<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="https://purl.org/dc/elements/1.1/"
     xmlns:dcterms="http://purl.org/dc/terms/"
     xmlns:media="http://search.yahoo.com/mrss/"
     xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link href="https://www.itpro.com/uk/feeds/tag/penetration-testing" rel="self" type="application/rss+xml" />
                    <title><![CDATA[ Latest from ITPro UK in Penetration-testing ]]></title>
                <link>https://www.itpro.com/tag/penetration-testing</link>
        <description><![CDATA[ All the latest penetration-testing content from the ITPro  UK team ]]></description>
                                    <lastBuildDate>Wed, 22 Oct 2025 11:02:57 +0000</lastBuildDate>
                            <language>en</language>
                                <item>
                                                            <title><![CDATA[ AI-generated code is now the cause of one-in-five breaches – but developers and security leaders alike are convinced the technology will come good eventually ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/software/development/ai-generated-code-is-now-the-cause-of-one-in-five-breaches-but-developers-and-security-leaders-alike-are-convinced-the-technology-will-come-good-eventually</link>
                                                                            <description>
                            <![CDATA[ AI coding tools now write 24% of production code globally, but it's risky and causing issues for developers and security practitioners alike. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">BJyUaCbykBUPx25vExFApF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/pXaDHxpCwz8PrGomizBmrT-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 22 Oct 2025 11:02:57 +0000</pubDate>                                                                                                                                <updated>Thu, 23 Oct 2025 09:16:02 +0000</updated>
                                                                                                                                            <category><![CDATA[Development]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/pXaDHxpCwz8PrGomizBmrT-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Software developer using AI coding tools on a laptop computer with source code pictured on screen and desktop monitor in background.]]></media:description>                                                            <media:text><![CDATA[Software developer using AI coding tools on a laptop computer with source code pictured on screen and desktop monitor in background.]]></media:text>
                                <media:title type="plain"><![CDATA[Software developer using AI coding tools on a laptop computer with source code pictured on screen and desktop monitor in background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/pXaDHxpCwz8PrGomizBmrT-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Pentesters are now a CISOs best friend as critical vulnerabilities skyrocket ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/pentesters-are-now-a-cisos-best-friend-as-critical-vulnerabilities-skyrocket</link>
                                                                            <description>
                            <![CDATA[ Attack surfaces are expanding rapidly, but pentesters are here to save the day ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">rem73Tbz5vDuHLZUD3xWuj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/QGJdnzL5ujgBmZvWfYVyk7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 24 Sep 2025 09:44:59 +0000</pubDate>                                                                                                                                <updated>Wed, 24 Sep 2025 09:45:32 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/QGJdnzL5ujgBmZvWfYVyk7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ethical hacker concept image showing hands of a female pentester typing on a laptop keyboard.]]></media:description>                                                            <media:text><![CDATA[Ethical hacker concept image showing hands of a female pentester typing on a laptop keyboard.]]></media:text>
                                <media:title type="plain"><![CDATA[Ethical hacker concept image showing hands of a female pentester typing on a laptop keyboard.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/QGJdnzL5ujgBmZvWfYVyk7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ This DeepSeek-powered pen testing tool could be a Cobalt Strike successor – and hackers have downloaded it 10,000 times since July ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/technology/artificial-intelligence/this-deepseek-powered-pen-testing-tool-could-be-a-cobalt-strike-successor-and-hackers-have-downloaded-it-10-000-times-since-july</link>
                                                                            <description>
                            <![CDATA[ ‘Villager’, a tool developed by a China-based red team project known as Cyberspike, is being used to automate attacks under the guise of penetration testing. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">SCHYLK4j7td9YGgWYc4pVe</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/THFKPNNcPVcHpAPCmMkcEK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 16 Sep 2025 11:11:24 +0000</pubDate>                                                                                                                                <updated>Tue, 16 Sep 2025 11:11:53 +0000</updated>
                                                                                                                                            <category><![CDATA[Artificial Intelligence]]></category>
                                                    <category><![CDATA[Technology]]></category>
                                                                                                <author><![CDATA[ rory.bathgate@futurenet.com (Rory Bathgate) ]]></author>                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/THFKPNNcPVcHpAPCmMkcEK-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker working on a desktop computer with dual monitors in a room with red lights.]]></media:description>                                                            <media:text><![CDATA[Hacker working on a desktop computer with dual monitors in a room with red lights.]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker working on a desktop computer with dual monitors in a room with red lights.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/THFKPNNcPVcHpAPCmMkcEK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Cyber professionals call for a 'strategic pause' on AI adoption as teams left scrambling to secure tools ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-professionals-call-for-a-strategic-pause-on-ai-adoption-as-teams-left-scrambling-to-secure-tools</link>
                                                                            <description>
                            <![CDATA[ Security professionals are scrambling to secure generative AI tools ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">cgh9UxCVnhcsKHUFY8f3sV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/aqzJdthdqwShUTpHpZUBqL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 24 Jun 2025 12:00:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Emma Woollacott ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/aqzJdthdqwShUTpHpZUBqL-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Female cybersecurity analyst pressing fingers to her temple in despair while working at a desktop computer in a dimly lit room.]]></media:description>                                                            <media:text><![CDATA[Female cybersecurity analyst pressing fingers to her temple in despair while working at a desktop computer in a dimly lit room.]]></media:text>
