<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Magazine</title>
    <description>Security magazine provides security industry news and trends on video surveillance, cyber security, physical security, security guards, access management and more for security executives and the security industry.</description>
    <link>https://www.securitymagazine.com/rss/articles</link>
    <item>
      <title>What the Medtronic Breach Means for Security Experts</title>
      <description>
        <![CDATA[<p>Security experts are sharing their insights on the broader implications of this breach. </p>]]>
      </description>
      <pubDate>Mon, 27 Apr 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102266-what-the-medtronic-breach-means-for-security-experts</link>
      <guid>http://www.securitymagazine.com/articles/102266</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/27/Laptop-and-coffee-in-shade-by-Guillermo-Latorre.webp?t=1777306421" type="image/png" length="371256"/>
    </item>
    <item>
      <title>Why Energy Infrastructure Is Cybersecurity’s Next Frontier</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Energy infrastructure represents cybersecurity’s next frontier because it changes the scope and speed at which risks evolve.</span>
</p>]]>
      </description>
      <pubDate>Mon, 27 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102261-why-energy-infrastructure-is-cybersecuritys-next-frontier</link>
      <guid>http://www.securitymagazine.com/articles/102261</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/24/Electric-substation-by-American-Public-Power-Association.webp?t=1777042094" type="image/png" length="454782"/>
    </item>
    <item>
      <title>ADT Breach Confirmed: Names, Phone Numbers, and Addresses Exposed</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">ADT discovered unauthorized access of customer and prospective customer information.&nbsp;</span>
</p>]]>
      </description>
      <pubDate>Mon, 27 Apr 2026 08:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102264-adt-breach-confirmed-names-phone-numbers-and-addresses-exposed</link>
      <guid>http://www.securitymagazine.com/articles/102264</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/27/ADT-on-wall-by-the-blowup.webp?t=1777292461" type="image/png" length="406047"/>
    </item>
    <item>
      <title>Security Career or Security Blanket? Turning Fearful Staying into Commitment</title>
      <description>
        <![CDATA[<p>Building a culture where your best security people choose your organization is key.</p>]]>
      </description>
      <pubDate>Mon, 27 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102218-security-career-or-security-blanket-turning-fearful-staying-into-commitment</link>
      <guid>http://www.securitymagazine.com/articles/102218</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Career-Feat-Slide1-1170x658.webp?t=1775661149" type="image/jpeg" length="73202"/>
    </item>
    <item>
      <title>Netherlands Faces Greatest National Security Threat Since World War Two</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Dutch intelligence agency AIVD says the Netherlands is facing the greatest national security threat in decades.&nbsp;</span></p>]]>
      </description>
      <pubDate>Fri, 24 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102263-netherlands-faces-greatest-national-security-threat-since-world-war-two</link>
      <guid>http://www.securitymagazine.com/articles/102263</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/24/Netherlands-on-a-map-by-KOBU-Agency.webp?t=1777047639" type="image/png" length="401733"/>
    </item>
    <item>
      <title>How Physical Security Data Is Supporting Public Safety Challenges</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The use of physical security data is driven predominantly by concerns for officer safety.&nbsp;</span></p>]]>
      </description>
      <pubDate>Fri, 24 Apr 2026 12:05:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102262-how-physical-security-data-is-supporting-public-safety-challenges</link>
      <guid>http://www.securitymagazine.com/articles/102262</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/24/Security-guard-in-hallway-by-Izzuddin-Azzam.webp?t=1777045012" type="image/png" length="320589"/>
    </item>
    <item>
      <title>What Claude and OpenClaw Vulnerabilities Reveal About AI Agents</title>
      <description>
        <![CDATA[<p>Claude and OpenClaw vulnerabilities reveal why AI agents must be governed like privileged identities.&nbsp;</p>]]>
      </description>
      <pubDate>Fri, 24 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102257-what-claude-and-openclaw-vulnerabilities-reveal-about-ai-agents</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102257</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/AI-chip-up-close-by-Igor-Omilaev.webp?t=1776966219" type="image/png" length="445428"/>
