Microsoft Security exec ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/observability-will-be-key-to-agentic-ai-safety-says-microsoft-security-exec</link>
                                                                            <description>
                            <![CDATA[ Agentic AI adoption will require a re-evaluation of enterprise risk management, according to Microsoft corporate VP ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">wEcVtXavZQbHprcRW7rPtk</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Ux3V79nc6iXyfwiHXRzQi3-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 24 Mar 2026 06:55:47 +0000</pubDate>                                                                                                                                <updated>Tue, 24 Mar 2026 06:56:58 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Ux3V79nc6iXyfwiHXRzQi3-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[AI zero trust concept image showing shield symbol with digitized human brain in a circle, with distributed red data points with skull symbols.]]></media:description>                                                            <media:text><![CDATA[AI zero trust concept image showing shield symbol with digitized human brain in a circle, with distributed red data points with skull symbols.]]></media:text>
                                <media:title type="plain"><![CDATA[AI zero trust concept image showing shield symbol with digitized human brain in a circle, with distributed red data points with skull symbols.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Ux3V79nc6iXyfwiHXRzQi3-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Enterprises need to think of agents as ‘digital co-workers’ – and that means implementing the same security safeguards ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/enterprises-need-to-think-of-agents-as-digital-co-workers-and-that-means-implementing-the-same-security-safeguards</link>
                                                                            <description>
                            <![CDATA[ Practices such as zero trust and least privilege will be needed as agents gain access to sensitive enterprise data ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">gMR7eW9xF4W65CDTnRqyra</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/e6Wy9p4ojgejfKQp76cvCa-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 24 Mar 2026 06:38:42 +0000</pubDate>                                                                                                                                <updated>Tue, 24 Mar 2026 06:57:14 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/e6Wy9p4ojgejfKQp76cvCa-1280-80.jpg">
                                                            <media:credit><![CDATA[Cisco]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Jeetu Patel, Executive Vice President and General Manager for Security and Collaboration at Cisco, pictured at Cisco Live 2024 in Las Vegas.]]></media:description>                                                            <media:text><![CDATA[Jeetu Patel, Executive Vice President and General Manager for Security and Collaboration at Cisco, pictured at Cisco Live 2024 in Las Vegas.]]></media:text>
                                <media:title type="plain"><![CDATA[Jeetu Patel, Executive Vice President and General Manager for Security and Collaboration at Cisco, pictured at Cisco Live 2024 in Las Vegas.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/e6Wy9p4ojgejfKQp76cvCa-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Safe AI adoption rests on cybersecurity professionals, says RSAC chairman ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/safe-ai-adoption-rests-on-cybersecurity-professionals-says-rsac-chairman</link>
                                                                            <description>
                            <![CDATA[ With AI security a key talking point at RSAC 2026, executive chairman Hugh Thompson believes the industry can lead by example ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">N5ZmUJcHTmNAsbVhUNW9sF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/3JmgCnSE8HxZ5ARAA9imGG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 24 Mar 2026 06:22:53 +0000</pubDate>                                                                                                                                <updated>Tue, 24 Mar 2026 15:30:03 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/3JmgCnSE8HxZ5ARAA9imGG-1280-80.jpg">
                                                            <media:credit><![CDATA[RSAC]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[RSAC executive chairman Hugh Thompson pictured on stage during the opening keynote at the 2026 RSAC Conference in San Francisco, USA.]]></media:description>                                                            <media:text><![CDATA[RSAC executive chairman Hugh Thompson pictured on stage during the opening keynote at the 2026 RSAC Conference in San Francisco, USA.]]></media:text>
                                <media:title type="plain"><![CDATA[RSAC executive chairman Hugh Thompson pictured on stage during the opening keynote at the 2026 RSAC Conference in San Francisco, USA.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/3JmgCnSE8HxZ5ARAA9imGG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Dark web platforms taken down in international operation ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-crime/dark-web-platforms-taken-down-in-international-operation</link>
                                                                            <description>
