<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Magazine</title>
    <description>Security magazine provides security industry news and trends on video surveillance, cyber security, physical security, security guards, access management and more for security executives and the security industry.</description>
    <link>https://www.securitymagazine.com/rss/articles</link>
    <item>
      <title>123,000 Impacted by American Lending Center’s Year-Old Breach</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The American Lending Center notified consumers of a data breach nearly a year after it occured.&nbsp;</span></p>]]>
      </description>
      <pubDate>Mon, 18 May 2026 13:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102309-123-000-impacted-by-year-old-breach</link>
      <guid>http://www.securitymagazine.com/articles/102309</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/18/Calendar-with-pins-by-Towfiqu-barbhuiya.webp?t=1779120656" type="image/png" length="233997"/>
    </item>
    <item>
      <title>Reframing MFA Bypass: Four Identity Gaps Attackers Exploit </title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The misnomer of ‘MFA Bypass’ keeps MFA at the center of a problem it cannot solve alone.</span>
</p>]]>
      </description>
      <pubDate>Mon, 18 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102304-reframing-mfa-bypass-four-identity-gaps-attackers-exploit</link>
      <guid>http://www.securitymagazine.com/articles/102304</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/15/Laptop-in-darkness-by-Hostaphoto.webp?t=1778859466" type="image/png" length="125623"/>
    </item>
    <item>
      <title>MENA Region Runs First-of-its-Kind Cybercrime Operation, 201 Arrested</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The Middle East and North Africa (MENA) region, also referred to as Southwest Asia and North Africa (SWANA), managed a first-of-its-kind cybercrime operation between October 2025 and February 2026.</span>
</p>]]>
      </description>
      <pubDate>Mon, 18 May 2026 10:23:56 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102308-mena-region-runs-first-of-its-kind-cybercrime-operation-201-arrested</link>
      <guid>http://www.securitymagazine.com/articles/102308</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/18/kevin-horvat-Pyjp2zmxuLk-unsplash.webp?t=1779113983" type="image/jpeg" length="110101"/>
    </item>
    <item>
      <title>Security Isn’t a Commodity. Neither Is Off-Duty Law Enforcement</title>
      <description>
        <![CDATA[<p>During periods of economic pressure, leadership teams inevitably begin asking the same question: “Where can we cut security spend without increasing risk?”</p>]]>
      </description>
      <pubDate>Mon, 18 May 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102305-security-isnt-a-commodity-neither-is-off-duty-law-enforcement</link>
      <guid>http://www.securitymagazine.com/articles/102305</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2024/09/06/Glowing-police-siren-UNSPLASH.webp?t=1778855325" type="image/png" length="267875"/>
    </item>
    <item>
      <title>Product Spotlight on Risk Assessment Monitoring</title>
      <description>
        <![CDATA[<p><em>Security</em> magazine highlights a few risk monitoring solutions for 2026.</p>]]>
      </description>
      <pubDate>Mon, 18 May 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102271-product-spotlight-on-risk-assessment-monitoring</link>
      <guid>http://www.securitymagazine.com/articles/102271</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-ProdSpot-Feat_1170x658.webp?t=1777380490" type="image/jpeg" length="93529"/>
    </item>
    <item>
      <title>Did Iran Hack Tank Readers at US Gas Stations? Security Leaders Discuss</title>
      <description>
        <![CDATA[<p>Security leaders share their thoughts on the attack, Iran’s potential involvement and the broader implications. </p>]]>
      </description>
      <pubDate>Fri, 15 May 2026 16:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102306-did-iran-hack-tank-readers-at-us-gas-stations-security-leaders-discuss</link>
      <guid>http://www.securitymagazine.com/articles/102306</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/15/Gas-station-by-Hans-Eiskonen.webp?t=1778875430" type="image/png" length="249372"/>
    </item>
    <item>
      <title>Why Most Workplace Violence Prevention Starts Too Late</title>
      <description>
        <![CDATA[<p>If your people are running, hiding, or fighting, the prevention window has already closed.</p><br>]]>
      </description>
      <pubDate>Fri, 15 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102302-why-most-workplace-violence-prevention-starts-too-late</link>
      <guid>http://www.securitymagazine.com/articles/102302</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/14/Man-with-covered-face-by-Jeremy-Weber.webp?t=1778775586" type="image/png" length="146283"/>