    </item>
    <item>
      <title>Succeeding an Underwhelming Leader</title>
      <description>
        <![CDATA[<p>Security leaders discuss taking over leadership after an underperforming leader.</p>]]>
      </description>
      <pubDate>Fri, 24 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102217-succeeding-an-underwhelming-leader</link>
      <guid>http://www.securitymagazine.com/articles/102217</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Leader-Feat-Slide1-1170x658.webp?t=1775660728" type="image/jpeg" length="35610"/>
    </item>
    <item>
      <title>Security Leaders Discuss the Claude Mythos Breach </title>
      <description>
        <![CDATA[<p>What security experts are saying about the Claude Mythos breach.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 23 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102253-security-leaders-discuss-the-claude-mythos-breach</link>
      <guid>http://www.securitymagazine.com/articles/102253</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/AI-chip-by-Igor-Omilaev.webp?t=1776956192" type="image/png" length="845851"/>
    </item>
    <item>
      <title>Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption</title>
      <description>
        <![CDATA[<p>While vulnerability management and patching remain necessary, they are not sufficient to address the new reality that Mythos represents.</p>]]>
      </description>
      <pubDate>Thu, 23 Apr 2026 11:05:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102250-operationally-ineffective-putting-cves-in-a-chokehold-with-privilege-disruption</link>
      <guid>http://www.securitymagazine.com/articles/102250</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/Laptop-with-green-code-by-Moritz-Erken.webp?t=1776868738" type="image/png" length="374989"/>
    </item>
    <item>
      <title>NIST’s New Prioritization Criteria for CVEs, Examined by Experts</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">NIST recently changed how it handles CVEs.&nbsp;</span></p>]]>
      </description>
      <pubDate>Thu, 23 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102255-nists-new-prioritization-criteria-for-cves-examined-by-experts</link>
      <guid>http://www.securitymagazine.com/articles/102255</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/Green-padlock-on-keyboard-by-rupixen.webp?t=1776955351" type="image/png" length="306013"/>
    </item>
    <item>
      <title>How Should Effective AI Red Teams Operate?</title>
      <description>
        <![CDATA[<p>Dr. Peter Garraghan speaks with <em>Security </em>magazine about AI-specific red teaming.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 23 Apr 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102249-how-should-effective-ai-red-teams-operate</link>
      <guid>http://www.securitymagazine.com/articles/102249</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/SEC_Web_5Minutes-Garraghan-0426_1170x658.webp?t=1776873919" type="image/jpeg" length="99911"/>
    </item>
    <item>
      <title>Unauthorized Users Accessed Claude Mythos, New Reports Suggest</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Anthropic’s new AI model may have been accessed by unauthorized users.&nbsp;</span></p>]]>
      </description>
      <pubDate>Wed, 22 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102251-unauthorized-users-accessed-claude-mythos-new-reports-suggest</link>
      <guid>http://www.securitymagazine.com/articles/102251</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/Laptop-in-darkness-by-Hostaphoto.webp?t=1776877073" type="image/png" length="125623"/>
    </item>
    <item>
      <title>Why Bridging Siloes Doesn’t Need to Be Complicated</title>
      <description>
        <![CDATA[<p>Bruce McIndoe provides actionable steps for bridging siloes.</p>]]>
      </description>
      <pubDate>Wed, 22 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102240-why-bridging-siloes-doesnt-need-to-be-complicated</link>
      <guid>http://www.securitymagazine.com/articles/102240</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/McIndoe-podcast-news-header.webp?t=1776785504" type="image/png" length="120498"/>
    </item>
    <item>
      <title>Hackers Claim 19M Records Stolen From French Government Agency</title>
      <description>
        <![CDATA[<p>The <span style=" font-style: normal; font-weight: 300; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">France Titres&nbsp;<span style=" font-style: normal; font-weight: 300; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">discovered a security incident.&nbsp;</span></span></p>]]>
      </description>
      <pubDate>Wed, 22 Apr 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102248-hackers-claim-19m-records-stolen-from-french-government-agency</link>