                                <media:title type="plain"><![CDATA[Female cybersecurity analyst pressing fingers to her temple in despair while working at a desktop computer in a dimly lit room.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/aqzJdthdqwShUTpHpZUBqL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Bugcrowd’s new MSP program looks to transform pen testing for small businesses ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/bugcrowds-new-msp-program-looks-to-transform-pen-testing-for-small-businesses</link>
                                                                            <description>
                            <![CDATA[ Cybersecurity provider Bugcrowd has launched a new service aimed at helping MSP’s drive pen testing capabilities - with a particular focus on small businesses. ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">zRvXPxQjKzyxvUBJMMkJ2S</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 03 Apr 2025 11:12:46 +0000</pubDate>                                                                                                                                <updated>Thu, 01 May 2025 09:05:38 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ ross.kelly@futurenet.com (Ross Kelly) ]]></author>                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:description>                                                            <media:text><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:text>
                                <media:title type="plain"><![CDATA[Cybersecurity concept image symbolizing third-party data breaches with give padlock symbols and one pictured in red, signifying a security breach.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Gmv6VGAN4vkgH2urwaX2Yf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Kubernetes on AWS targeted by hackers abusing legitimate pentesting tools ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/cloud/cloud-security/kubernetes-on-aws-targeted-by-hackers-abusing-legitimate-pentesting-tools</link>
                                                                            <description>
                            <![CDATA[ Experts believe the campaign is going to develop further, expanding attacks to other cloud providers ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hfW6pudEYjZF4eHsJeYk6Q</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/9D2da86awC8eMrg53j5PN7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 11 Jul 2023 11:36:18 +0000</pubDate>                                                                                                                                <updated>Tue, 11 Jul 2023 13:55:16 +0000</updated>
                                                                                                                                            <category><![CDATA[Cloud Security]]></category>
                                                    <category><![CDATA[Cloud]]></category>
                                                                                                <author><![CDATA[ richard.speed@futurenet.com (Richard Speed) ]]></author>                    <dc:creator><![CDATA[ Richard Speed ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/9D2da86awC8eMrg53j5PN7-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Kubernetes on AWS hack: a picture of a cloud on a 3D rendering of computer chip in balck and neon blue colouring]]></media:description>                                                            <media:text><![CDATA[Kubernetes on AWS hack: a picture of a cloud on a 3D rendering of computer chip in balck and neon blue colouring]]></media:text>
                                <media:title type="plain"><![CDATA[Kubernetes on AWS hack: a picture of a cloud on a 3D rendering of computer chip in balck and neon blue colouring]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/9D2da86awC8eMrg53j5PN7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ OpenAI to pay up to $20k in rewards through new bug bounty program ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/openai-to-pay-up-to-dollar20k-in-rewards-through-new-bug-bounty-program</link>
                                                                            <description>
                            <![CDATA[ The move follows a period of unrest over data security concerns ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ZzZXTsDY4Nzg33Gh3Do3kK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zwqDDCyttCAQQ9fnt5F8rX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 12 Apr 2023 12:06:44 +0000</pubDate>                                                                                                                                <updated>Thu, 13 Apr 2023 09:03:12 +0000</updated>
                                                                                                                                            <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Ross Kelly ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zwqDDCyttCAQQ9fnt5F8rX-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[lots of lime-coloured padlocks set against a green background, with one orange padlock in the middle that&#039;s unlocked]]></media:description>                                                            <media:text><![CDATA[lots of lime-coloured padlocks set against a green background, with one orange padlock in the middle that&#039;s unlocked]]></media:text>
                                <media:title type="plain"><![CDATA[lots of lime-coloured padlocks set against a green background, with one orange padlock in the middle that&#039;s unlocked]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zwqDDCyttCAQQ9fnt5F8rX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Kali Linux releases first-ever defensive distro with score of new tools ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/enterprise-security/370257/kali-linux-releases-first-ever-defensive-distro-score-new-tools</link>
                                                                            <description>
                            <![CDATA[ Kali Purple marks the next step for the red-teaming platform on the project's tenth anniversary ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">unrADLURAspNaGwLVwKfnV</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/DXyATm7k6CbbwJC5rPAeCK-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 14 Mar 2023 12:00:46 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Protection]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Rory Bathgate ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/DXyATm7k6CbbwJC5rPAeCK-1280-80.jpg">
                                                            <media:credit><![CDATA[Kali / Offensive Security]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A screenshot of a Linux operating system with Kali Purple windows open on the desktop and a stylised dragon in the background next to the text &amp;#039;KALI&amp;#039;]]></media:description>                                                            <media:text><![CDATA[A screenshot of a Linux operating system with Kali Purple windows open on the desktop and a stylised dragon in the background next to the text &amp;#039;KALI&amp;#039;]]></media:text>
                                <media:title type="plain"><![CDATA[A screenshot of a Linux operating system with Kali Purple windows open on the desktop and a stylised dragon in the background next to the text &amp;#039;KALI&amp;#039;]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/DXyATm7k6CbbwJC5rPAeCK-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Podcast transcript: Meet the cyborg hacker ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/369133/podcast-transcript-meet-the-cyborg-hacker</link>
                                                                            <description>