    </item>
    <item>
      <title>2025 Saw a Surge in Wireless Vulnerabilities</title>
      <description>
        <![CDATA[<p>Wireless vulnerabilities rose in 2025.</p>]]>
      </description>
      <pubDate>Fri, 15 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102270-2025-saw-a-surge-in-wireless-vulnerabilities</link>
      <guid>http://www.securitymagazine.com/articles/102270</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-News3-Feat-Slide1-1170x658.webp?t=1777322198" type="image/jpeg" length="123566"/>
    </item>
    <item>
      <title>Funding Has Limited Security Readiness</title>
      <description>
        <![CDATA[<p>Limited security funding opens organizations to threat actors.</p>]]>
      </description>
      <pubDate>Fri, 15 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102269-funding-has-limited-security-readiness</link>
      <guid>http://www.securitymagazine.com/articles/102269</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-News2-Feat-Slide1-1170x658.webp?t=1777321953" type="image/jpeg" length="125156"/>
    </item>
    <item>
      <title>AI Makes Phishing Scams Harder to Identify in the Workplace</title>
      <description>
        <![CDATA[<p>Phishing grows harder to identify in the age of AI.&nbsp;</p>]]>
      </description>
      <pubDate>Fri, 15 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102268-ai-makes-phishing-scams-harder-to-identify-in-the-workplace</link>
      <guid>http://www.securitymagazine.com/articles/102268</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-News1-Feat-Slide1-1170x658.webp?t=1777321628" type="image/jpeg" length="64207"/>
    </item>
    <item>
      <title>Foxconn Confirms Cyberattack, Security Experts Discuss</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Foxconn confirmed a cyberattack has disrupted some of its North American facilities</span>
</p>]]>
      </description>
      <pubDate>Thu, 14 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102301-foxconn-confirms-cyberattack-security-experts-discuss</link>
      <guid>http://www.securitymagazine.com/articles/102301</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/14/Laptop-and-monitor-by-Glen-Carrie.webp?t=1778773854" type="image/png" length="339529"/>
    </item>
    <item>
      <title>Expert Insights on the West Pharmaceutical Ransomware Attack</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">West Pharmaceutical Services experienced a ransomware incident.&nbsp;</span></p>]]>
      </description>
      <pubDate>Thu, 14 May 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102300-expert-insights-on-the-west-pharmaceutical-ransomware-attack</link>
      <guid>http://www.securitymagazine.com/articles/102300</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/14/Pills-spilled-by-Towfiqu-barbhuiya.webp?t=1778769586" type="image/png" length="221040"/>
    </item>
    <item>
      <title>The Bench You'll Need in Three Years Depends on Decisions You Make Now</title>
      <description>
        <![CDATA[<p>Today’s hiring shortcut is tomorrow’s talent shortage.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 14 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102299-the-bench-youll-need-in-three-years-depends-on-decisions-you-make-now</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102299</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Woman-by-whiteboard-by-ThisisEngineering.webp?t=1778690709" type="image/png" length="302550"/>
    </item>
    <item>
      <title>What Security Leaders Say About the First AI-Developed Zero-Day Exploit</title>
      <description>
        <![CDATA[<p>Security leaders discuss the first AI-created&nbsp;<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">zero-day exploit.&nbsp;</span></p>]]>
      </description>
      <pubDate>Wed, 13 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102298-what-security-leaders-say-about-the-first-ai-developed-zero-day-exploit</link>
      <guid>http://www.securitymagazine.com/articles/102298</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Coding-by-Walkator.webp?t=1778685541" type="image/png" length="846347"/>
    </item>
    <item>
      <title>Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Cybersecurity is no longer a function that can be delegated and reviewed after the fact.&nbsp;</span></p>]]>
      </description>
      <pubDate>Wed, 13 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102297-cybersecurity-is-no-longer-a-gatekeeper-but-the-engine-of-delivery-across-digital-economy</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102297</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Glowing-fibers-by-Luke-Jones.webp?t=1778673918" type="image/png" length="660440"/>
    </item>
    <item>
      <title>Why Security Leaders Need to Move Beyond the Mental Illness Narrative</title>
      <description>
        <![CDATA[<p>For mental health awareness month, Brian LeBlanc highlights why security is pivotal to preventing a crisis in the workplace.</p>]]>