      <guid>http://www.securitymagazine.com/articles/102248</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/French-flag-by-Rafael-Garcin.webp?t=1776860491" type="image/png" length="263048"/>
    </item>
    <item>
      <title>The Security Metric That’s Failing You</title>
      <description>
        <![CDATA[<p>Security teams have measured patch rates for so long that somewhere along the way, the metric became the strategy.</p>]]>
      </description>
      <pubDate>Wed, 22 Apr 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102245-the-security-metric-thats-failing-you</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102245</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/Stressed-woman-at-laptop-by-Elisa-Ventur.webp?t=1776778706" type="image/png" length="446361"/>
    </item>
    <item>
      <title>The Privacy–Security Partnership: How We Bend Risk in a Resource Crunch</title>
      <description>
        <![CDATA[<p>The partnership between cybersecurity and privacy matters now more than ever.</p>]]>
      </description>
      <pubDate>Wed, 22 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102216-the-privacysecurity-partnership-how-we-bend-risk-in-a-resource-crunch</link>
      <guid>http://www.securitymagazine.com/articles/102216</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Cyber-Feat-Slide1-1170x658.webp?t=1775658579" type="image/jpeg" length="106368"/>
    </item>
    <item>
      <title>Safe Learning 101 Program Supports Schools in Strengthening Campus Security</title>
      <description>
        <![CDATA[<p><em>Security </em>magazine speaks with the&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">expert partner behind this program.&nbsp;</span></p>]]>
      </description>
      <pubDate>Tue, 21 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102237-safe-learning-101-program-supports-schools-in-strengthening-campus-security</link>
      <guid>http://www.securitymagazine.com/articles/102237</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/Stacked-books-by-Kimberly-Farmer.webp?t=1776895794" type="image/png" length="348053"/>
    </item>
    <item>
      <title>Security Leaders Discuss the Vercel Breach</title>
      <description>
        <![CDATA[<p>Security leaders are discussing the Vercel breach.&nbsp;</p>]]>
      </description>
      <pubDate>Tue, 21 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102246-security-leaders-discuss-the-vercel-breach</link>
      <guid>http://www.securitymagazine.com/articles/102246</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/Office-supplies-by-Amy-Hirschi.webp?t=1776783392" type="image/png" length="332942"/>
    </item>
    <item>
      <title>When Metal Theft Becomes a Life Safety Crisis</title>
      <description>
        <![CDATA[<p>Lessons from telecommunications infrastructure attacks.&nbsp;</p>]]>
      </description>
      <pubDate>Tue, 21 Apr 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102244-when-metal-theft-becomes-a-life-safety-crisis</link>
      <guid>http://www.securitymagazine.com/articles/102244</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/Person-in-red-hoodie-by-Vladyslav-Lytvyshchenko.webp?t=1776895794" type="image/png" length="341229"/>
    </item>
    <item>
      <title>US Security Agency Leverages Claude Mythos Despite Pentagon Blacklist</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Reports suggest that the NSA is using Claude Mythos.&nbsp;</span></p>]]>
      </description>
      <pubDate>Mon, 20 Apr 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102243-us-security-agency-leverages-claude-mythos-despite-pentagon-blacklist</link>
      <guid>http://www.securitymagazine.com/articles/102243</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/20/Aerial-view-of-America-by-NASA.webp?t=1776702474" type="image/png" length="629203"/>
    </item>
    <item>
      <title>Vercel Breach Originated From an Employee’s AI Tool</title>
      <description>
        <![CDATA[<p>This breach occurred due to a <span style=" font-style: normal; font-weight: 400; letter-spacing: 0.1px; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">third-party AI tool.&nbsp;</span></p>]]>
      </description>
      <pubDate>Mon, 20 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102242-vercel-breach-originated-from-an-employees-ai-tool</link>
      <guid>http://www.securitymagazine.com/articles/102242</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/20/Computer-in-darkness-by-Nikita-Kachanovsky.webp?t=1776699474" type="image/png" length="299046"/>
    </item>
    <item>
      <title>58% of Organizations Spend Over 10 Hours a Month Securing AI-generated Code</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A recent report by Cloudsmith found that 31% of organizations using AI-generated code spend 10 hours or less per month validating, auditing, or securing it.</span></p>]]>