                            <![CDATA[ Operation Alice traced tens of thousands of CSAM and cybercrime-as-a-service sites back to one individual ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">BdisyDLHNnfwtRmP3zyLj5</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/hNt2JaLuS3Ribvoh5XfgT8-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 23 Mar 2026 12:16:15 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Crime]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/hNt2JaLuS3Ribvoh5XfgT8-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Image of a Europol sign affixed to its Amsterdam headquarters]]></media:description>                                                            <media:text><![CDATA[Image of a Europol sign affixed to its Amsterdam headquarters]]></media:text>
                                <media:title type="plain"><![CDATA[Image of a Europol sign affixed to its Amsterdam headquarters]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/hNt2JaLuS3Ribvoh5XfgT8-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Stryker hackers struck by FBI in domain seizure campaign ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/stryker-hackers-struck-by-fbi-in-domain-seizure-campaign</link>
                                                                            <description>
                            <![CDATA[ The domain seizures come hot on the heels of Handala's devastating attack on the medical tech firm ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">F32BN9VnmASzRxdGYHJNwD</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 20 Mar 2026 11:45:23 +0000</pubDate>                                                                                                                                <updated>Fri, 20 Mar 2026 12:12:07 +0000</updated>
                                                                                                                                            <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:description>                                                            <media:text><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:text>
                                <media:title type="plain"><![CDATA[FBI seal and insignia pictured on the FBI headquarters building in Washington D.C., United States.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/LEn4RWFLrJ7FxZPhnQgKsP-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ AI agents are creating new identity security risks: 1Password wants to solve that ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/1password-unified-access-agent-identity-security</link>
                                                                            <description>
                            <![CDATA[ The Unified Access system from 1Password will help enterprises manage AI agent access across different devices and users ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">HHvPjzZf6yE7r7zi8fhbmg</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6EL6ZhFnhVb2VEAF5Enb54-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 20 Mar 2026 09:29:14 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6EL6ZhFnhVb2VEAF5Enb54-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[1Password logo and branding pictured on a smartphone screen with grey glowing streams of light emanating out from behind the device.]]></media:description>                                                            <media:text><![CDATA[1Password logo and branding pictured on a smartphone screen with grey glowing streams of light emanating out from behind the device.]]></media:text>
                                <media:title type="plain"><![CDATA[1Password logo and branding pictured on a smartphone screen with grey glowing streams of light emanating out from behind the device.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6EL6ZhFnhVb2VEAF5Enb54-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Is your zero trust model prepared for modern threats? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/is-your-zero-trust-model-prepared-for-modern-threats</link>
                                                                            <description>
                            <![CDATA[ Meeting the demands of the latest zero trust guidelines involves ditching legacy apps and positioning for non-human identities ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">9BFDPnBV2AJfSNCTK9ffpZ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dpEPGS24gcSUzc2mm2ASUY-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 19 Mar 2026 12:35:36 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Kate O&#039;Flaherty ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dpEPGS24gcSUzc2mm2ASUY-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A CGI representation of zero trust, shown as a multicolored holographic padlock surrounded by other blue holographic padlocks, hovering above a futuristic computer chip landscape.]]></media:description>                                                            <media:text><![CDATA[A CGI representation of zero trust, shown as a multicolored holographic padlock surrounded by other blue holographic padlocks, hovering above a futuristic computer chip landscape.]]></media:text>
                                <media:title type="plain"><![CDATA[A CGI representation of zero trust, shown as a multicolored holographic padlock surrounded by other blue holographic padlocks, hovering above a futuristic computer chip landscape.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dpEPGS24gcSUzc2mm2ASUY-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 'AI-generated phishing became the baseline' for hackers last year – Kaseya warns it's going to get worse in 2026 ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/ai-generated-phishing-became-the-baseline-for-hackers-last-year-kaseya-warns-its-going-to-get-worse-in-2026</link>
                                                                            <description>