      </description>
      <pubDate>Wed, 13 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102267-why-security-leaders-need-to-move-beyond-the-mental-illness-narrative</link>
      <guid>http://www.securitymagazine.com/articles/102267</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-Edu-Feat-Slide1-1170x658.webp?t=1777320214" type="image/jpeg" length="150576"/>
    </item>
    <item>
      <title>Top 2026 Security Conferences</title>
      <description>
        <![CDATA[<p style="box-sizing: border-box; font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px;"><em style="box-sizing: border-box;">Security&nbsp;</em>magazine offers a roundup of security conferences taking place in 2026.&nbsp;</p>]]>
      </description>
      <pubDate>Mon, 11 May 2026 13:46:26 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102296-top-2026-security-conferences</link>
      <guid>http://www.securitymagazine.com/articles/102296</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/11/SEC_security-conferences-of-2026.webp?t=1778521334" type="image/jpeg" length="178058"/>
    </item>
    <item>
      <title>Digital Trust and Identity at ISC West</title>
      <description>
        <![CDATA[<p>ISC West keynote highlights how gaps across physical access points, digital systems and human processes undermine trust and organizational resilience.</p>]]>
      </description>
      <pubDate>Mon, 11 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102258-digital-trust-and-identity-at-isc-west</link>
      <guid>http://www.securitymagazine.com/articles/102258</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-Talk-Feat-Slide1-1170x658.webp?t=1778688553" type="image/jpeg" length="137583"/>
    </item>
    <item>
      <title>AI Will Tell Your Breach Story for the Next Two Years — Day One Decides What It Says</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The companies that win the AI-era reputation fight will be the ones whose CISOs and CCOs share a line item, a runbook, and a dashboard.&nbsp;</span>
</p>]]>
      </description>
      <pubDate>Fri, 08 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102295-ai-will-tell-your-breach-story-for-the-next-two-years-day-one-decides-what-it-says</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102295</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Megaphone-by-Igor-Omilaev.webp?t=1778183697" type="image/png" length="664838"/>
    </item>
    <item>
      <title>10 Data Breaches to Know About (April 2026)</title>
      <description>
        <![CDATA[<p>A roundup of recent data breach stories.&nbsp;</p>]]>
      </description>
      <pubDate>Fri, 08 May 2026 08:46:58 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102282-10-data-breaches-to-know-about-april-2026</link>
      <guid>http://www.securitymagazine.com/articles/102282</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/01/Opened-padlock-on-computer-keyboard-by-Sasun-Bughdaryan.webp?t=1777662611" type="image/png" length="307414"/>
    </item>
    <item>
      <title>Partners in Protection: How to Utilize a Canine Security Force</title>
      <description>
        <![CDATA[<p>Organizations of all sizes are looking for innovative ways, including canine teams, to advance their security programs.</p>]]>
      </description>
      <pubDate>Fri, 08 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102256-partners-in-protection-how-to-utilize-a-canine-security-force</link>
      <guid>http://www.securitymagazine.com/articles/102256</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-F4-Feat-Slide1-1170x658.webp?t=1778688552" type="image/jpeg" length="88680"/>
    </item>
    <item>
      <title>Research: Microsoft Edge Loads Stored Passwords in Cleartext</title>
      <description>
        <![CDATA[<p>A researcher found that Microsoft Edge will load <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: start; widows: 2; word-spacing: 0px; display: inline !important; float: none;">saved passwords into memory in plaintext, even when they are not being used.&nbsp;</span></p>]]>
      </description>
      <pubDate>Thu, 07 May 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102294-research-microsoft-edge-loads-stored-passwords-in-cleartext</link>
      <guid>http://www.securitymagazine.com/articles/102294</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Laptop-with-desktop-screen-showing-by-Sunrise-King.webp?t=1778170941" type="image/png" length="282476"/>
    </item>
    <item>
      <title>Will This World Password Day Be the Last?</title>
      <description>
        <![CDATA[<p>Passwords have long been an integral part of online security. But this year, some cybersecurity experts are pushing for this to change.&nbsp;</p>]]>
      </description>
      <pubDate>Thu, 07 May 2026 11:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102293-will-this-world-password-day-be-the-last</link>
