<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Future Age Technologies</title>
	<atom:link href="https://futureagetechnologies.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://futureagetechnologies.com/</link>
	<description>Your IT partner for the Future</description>
	<lastBuildDate>Tue, 07 Jun 2022 18:03:19 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>

<image>
	<url>https://futureagetechnologies.com/wp-content/uploads/2021/04/favicon.ico</url>
	<title>Future Age Technologies</title>
	<link>https://futureagetechnologies.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Know your enemy! Learn how cybercrime adversaries get in…</title>
		<link>https://futureagetechnologies.com/know-your-enemy-learn-how-cybercrime-adversaries-get-in/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=know-your-enemy-learn-how-cybercrime-adversaries-get-in</link>
		
		<dc:creator><![CDATA[wcdadmin]]></dc:creator>
		<pubDate>Tue, 07 Jun 2022 18:03:19 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<guid isPermaLink="false">https://futureagetechnologies.com/?p=1435</guid>

					<description><![CDATA[<p>by Paul Ducklin Over on our sister site, Sophos News, we’ve just published some fascinating and informative insights into cybercriminals… …answering the truly practical question, “How do they do it?” In theory, the crooks can (and do) use any and all of thousands of different attack techniques, in any combination they like. In real life, however, good risk management says [&#8230;]</p>
<p>The post <a href="https://futureagetechnologies.com/know-your-enemy-learn-how-cybercrime-adversaries-get-in/">Know your enemy! Learn how cybercrime adversaries get in…</a> appeared first on <a href="https://futureagetechnologies.com">Future Age Technologies</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