      </description>
      <pubDate>Mon, 20 Apr 2026 10:23:28 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102241-58-of-organizations-spend-over-10-hours-a-month-securing-ai-generated-code</link>
      <guid>http://www.securitymagazine.com/articles/102241</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/20/chris-ried-ieic5Tq8YMk-unsplash.webp?t=1776694909" type="image/jpeg" length="132731"/>
    </item>
    <item>
      <title>Advance Your Cybersecurity Career</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine talks with a CISO about how cyber professionals can advance their careers.</p>]]>
      </description>
      <pubDate>Mon, 20 Apr 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102214-advance-your-cybersecurity-career</link>
      <guid>http://www.securitymagazine.com/articles/102214</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Edu-Feat-Slide1-1170x658.webp?t=1776895797" type="image/jpeg" length="123294"/>
    </item>
    <item>
      <title>Top 3 Cyber Insurance Incident Claims</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A new report reveals the top three cyber incidents that account for a majority of reported claims.&nbsp;</span></p>]]>
      </description>
      <pubDate>Mon, 20 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102232-top-3-cyber-insurance-incident-claims</link>
      <guid>http://www.securitymagazine.com/articles/102232</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/17/Laptop-keyboard-in-gradient-colorful-light-by-Jonas-Vandermeiren.webp?t=1776442444" type="image/png" length="151909"/>
    </item>
    <item>
      <title>Former UK Ambassador, Linked to Epstein, Failed Security Vetting Yet Received Clearance</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Peter Mandelson, a former British ambassador to the United States, failed security vetting clearance before taking his position.&nbsp;</span></p>]]>
      </description>
      <pubDate>Fri, 17 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102239-former-uk-ambassador-linked-to-epstein-failed-security-vetting-yet-received-clearance</link>
      <guid>http://www.securitymagazine.com/articles/102239</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/17/Man-silhouette-by-Ben-Sweet.webp?t=1776895795" type="image/png" length="42896"/>
    </item>
    <item>
      <title>ICE Acting Director Todd Lyons to Resign</title>
      <description>
        <![CDATA[<p>ICE acting director Todd Lyons is set to resign at the end of May.&nbsp;</p>]]>
      </description>
      <pubDate>Fri, 17 Apr 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102238-ice-acting-director-todd-lyons-to-resign</link>
      <guid>http://www.securitymagazine.com/articles/102238</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/17/American-flag-by-Joshua-Hoehne.webp?t=1776895795" type="image/png" length="545767"/>
    </item>
    <item>
      <title>How CSOs Can Win Board Support for Gunshot Detection Technology</title>
      <description>
        <![CDATA[<p>How CSOs can win board support for gunshot detection technology.</p>]]>
      </description>
      <pubDate>Fri, 17 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102211-how-csos-can-win-board-support-for-gunshot-detection-technology</link>
      <guid>http://www.securitymagazine.com/articles/102211</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-F3-Feat-Slide1-1170x658.webp?t=1776895797" type="image/jpeg" length="69139"/>
    </item>
    <item>
      <title>What Are Security Experts Saying About OpenAI’s GPT-5.4-Cyber?</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">OpenAI has launched GPT-5.4-Cyber, a model optimized for defensive cybersecurity usage.&nbsp;</span></p>]]>
      </description>
      <pubDate>Thu, 16 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102235-what-are-security-experts-saying-about-openais-gpt-54-cyber</link>
      <guid>http://www.securitymagazine.com/articles/102235</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Golden-lights-by-Joshua-Sortino.webp?t=1776273162" type="image/png" length="929161"/>
    </item>
    <item>
      <title>What “The Pitt” Gets Right About Ransomware and What Hospitals Can’t Afford to Ignore </title>
      <description>
        <![CDATA[<p><em>The Pitt&nbsp;</em>may end its story with systems restored, but real hospitals don’t get that clean ending.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 16 Apr 2026 10:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102236-what-the-pitt-gets-right-about-ransomware-and-what-hospitals-cant-afford-to-ignore</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102236</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/15/Ambulance-by-Albert-Stoynov.webp?t=1776279946" type="image/png" length="501861"/>
    </item>
  </channel>
</rss>
