<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Blog &#8211; NSI | Managed IT Services Temecula | Murrieta</title>
	<atom:link href="https://www.nsi-ca.com/category/blog/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.nsi-ca.com/category/blog/</link>
	<description>When your business success depends on IT</description>
	<lastBuildDate>Fri, 25 Jul 2025 13:43:40 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>The Good, the Bad and the Ugly in Cybersecurity – Week 30</title>
		<link>https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-30-3/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Fri, 25 Jul 2025 13:43:40 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-30-3/</guid>

					<description><![CDATA[<p>The Good &#124; Authorities Dismantle XSS.is Cybercrime Forum &#38; Release Free Phobos/8Base Decryptor After a 12-year long run, XSS[.]is (formerly DaMaGeLaB) faced major disruptions this week with the arrest of its suspected administrator as part of a joint operation led by French and Ukrainian authorities. The Russian-speaking cybercrime forum had been active since 2013 with [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-30-3/">The Good, the Bad and the Ugly in Cybersecurity – Week 30</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Defending Against ToolShell: SharePoint’s Latest Critical Vulnerability</title>
		<link>https://www.nsi-ca.com/network-security/defending-against-toolshell-sharepoints-latest-critical-vulnerability/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Wed, 23 Jul 2025 01:47:44 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/defending-against-toolshell-sharepoints-latest-critical-vulnerability/</guid>

					<description><![CDATA[<p>A new, critical zero-day vulnerability dubbed “ToolShell” (CVE-2025-53770) poses a significant threat to on-premises SharePoint Server deployments. This vulnerability enables unauthenticated remote code execution (RCE), posing a significant risk to organizations worldwide. SentinelOne has detected exploitation in the wild, elevating the active threat posed by this new attack and the importance of organizations taking mitigative [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/defending-against-toolshell-sharepoints-latest-critical-vulnerability/">Defending Against ToolShell: SharePoint’s Latest Critical Vulnerability</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>AI’s Double Edge: How AI Expands the Attack Surface &#038; Empowers Defenders</title>
		<link>https://www.nsi-ca.com/network-security/ais-double-edge-how-ai-expands-the-attack-surface-empowers-defenders/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 22 Jul 2025 19:42:24 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/ais-double-edge-how-ai-expands-the-attack-surface-empowers-defenders/</guid>

					<description><![CDATA[<p>Recently, SentinelOne published two reports highlighting each side of the cloud security challenge: The Cloud Security Survey Report presents insights from 400 cybersecurity managers and practitioners covering current cloud security operations, responsibilities, perceptions of technologies, and future investment plans. The Cloud Security Risk Report details five emerging risk themes for 2025 with in-depth examples of attacks [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/ais-double-edge-how-ai-expands-the-attack-surface-empowers-defenders/">AI’s Double Edge: How AI Expands the Attack Surface &amp; Empowers Defenders</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>SharePoint ToolShell &#124; Zero-Day Exploited in-the-Wild Targets Enterprise Servers</title>
		<link>https://www.nsi-ca.com/network-security/sharepoint-toolshell-zero-day-exploited-in-the-wild-targets-enterprise-servers/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Mon, 21 Jul 2025 23:41:32 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/sharepoint-toolshell-zero-day-exploited-in-the-wild-targets-enterprise-servers/</guid>

					<description><![CDATA[<p>On July 19th, Microsoft confirmed that a 0-day vulnerability impacting on-premises Microsoft SharePoint Servers, dubbed “ToolShell” (by researcher Khoa Dinh @_l0gg), was being actively exploited in the wild. This flaw has since been assigned the identifier CVE‑2025‑53770, along with an accompanying bypass tracked as CVE‑2025‑53771. These two new CVEs are being used alongside the previously [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/sharepoint-toolshell-zero-day-exploited-in-the-wild-targets-enterprise-servers/">SharePoint ToolShell | Zero-Day Exploited in-the-Wild Targets Enterprise Servers</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>The Good, the Bad and the Ugly in Cybersecurity – Week 29</title>
		<link>https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-29-3/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Fri, 18 Jul 2025 14:41:46 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-29-3/</guid>

					<description><![CDATA[<p>The Good &#124; Cybercriminals Face Disruptions Across Ransom, DDoS &#38; Extortion Campaigns Cameron John Wagenius, a 21-year-old former U.S. Army soldier, has pleaded guilty to attacking and extorting at least ten U.S. telecom and tech companies, including AT&#38;T and Verizon. Operating under aliases like “kiberphant0m” and “’cyb3rph4nt0m”, he used tools like SSH Brute and SIM-swapping [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-29-3/">The Good, the Bad and the Ugly in Cybersecurity – Week 29</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Primary Attack Vectors Persist</title>
		<link>https://www.nsi-ca.com/network-security/primary-attack-vectors-persist/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Thu, 17 Jul 2025 21:43:47 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/primary-attack-vectors-persist/</guid>