                            <![CDATA[ Read the full transcript for this episode of the IT Pro Podcast ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">4ekpSreZcLL2go22W64RcW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/e68dF8GWJKnWi2HERUMHr6-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 23 Sep 2022 06:30:08 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ IT Pro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/e68dF8GWJKnWi2HERUMHr6-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Podcast transcript: Meet the cyborg hacker]]></media:description>                                                            <media:text><![CDATA[Podcast transcript: Meet the cyborg hacker]]></media:text>
                                <media:title type="plain"><![CDATA[Podcast transcript: Meet the cyborg hacker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/e68dF8GWJKnWi2HERUMHr6-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The IT Pro Podcast: Meet the cyborg hacker ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/hacking/369132/the-it-pro-podcast-meet-the-cyborg-hacker</link>
                                                                            <description>
                            <![CDATA[ Resistance is futile - offensive biotech implants are already here ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sHqqiJKcvTj48dfZkrwUvF</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/F9XLqHX4GgHqvgUS3jYT3C-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 23 Sep 2022 06:30:06 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ IT Pro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/F9XLqHX4GgHqvgUS3jYT3C-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[The IT Pro Podcast: Meet the cyborg hacker]]></media:description>                                                            <media:text><![CDATA[The IT Pro Podcast: Meet the cyborg hacker]]></media:text>
                                <media:title type="plain"><![CDATA[The IT Pro Podcast: Meet the cyborg hacker]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/F9XLqHX4GgHqvgUS3jYT3C-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Russia-linked state-sponsored hackers launch fresh attacks by abusing latest red team tool ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/368447/russia-linked-state-sponsored-hackers-launch-fresh-attacks-by-abusing-tool</link>
                                                                            <description>
                            <![CDATA[ Researchers said the new tool has evaded the detection of many leading security products and is quickly growing in popularity ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">jmXgFcSTq9jbZtmpxiLS1</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Mis3RCBYFmaSRh2Xa8utyW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 06 Jul 2022 09:36:03 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Mis3RCBYFmaSRh2Xa8utyW-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Flag of Russia on a computer binary codes falling from the top and fading away]]></media:description>                                                            <media:text><![CDATA[Flag of Russia on a computer binary codes falling from the top and fading away]]></media:text>
                                <media:title type="plain"><![CDATA[Flag of Russia on a computer binary codes falling from the top and fading away]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Mis3RCBYFmaSRh2Xa8utyW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Kali Linux creators announce free cyber security sessions delivered live on Twitch ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/penetration-testing/368217/kali-linux-team-free-cyber-security-training-twitch</link>
                                                                            <description>
                            <![CDATA[ The brand-new initiative is aimed at reaching more aspiring certified pen-testers through twice-weekly livestreamed lessons ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tw4ZYdZA2sDrNZku8jecsp</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/zHEy2JDVnVhn79TBmpvyGJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 09 Jun 2022 10:07:46 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Careers and Training]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/zHEy2JDVnVhn79TBmpvyGJ-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Code appearing on a screen while running pentesting processes to analyse a server]]></media:description>                                                            <media:text><![CDATA[Code appearing on a screen while running pentesting processes to analyse a server]]></media:text>
                                <media:title type="plain"><![CDATA[Code appearing on a screen while running pentesting processes to analyse a server]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/zHEy2JDVnVhn79TBmpvyGJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ethical hackers handed lifeline in controversial US cyber crime review ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/ethical-hacking/367753/ethical-hackers-handed-lifeline-in-controversial-us-cyber-crime</link>
                                                                            <description>
                            <![CDATA[ The DoJ's latest ruling is a boon to "good-faith security research" but some argue that white hats are still not protected ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">6vM2oAtd4Fb2pTaXDSuvKJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/N22ik5y6rm5mskzYejFrF7-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 20 May 2022 11:49:10 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Policy and Legislation]]></category>
                                                    <category><![CDATA[Business]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/N22ik5y6rm5mskzYejFrF7-1280-80.jpg">
                                                            <media:credit><![CDATA[Bigstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Graphical mockup of a piece of software being tested for vulnerabilities]]></media:description>                                                            <media:text><![CDATA[Graphical mockup of a piece of software being tested for vulnerabilities]]></media:text>
                                <media:title type="plain"><![CDATA[Graphical mockup of a piece of software being tested for vulnerabilities]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/N22ik5y6rm5mskzYejFrF7-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Darktrace acquires attack surface management startup Cybersprint ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/business-strategy/mergers-and-acquisitions/362974/darktrace-buys-cybersprint</link>
                                                                            <description>
                            <![CDATA[ The €47.5 million deal marks Darktrace’s first acquisition in its nine-year history ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eAiRpppJH5MiTPhFm7vgGu</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/duX6vEHfbNHfCJNWPotSXf-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 23 Feb 2022 12:10:56 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cloud Security]]></category>
                                                    <category><![CDATA[Cloud]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bobby Hellard ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/duX6vEHfbNHfCJNWPotSXf-1280-80.jpg">
                                                            <media:credit><![CDATA[Getty Images]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Digital generated image of electronic circuit security padlock made out of numbers on black background.]]></media:description>                                                            <media:text><![CDATA[Digital generated image of electronic circuit security padlock made out of numbers on black background.]]></media:text>