                            <![CDATA[ Forget looking for typos and bad grammar, phishing campaigns are using AI to boost their attack success ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">bMNzEiSHCoLywhdK6jLQfa</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 19 Mar 2026 11:36:23 +0000</pubDate>                                                                                                                                <updated>Thu, 19 Mar 2026 11:55:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nicole Kobie ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:description>                                                            <media:text><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:text>
                                <media:title type="plain"><![CDATA[Phishing email attack concept image showing email with warning symbol on a laptop screen with a fishing hook attached.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iLr5eH4Tgk7GAiwMDELMzG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Why cyber attacks on critical national infrastructure are such a huge threat ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/threat-posed-cyber-attacks-on-critical-national-infrastructure</link>
                                                                            <description>
                            <![CDATA[ Cyber attacks targeting national infrastructure are becoming increasingly prevalent – what are the underlying goals behind these attacks and how damaging are they? ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8jZojNPg4FWVV7YnuaHZci</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iMQq7qLmeZD4jQtCkC2btd-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 18 Mar 2026 13:21:01 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Peter Ray Allison ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iMQq7qLmeZD4jQtCkC2btd-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A digital display of the world map, in shades of blue and outlined in red with labels to denote threats, representing attacks on critical national infrastructure (CNI).]]></media:description>                                                            <media:text><![CDATA[A digital display of the world map, in shades of blue and outlined in red with labels to denote threats, representing attacks on critical national infrastructure (CNI).]]></media:text>
                                <media:title type="plain"><![CDATA[A digital display of the world map, in shades of blue and outlined in red with labels to denote threats, representing attacks on critical national infrastructure (CNI).]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iMQq7qLmeZD4jQtCkC2btd-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ubuntu vulnerability exposes enterprises to root escalation, complete system compromise ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ubuntu-vulnerability-exposes-enterprises-to-root-escalation-complete-system-compromise</link>
                                                                            <description>
                            <![CDATA[ The high-severity Ubuntu vulnerability allows an unprivileged local attacker to escalate privileges through the interaction of two standard system components ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">NGpd8RBspiGteFvvDAC6eQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/wjrXbzbo5Azbgnf4AET2rZ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 18 Mar 2026 12:34:30 +0000</pubDate>                                                                                                                                <updated>Wed, 18 Mar 2026 12:41:01 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/wjrXbzbo5Azbgnf4AET2rZ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ubuntu logo and branding pictured on a smartphone screen with newspaper rack with publications in background.]]></media:description>                                                            <media:text><![CDATA[Ubuntu logo and branding pictured on a smartphone screen with newspaper rack with publications in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Ubuntu logo and branding pictured on a smartphone screen with newspaper rack with publications in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/wjrXbzbo5Azbgnf4AET2rZ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ ‘Reducing reliance on foreign tech infrastructure is key’ to European tech success – and its survival ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/data-protection/reducing-reliance-on-foreign-tech-infrastructure-is-key-to-european-tech-success-and-its-long-term-survival</link>
                                                                            <description>
                            <![CDATA[ MEPs have once again called for decreased reliance on foreign tech infrastructure ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">vfsFwuMro5QuNLntNz24mX</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/aeA7CQhtNtuCimyeEWxL7m-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 17 Mar 2026 15:00:00 +0000</pubDate>                                                                                                                                <updated>Wed, 18 Mar 2026 08:35:56 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Protection]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/aeA7CQhtNtuCimyeEWxL7m-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The 12 stars of the flag of the European Union (EU) imposed over a map of Europe.]]></media:description>                                                            <media:text><![CDATA[The 12 stars of the flag of the European Union (EU) imposed over a map of Europe.]]></media:text>
                                <media:title type="plain"><![CDATA[The 12 stars of the flag of the European Union (EU) imposed over a map of Europe.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/aeA7CQhtNtuCimyeEWxL7m-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>