      <guid>http://www.securitymagazine.com/articles/102293</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Keys-on-yellow-background-by-Alp-Duran.webp?t=1778167213" type="image/png" length="411957"/>
    </item>
    <item>
      <title>Synthetic Identities Are Redefining Trust in Biometric Systems</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Standards for identity verification must evolve to address how inputs are introduced, processed and validated before matching occurs.&nbsp;</span>
</p>]]>
      </description>
      <pubDate>Thu, 07 May 2026 01:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102291-synthetic-identities-are-redefining-trust-in-biometric-systems</link>
      <guid>http://www.securitymagazine.com/articles/102291</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/06/Rendered-human-made-from-blocks-by-Pawel-Czerwinski.webp?t=1778076735" type="image/png" length="201182"/>
    </item>
    <item>
      <title>Security Experts Discuss Proposed Government Patching Deadlines</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">U.S. cyber officials are considering shortening the deadline for fixing critical vulnerabilities in government IT, and security experts are sharing their thoughts.&nbsp;</span></p>]]>
      </description>
      <pubDate>Wed, 06 May 2026 12:09:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102292-security-experts-discuss-proposed-government-patching-deadlines</link>
      <guid>http://www.securitymagazine.com/articles/102292</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/06/Keyboard-by-ic-Ci.webp?t=1778080922" type="image/png" length="200840"/>
    </item>
    <item>
      <title>Cybersecurity Professionals Need to Think Like Business Leaders</title>
      <description>
        <![CDATA[<p>When CISOs, CIOs, and other cyber leaders approach the board, they often run into a familiar problem: the C-suite doesn’t speak their language.&nbsp;</p>]]>
      </description>
      <pubDate>Wed, 06 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102288-cybersecurity-professionals-need-to-think-like-business-leaders</link>
      <guid>http://www.securitymagazine.com/blogs/14/post/102288</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Conference-room-by-Nastuh-Abootalebi.webp?t=1777992516" type="image/png" length="448831"/>
    </item>
    <item>
      <title>5 Skills That Will Serve You in Your Security Career</title>
      <description>
        <![CDATA[<p>An experienced security consultant shares what she has learned as a corporate security executive and as the CEO of a consulting group.</p>]]>
      </description>
      <pubDate>Wed, 06 May 2026 07:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102254-5-skills-that-will-serve-you-in-your-security-career</link>
      <guid>http://www.securitymagazine.com/articles/102254</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-F3-Feat-Slide1-1170x658.webp?t=1778688553" type="image/jpeg" length="104457"/>
    </item>
    <item>
      <title>35,000 Users Targeted in Phishing Campaign in Just Two Days</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Between the dates of Apr. 14 and Apr. 16, a sophisticated phishing campaign was observed.&nbsp;</span></p>]]>
      </description>
      <pubDate>Tue, 05 May 2026 15:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102290-35-000-users-targeted-in-phishing-campaign-in-just-two-days</link>
      <guid>http://www.securitymagazine.com/articles/102290</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Email-app-by-Brian-J.-Tromp.webp?t=1778005568" type="image/png" length="320004"/>
    </item>
    <item>
      <title>Exclusive: What the Celebrity Stalkerware Breach Means for Executive Protection</title>
      <description>
        <![CDATA[<p><em>Security </em>magazine spoke with Cybersecurity Researcher Jeremiah Fowler about the risks of stalkerware in executive protection.&nbsp;</p>]]>
      </description>
      <pubDate>Tue, 05 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102289-exclusive-what-the-celebrity-stalkerware-breach-means-for-executive-protection</link>
      <guid>http://www.securitymagazine.com/articles/102289</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Blurry-face-by-Darius-Bashar.webp?t=1777996872" type="image/png" length="370987"/>
    </item>
    <item>
      <title>The Art of Security: It Is Time to Rethink the CISO’s Role</title>
      <description>
        <![CDATA[<p>The CISO’s role, and the cultural and strategic mindset that influences it, must change.</p>]]>
      </description>
      <pubDate>Tue, 05 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102286-the-art-of-security-it-is-time-to-rethink-the-cisos-role</link>
      <guid>http://www.securitymagazine.com/articles/102286</guid>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/04/Hand-holding-lightbulb-by-lilartsy.webp?t=1777907907" type="image/png" length="297154"/>
    </item>
  </channel>
</rss>