                                <media:title type="plain"><![CDATA[Digital generated image of electronic circuit security padlock made out of numbers on black background.]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/duX6vEHfbNHfCJNWPotSXf-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Train firm slammed over 'bonus' phishing test  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/phishing/359490/train-line-comes-under-fire-for-bonus-phishing-test</link>
                                                                            <description>
                            <![CDATA[ Security experts suggest businesses use other 'lures' to avoid upsetting workers in the current climate ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">ZenR7NqEAj7fNAPsrYXQJ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iDnby2TqpeetLrJRdU53pn-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 11 May 2021 12:03:27 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Phishing]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bobby Hellard ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iDnby2TqpeetLrJRdU53pn-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A train operated by the West Midlands Trainline parked in a station ]]></media:description>                                                            <media:text><![CDATA[A train operated by the West Midlands Trainline parked in a station ]]></media:text>
                                <media:title type="plain"><![CDATA[A train operated by the West Midlands Trainline parked in a station ]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iDnby2TqpeetLrJRdU53pn-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Taking a proactive approach to cyber security ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/penetration-testing/359005/taking-a-proactive-approach-to-cyber-security</link>
                                                                            <description>
                            <![CDATA[ A complete guide to penetration testing ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">gFBixPVncSZKSnsiUaNteZ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ZcgPdbYTv5SgnYwcLheDTL-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 24 Mar 2021 11:44:02 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/ZcgPdbYTv5SgnYwcLheDTL-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A complete guide to penetration testing - whitepaper from CyberCx]]></media:description>                                                            <media:text><![CDATA[A complete guide to penetration testing - whitepaper from CyberCx]]></media:text>
                                <media:title type="plain"><![CDATA[A complete guide to penetration testing - whitepaper from CyberCx]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ZcgPdbYTv5SgnYwcLheDTL-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 80% of cyber professionals say the Computer Misuse Act is working against them ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/357833/cyber-professionals-worried-theyve-violated-the-computer-misuse-act</link>
                                                                            <description>
                            <![CDATA[ techUK report calls for "rapid modernisation" of the 30-year-old law that's "stifling" penetration testing ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">bPfvddXULyJizMmc5oCM9C</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/oQu4SjakrwoKz8VXQfWVJG-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 20 Nov 2020 12:13:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bobby Hellard ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/oQu4SjakrwoKz8VXQfWVJG-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A young professional showing signs of stress at work]]></media:description>                                                            <media:text><![CDATA[A young professional showing signs of stress at work]]></media:text>
                                <media:title type="plain"><![CDATA[A young professional showing signs of stress at work]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/oQu4SjakrwoKz8VXQfWVJG-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ How cyber attack simulations differ from penetration tests and vulnerability scanning ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/penetration-testing/357806/how-cyber-attack-simulations-differ-from-penetration-tests-and</link>
                                                                            <description>
                            <![CDATA[ Exploring the Cymulate Edge ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">hYLAdaDvCpRH9bX5nNmUy</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ToDVdgntGNNDuLhNm3tnG3-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Wed, 18 Nov 2020 13:04:13 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/ToDVdgntGNNDuLhNm3tnG3-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                                                                                                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ToDVdgntGNNDuLhNm3tnG3-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Ethics of red team security testing questioned in new report ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/penetration-testing/354693/ethics-of-red-team-security-testing-questioned-in-new-report</link>
                                                                            <description>
                            <![CDATA[ Research finds employees are far more likely to put up with red team testing if it's not conducted on themselves ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">oidYhcHoLkzJ7yysq4SJki</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dBqckCAfsZL4kbNfPmBSmX-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 03 Feb 2020 12:26:44 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keumars Afifi-Sabet ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dBqckCAfsZL4kbNfPmBSmX-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                                                                                                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dBqckCAfsZL4kbNfPmBSmX-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What is Breach and Attack Simulation (BAS)? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/penetration-testing/354645/what-is-breach-and-attack-simulation-bas</link>
                                                                            <description>
                            <![CDATA[ Explaining the latest security tool helping organisations identify and rectify vulnerabilities in their cyber defences ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">fkBxvkVE5A7yMZNwPb7gtL</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/fMbMro3SjAzTb5vKxrzNfc-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Wed, 29 Jan 2020 11:41:46 +0000</pubDate>                                                                                                                                <updated>Wed, 29 Jan 2020 14:30:46 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Esther Kezia Thorpe ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/fMbMro3SjAzTb5vKxrzNfc-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Data Breach overlaying a circuitboard]]></media:description>                                                            <media:text><![CDATA[Data Breach overlaying a circuitboard]]></media:text>
                                <media:title type="plain"><![CDATA[Data Breach overlaying a circuitboard]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/fMbMro3SjAzTb5vKxrzNfc-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ How targeted simulations differ from penetration tests and vulnerability scanning ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/penetration-testing/354497/how-targeted-simulations-differ-from-penetration-tests-and</link>
                                                                            <description>