					<description><![CDATA[<p>The speed and innovation of our cloud and AI age is undeniable. However, opportunity comes paired with responsibility and risk. The duality of the cloud security challenge is that these two opposing forces are markedly different. To keep cloud environments safe and secure, we need to introspectively examine how we can improve our internal people, [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/primary-attack-vectors-persist/">Primary Attack Vectors Persist</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Endpoint Protection Redefined: Insights from the 2025 Gartner® Magic Quadrant™ for EPP, and How Agentic AI and Platformization Are Shaping the Market</title>
		<link>https://www.nsi-ca.com/network-security/endpoint-protection-redefined-insights-from-the-2025-gartner-magic-quadrant-for-epp-and-how-agentic-ai-and-platformization-are-shaping-the-market/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Thu, 17 Jul 2025 16:40:07 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/endpoint-protection-redefined-insights-from-the-2025-gartner-magic-quadrant-for-epp-and-how-agentic-ai-and-platformization-are-shaping-the-market/</guid>

					<description><![CDATA[<p>Cyber threats and attacks like ransomware continue to increase in volume and complexity with the endpoint typically being the most sought after and valued target. With the rapid expansion and adoption of AI, it is more critical than ever to ensure the endpoint is adequately secured by a platform capable of not just keeping pace, [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/endpoint-protection-redefined-insights-from-the-2025-gartner-magic-quadrant-for-epp-and-how-agentic-ai-and-platformization-are-shaping-the-market/">Endpoint Protection Redefined: Insights from the 2025 Gartner® Magic Quadrant™ for EPP, and How Agentic AI and Platformization Are Shaping the Market</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Katz Stealer &#124; Powerful MaaS On the Prowl for Credentials and Crypto Assets</title>
		<link>https://www.nsi-ca.com/network-security/katz-stealer-powerful-maas-on-the-prowl-for-credentials-and-crypto-assets/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Thu, 17 Jul 2025 13:43:45 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/katz-stealer-powerful-maas-on-the-prowl-for-credentials-and-crypto-assets/</guid>

					<description><![CDATA[<p>Katz Stealer is a feature-rich infostealer marketed and operated as Malware-as-a-Service (MaaS). It was launched in early 2025 and quickly garnered attention within the infostealer landscape. The stealer includes robust credential and data discovery with theft capabilities as well as modern evasion and anti-analysis features. It is used to exfiltrate a broad range of personal [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/katz-stealer-powerful-maas-on-the-prowl-for-credentials-and-crypto-assets/">Katz Stealer | Powerful MaaS On the Prowl for Credentials and Crypto Assets</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>The Good, the Bad and the Ugly in Cybersecurity – Week 26</title>
		<link>https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-26-2/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Fri, 27 Jun 2025 17:52:47 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-26-2/</guid>

					<description><![CDATA[<p>The Good &#124; DoJ Charges “IntelBroker” Cyberattacker Responsible for $25M in Data Theft A British national linked to a series of globally-reaching, high-impact data breaches has been formally charged by U.S. authorities. Kai West, 25, is accused of operating under the alias “IntelBroker” and orchestrating cyberattacks that led to an estimated $25 million in damages [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-26-2/">The Good, the Bad and the Ugly in Cybersecurity – Week 26</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Inside the SentinelOne + AWS Partnership: Smarter Cloud Security at re:Inforce 2025</title>
		<link>https://www.nsi-ca.com/network-security/inside-the-sentinelone-aws-partnership-smarter-cloud-security-at-reinforce-2025/</link>
		
		<dc:creator><![CDATA[]]></dc:creator>
		<pubDate>Tue, 17 Jun 2025 17:47:54 +0000</pubDate>
				<category><![CDATA[Blog]]></category>
		<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/inside-the-sentinelone-aws-partnership-smarter-cloud-security-at-reinforce-2025/</guid>

					<description><![CDATA[<p>AWS re:Inforce is the place where cloud security leaders come together to learn, connect, and innovate with SentinelOne being a proud sponsor of this year’s event. A special event particularly for cloud innovators, we’re excited to join AWS, our partners, and customers to explore how we can secure the future of cloud, together. SentinelOne believes [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/inside-the-sentinelone-aws-partnership-smarter-cloud-security-at-reinforce-2025/">Inside the SentinelOne + AWS Partnership: Smarter Cloud Security at re:Inforce 2025</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