                            <![CDATA[ Stay one step ahead of cyber attackers ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">wbFcxt6cCbbXTptssjz6hd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/sPocofyEzGwydhaf2UKvbk-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Jan 2020 10:47:54 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/sPocofyEzGwydhaf2UKvbk-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                                                                                                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/sPocofyEzGwydhaf2UKvbk-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ The 3 approaches of Breach and Attack Simulation technologies ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/cyber-attacks/354494/the-3-approaches-of-breach-and-attack-simulation-technologies</link>
                                                                            <description>
                            <![CDATA[ A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">5XuToeT6FARj9kpxtfpw5h</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/qZwCbfgifg63ta2zNJgRFh-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Jan 2020 09:54:27 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ itpro@futurenet.com (ITPro) ]]></author>                    <dc:creator><![CDATA[ ITPro ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/qZwCbfgifg63ta2zNJgRFh-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                                                                                                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/qZwCbfgifg63ta2zNJgRFh-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers 'are no longer winning', says KPMG cyber chief ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/34660/hackers-are-no-longer-winning-says-kpmg-cyber-chief</link>
                                                                            <description>
                            <![CDATA[ Despite progress over the past two years, a wealth of threats still plague both the public and private sectors ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">eZdXqbjkf8fXuJN4wrJTCo</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GCsxrL26j7Pj4pEgKsjRjm-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 18 Oct 2019 11:03:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GCsxrL26j7Pj4pEgKsjRjm-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Hacker in the shadows]]></media:description>                                                            <media:text><![CDATA[Hacker in the shadows]]></media:text>
                                <media:title type="plain"><![CDATA[Hacker in the shadows]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GCsxrL26j7Pj4pEgKsjRjm-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What is penetration testing? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/penetration-testing/33981/what-is-penetration-testing</link>
                                                                            <description>
                            <![CDATA[ Going beyond tooling and tech solutions with penetration testing is an effective way of achieving assurance in the security of your IT assets ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">moAMaQwc7q9qi8kF4dpcGW</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/KBQPyK3YkYoZ3uK9vhw5mg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 04 Oct 2019 09:00:00 +0000</pubDate>                                                                                                                                <updated>Sat, 07 Sep 2024 16:57:15 +0000</updated>
                                                                                                                                            <category><![CDATA[Development]]></category>
                                                    <category><![CDATA[Software]]></category>
                                                                                                                    <dc:creator><![CDATA[ Fleur Doidge ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/KBQPyK3YkYoZ3uK9vhw5mg-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A graphic depiction of an ethical hacker certificate]]></media:description>                                                            <media:text><![CDATA[A graphic depiction of an ethical hacker certificate]]></media:text>
                                <media:title type="plain"><![CDATA[A graphic depiction of an ethical hacker certificate]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/KBQPyK3YkYoZ3uK9vhw5mg-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What's the difference between active and passive reconnaissance? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/penetration-testing/34465/whats-the-difference-between-active-and-passive-reconnaissance</link>
                                                                            <description>
                            <![CDATA[ Exploring essential tools of both ethical and malicious hackers alike ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">iuAKacJhCTrm5gYUHgsz9L</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/jEcgjwrxDgkjXfaDBqsrBL-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 27 Sep 2019 11:50:00 +0000</pubDate>                                                                                                                                <updated>Thu, 19 Nov 2020 12:53:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Zach Cooper ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/jEcgjwrxDgkjXfaDBqsrBL-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A shield with a keyhole on a radar system denoting cyber security]]></media:description>                                                            <media:text><![CDATA[A shield with a keyhole on a radar system denoting cyber security]]></media:text>
                                <media:title type="plain"><![CDATA[A shield with a keyhole on a radar system denoting cyber security]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/jEcgjwrxDgkjXfaDBqsrBL-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Modern cyber security bears great resemblance to the Titanic disaster, says Stena CISO ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/34443/modern-cyber-security-bears-great-resemblance-to-the-titanic-disaster-says-stena-ciso</link>
                                                                            <description>
                            <![CDATA[ The security head likens the maritime disaster to cyber security blunders and gives his thoughts on how to move forward ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">tRg4Fk5YmjmsQvyk9Mr1Tj</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/KLkC38xCVXUUeck5xakUL5-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 19 Sep 2019 10:10:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/KLkC38xCVXUUeck5xakUL5-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Magnus Carling]]></media:description>                                                            <media:text><![CDATA[Magnus Carling]]></media:text>
                                <media:title type="plain"><![CDATA[Magnus Carling]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/KLkC38xCVXUUeck5xakUL5-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Pen testers arrested after breaking into courthouse that hired them ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/penetration-testing/34392/pen-testers-arrested-after-breaking-into-courthouse-that-hired-them</link>
                                                                            <description>
                            <![CDATA[ Specialists claim they were testing ‘physical’ vulnerability points as part of a cyber assessment ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">agne4nKTsXABZ1fnfcuRbP</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/NNHp7vEZAUj3QneQfcrDyE-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 13 Sep 2019 11:14:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keumars Afifi-Sabet ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/NNHp7vEZAUj3QneQfcrDyE-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A thief cutting a lock to break into a building]]></media:description>                                                            <media:text><![CDATA[A thief cutting a lock to break into a building]]></media:text>
                                <media:title type="plain"><![CDATA[A thief cutting a lock to break into a building]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/NNHp7vEZAUj3QneQfcrDyE-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Hackers may start 'Warshipping' businesses to steal data ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/penetration-testing/34171/hackers-may-start-warshipping-businesses-to-steal-data</link>
                                                                            <description>
                            <![CDATA[ IBM's latest imagined attack vector could soon be a reality ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">sofeUwNC91WhbVXonjhGMQ</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/GmZxA5G78b3kRSeEARZPgm-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 08 Aug 2019 10:28:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/GmZxA5G78b3kRSeEARZPgm-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Cyber attack]]></media:description>                                                            <media:text><![CDATA[Cyber attack]]></media:text>
                                <media:title type="plain"><![CDATA[Cyber attack]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/GmZxA5G78b3kRSeEARZPgm-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ How do you become an ethical hacker? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/641470/so-you-want-to-be-an-ethical-hacker</link>
                                                                            <description>
                            <![CDATA[ We examine what certifications do you need, what jobs are available and how much you can expect to be paid ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8sfKBHrggppFm6qjTAe767</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/ZzdJSZhjvG3kZFpodAqtjF-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 29 Jul 2019 12:10:00 +0000</pubDate>                                                                                                                                <updated>Fri, 29 Apr 2022 15:27:50 +0000</updated>
                                                                                                                                            <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                <author><![CDATA[ connor.jones@futurenet.com (Connor Jones) ]]></author>                    <dc:creator><![CDATA[ Connor Jones ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/ZzdJSZhjvG3kZFpodAqtjF-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing]]></media:description>                                                            <media:text><![CDATA[Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing]]></media:text>
                                <media:title type="plain"><![CDATA[Ethical hacker silhouette walking through a keyhole, symbolising physical security and penetration testing]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/ZzdJSZhjvG3kZFpodAqtjF-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Our 5-minute guide to security awareness training ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/33974/our-5-minute-guide-to-security-awareness-training</link>
                                                                            <description>
                            <![CDATA[ How security awareness training can build resilience in your business and reduce the likelihood of a successful cyber attack ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">h7ANZCnAVJhEFAbPTAoucm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/3BBjRB7TFv8wtojSeTwKWJ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 08 Jul 2019 12:31:00 +0000</pubDate>                                                                                                                                <updated>Fri, 24 Jan 2020 09:43:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Zach Cooper ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/3BBjRB7TFv8wtojSeTwKWJ-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Business classroom with a woman talking about cyber security, blue padlock image on whiteboard]]></media:description>                                                            <media:text><![CDATA[Business classroom with a woman talking about cyber security, blue padlock image on whiteboard]]></media:text>
                                <media:title type="plain"><![CDATA[Business classroom with a woman talking about cyber security, blue padlock image on whiteboard]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/3BBjRB7TFv8wtojSeTwKWJ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Microsoft launches $20,000 Azure DevOps bug bounty programme ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/32781/microsoft-launches-20000-azure-devops-bug-bounty-programme</link>
                                                                            <description>
                            <![CDATA[ Critical remote code execution flaws are the highest-paid, while denial-of-service attacks earn nothing ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mSL9Yem8yHxPUarR7qi3Fh</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/g43JRgnEoDRbAmLZhJXgeV-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 18 Jan 2019 09:56:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Adam Shepherd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/g43JRgnEoDRbAmLZhJXgeV-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Microsoft Azure]]></media:description>                                                            <media:text><![CDATA[Microsoft Azure]]></media:text>
                                <media:title type="plain"><![CDATA[Microsoft Azure]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/g43JRgnEoDRbAmLZhJXgeV-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ What can an ethical hacker do for my business? ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/hacking/32717/what-can-an-ethical-hacker-do-for-my-business</link>
                                                                            <description>
                            <![CDATA[ 'Ethical' and 'hacking' aren't usual bedfellows, but when paired they can be excellent penetration testers ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">mXkmxpZQr8FP2GRz4kwey5</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/Ab6kcmEH5dwCesoTYeh2qW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 18 Jan 2019 06:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Nik Rawlinson ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/Ab6kcmEH5dwCesoTYeh2qW-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                                                                                                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/Ab6kcmEH5dwCesoTYeh2qW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ FOI reveals NHS Trusts spend as little as £250 on cyber security ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/wannacry/32547/foi-reveals-nhs-trusts-spend-as-little-as-250-on-cyber-security</link>
                                                                            <description>
                            <![CDATA[ 'Alarming' spend and expertise discrepancies exposed as DHSC threatens enforcement action ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">oJ3p2Mu2MpX9NPdkPyPBCK</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/mds3gPMjrWMfM9saHMdukW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 11 Dec 2018 10:43:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keumars Afifi-Sabet ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/mds3gPMjrWMfM9saHMdukW-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                                                                                                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/mds3gPMjrWMfM9saHMdukW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ It's now "impossible" to protect critical UK infrastructure from cyber attack ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/cyber-attacks/32391/its-now-impossible-to-protect-critical-uk-infrastructure-from-cyber-attack</link>
                                                                            <description>
                            <![CDATA[ Parliamentary committee warns that mitigating the effects of successful attacks is becoming a 'new normal' ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">erGv7mELTofG61f7Uf33g3</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/nTJvtqYKvzWnsYGW5W7rTW-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 19 Nov 2018 10:39:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keumars Afifi-Sabet ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/nTJvtqYKvzWnsYGW5W7rTW-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Image of construction workers representing UK infrastructure]]></media:description>                                                            <media:text><![CDATA[Image of construction workers representing UK infrastructure]]></media:text>
                                <media:title type="plain"><![CDATA[Image of construction workers representing UK infrastructure]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/nTJvtqYKvzWnsYGW5W7rTW-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Vulnerabilities in web applications at the heart of 73% of breaches, Kaspersky finds ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/penetration-testing/31721/vulnerabilities-in-web-applications-at-the-heart-of-73-of-breaches</link>
                                                                            <description>
                            <![CDATA[ Pen test analysis finds 43% of companies have low or extremely low levels of security ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8PAGjyD4BMxoV1JLCbvALd</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/jpMiuQLHHoxgan6q6eJeDg-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 17 Aug 2018 10:58:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keumars Afifi-Sabet ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/jpMiuQLHHoxgan6q6eJeDg-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[A padlock on a motherboard surrounded by keys]]></media:description>                                                            <media:text><![CDATA[A padlock on a motherboard surrounded by keys]]></media:text>
                                <media:title type="plain"><![CDATA[A padlock on a motherboard surrounded by keys]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/jpMiuQLHHoxgan6q6eJeDg-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ New ‘facial recognition’ tool could help white hat hackers harvest social media profiles ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/31662/new-facial-recognition-tool-could-help-white-hat-hackers-harvest-social-media</link>
                                                                            <description>
                            <![CDATA[ Security company claims software creates a level playing field for white hats and pen testers ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">iKYkP3A3q4V9Yy9NyignFm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/HZAGiXiZE4YQr4aspB87CQ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 10 Aug 2018 08:52:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Adam Shepherd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/HZAGiXiZE4YQr4aspB87CQ-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[Surveillance, machine learning, facial recognition]]></media:description>                                                            <media:text><![CDATA[Surveillance, machine learning, facial recognition]]></media:text>
                                <media:title type="plain"><![CDATA[Surveillance, machine learning, facial recognition]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/HZAGiXiZE4YQr4aspB87CQ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Large businesses are the most vulnerable to cyber attacks ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/cyber-security/31513/large-businesses-are-the-most-vulnerable-to-cyber-attacks</link>
                                                                            <description>
                            <![CDATA[ Password flaws, unsecured protocols and out-of-date software - enterprises have them all ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">heHmXsSSQBq2s15NhZxikh</guid>
                                                                                                                            <pubDate>Mon, 16 Jul 2018 10:24:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Cyber Attacks]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Keumars Afifi-Sabet ]]></dc:creator>                                                                                                </item>
                                <item>
                                                            <title><![CDATA[ How to install Kali Linux on Raspberry Pi ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/31455/how-to-install-kali-linux-on-raspberry-pi</link>
                                                                            <description>
                            <![CDATA[ Follow these simple steps to install the penetration testing software on the compact computer for mobile hacking ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">8LDg74vkAobQ49RUjDEj6Z</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/BiT8DhKfTchdZ6kAHcZikB-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Thu, 05 Jul 2018 14:32:00 +0000</pubDate>                                                                                                                                <updated>Tue, 22 Sep 2020 13:29:00 +0000</updated>
                                                                                                                                            <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Bobby Hellard ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/BiT8DhKfTchdZ6kAHcZikB-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[List of Kali images to download for the Raspberry Pi]]></media:description>                                                            <media:text><![CDATA[List of Kali images to download for the Raspberry Pi]]></media:text>
                                <media:title type="plain"><![CDATA[List of Kali images to download for the Raspberry Pi]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/BiT8DhKfTchdZ6kAHcZikB-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ For digital transformation to work, developers need to take security seriously ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/digital-transformation/31251/for-digital-transformation-to-work-developers-need-to-take-security</link>
                                                                            <description>
                            <![CDATA[ Security heads at GSK, M&S and Williams believe software engineers need a guiding hand ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">k29C2ec2uyqiCPqrRcBsqp</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/6RktghQ98dMzmGtESRQA3Q-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 08 Jun 2018 05:30:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Adam Shepherd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/6RktghQ98dMzmGtESRQA3Q-1280-80.jpg">
                                                            <media:credit><![CDATA[Shutterstock]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[security]]></media:description>                                                            <media:text><![CDATA[security]]></media:text>
                                <media:title type="plain"><![CDATA[security]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/6RktghQ98dMzmGtESRQA3Q-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ “It’s the legacy that gets you”, warns ex-TalkTalk boss  ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/data-breaches/31245/it-s-the-legacy-that-gets-you-warns-ex-talktalk-boss</link>
                                                                            <description>
                            <![CDATA[ Dido Harding urges companies to decommission unsecured legacy systems to avoid a costly data breach ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">2t6Vf9XAhk12wTFhvGynpu</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/qEcx36CEunvfEHU8NxuM58-1280-80.png" type="image/png" length="0"></enclosure>
                                                                        <pubDate>Tue, 05 Jun 2018 14:33:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Adam Shepherd ]]></dc:creator>                                                                                                    <media:content type="image/png" url="https://cdn.mos.cms.futurecdn.net/qEcx36CEunvfEHU8NxuM58-1280-80.png">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[TalkTalk logo]]></media:description>                                                            <media:text><![CDATA[TalkTalk logo]]></media:text>
                                <media:title type="plain"><![CDATA[TalkTalk logo]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/qEcx36CEunvfEHU8NxuM58-1280-80.png" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ Kali Linux comes to Windows 10, handing hacking tools to pen testers ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/penetration-testing/30697/kali-linux-comes-to-windows-10-handing-hacking-tools-to-pen-testers</link>
                                                                            <description>
                            <![CDATA[ Hacker-friendly distro arrives on Windows Subsystem for Linux ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">piFi89nnaUweVJib1zNwcm</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/dF5KwnXo7RGbYHjT7MtqHQ-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Tue, 06 Mar 2018 10:59:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Adam Shepherd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/dF5KwnXo7RGbYHjT7MtqHQ-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                                                                                                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/dF5KwnXo7RGbYHjT7MtqHQ-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ De Montfort University launches a week of cyber security events ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/cyber-security/30609/de-montfort-university-launches-a-week-of-cyber-security-events</link>
                                                                            <description>
                            <![CDATA[ DMU students will be able to gain practical experience from industry experts ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">dzMRZZZbpEAWZNfY451hZf</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/iqWWZW3hUsJ8mBtfKMsbJF-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Fri, 23 Feb 2018 09:46:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Adam Shepherd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/iqWWZW3hUsJ8mBtfKMsbJF-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                                                                                                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/iqWWZW3hUsJ8mBtfKMsbJF-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ NCSC blocks millions of cyber attacks launched against UK ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/national-cyber-security-centre-ncsc/30462/ncsc-blocks-millions-of-cyber-attacks-launched-against-uk</link>
                                                                            <description>
                            <![CDATA[ But hackers will respond with fresh ways to target businesses and citizens, body warns ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">d1eAqXmum2SL95Hn8gmj6q</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/YDDFz2U2cRjpiRXpDNTtsR-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 05 Feb 2018 12:54:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Hacking]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Lee Bell ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/YDDFz2U2cRjpiRXpDNTtsR-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                                                                                                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/YDDFz2U2cRjpiRXpDNTtsR-1280-80.jpg" />
                                                                                        </item>
                                <item>
                                                            <title><![CDATA[ 3 reasons why Nadine Dorries is totally wrong about password sharing ]]></title>
                                                                                                                                                                                                <link>https://www.itpro.com/security/30089/3-reasons-why-nadine-dorries-is-totally-wrong-about-password-sharing</link>
                                                                            <description>
                            <![CDATA[ Frustration abounds as MPs expose their backwards security practises ]]>
                                                                                                            </description>
                                                                                                                                <guid isPermaLink="false">uiCsMdYaUAaaM2z13NyyhB</guid>
                                                                                                <enclosure url="https://cdn.mos.cms.futurecdn.net/T5otn7g3g38REfj2ZVHKvY-1280-80.jpg" type="image/jpeg" length="0"></enclosure>
                                                                        <pubDate>Mon, 04 Dec 2017 17:33:00 +0000</pubDate>                                                                                                                                                                                                                                <category><![CDATA[Data Breaches]]></category>
                                                    <category><![CDATA[Security]]></category>
                                                                                                                    <dc:creator><![CDATA[ Adam Shepherd ]]></dc:creator>                                                                                                    <media:content type="image/jpeg" url="https://cdn.mos.cms.futurecdn.net/T5otn7g3g38REfj2ZVHKvY-1280-80.jpg">
                                                            <media:credit><![CDATA[null]]></media:credit>
                                                                                                                                                                                                                                    <media:description><![CDATA[facepalm sad social media]]></media:description>                                                            <media:text><![CDATA[facepalm sad social media]]></media:text>
                                <media:title type="plain"><![CDATA[facepalm sad social media]]></media:title>
                                                    </media:content>
                                                    <media:thumbnail url="https://cdn.mos.cms.futurecdn.net/T5otn7g3g38REfj2ZVHKvY-1280-80.jpg" />
                                                                                        </item>
            </channel>
</rss>