<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>NSI | Managed IT Services Temecula | Murrieta</title>
	<atom:link href="https://www.nsi-ca.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.nsi-ca.com/</link>
	<description>When your business success depends on IT</description>
	<lastBuildDate>Fri, 24 Apr 2026 16:48:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>The Good, the Bad and the Ugly in Cybersecurity – Week 17</title>
		<link>https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-17/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Fri, 24 Apr 2026 16:48:49 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-17/</guid>

					<description><![CDATA[<p>The Good &#124; Two Cybercrime Leaders Face Justice for Fraud, Identity Theft &#38; Extortion Tyler Robert Buchanan, a 24-year-old British national believed to be a leader of the UNC3944 cybercrime group, has pleaded guilty in the U.S. to wire fraud and aggravated identity theft. Prosecutors say Buchanan and four accomplices stole at least $8 million [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-17/">The Good, the Bad and the Ugly in Cybersecurity – Week 17</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Hypersonic Supply Chain Attacks: One Solution That Didn’t Need to Know the Payload</title>
		<link>https://www.nsi-ca.com/network-security/hypersonic-supply-chain-attacks-one-solution-that-didnt-need-to-know-the-payload/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Wed, 22 Apr 2026 17:43:57 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/hypersonic-supply-chain-attacks-one-solution-that-didnt-need-to-know-the-payload/</guid>

					<description><![CDATA[<p>In 2026, the question for security leaders is not whether a supply chain attack is coming. Every serious organization should assume it is. The question is whether their defense architecture can stop a payload it has never seen before. It’s a question that takes on even more critical implications at a time where trusted agentic [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/hypersonic-supply-chain-attacks-one-solution-that-didnt-need-to-know-the-payload/">Hypersonic Supply Chain Attacks: One Solution That Didn’t Need to Know the Payload</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Automation at Machine Speed: Rethinking Execution in Modern Cybersecurity</title>
		<link>https://www.nsi-ca.com/network-security/automation-at-machine-speed-rethinking-execution-in-modern-cybersecurity/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 19:43:17 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/automation-at-machine-speed-rethinking-execution-in-modern-cybersecurity/</guid>

					<description><![CDATA[<p>In our previous posts, we explored the Identity Paradox and the rising risks at the enterprise edge. Together, these blogs highlighted how attackers gain initial access and leverage unmanaged devices to escalate privileges. The next phase of intrusion – execution – demonstrates how modern adversaries, aided by automation and AI, operate at speeds and a [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/automation-at-machine-speed-rethinking-execution-in-modern-cybersecurity/">Automation at Machine Speed: Rethinking Execution in Modern Cybersecurity</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>The Good, the Bad and the Ugly in Cybersecurity – Week 16</title>
		<link>https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-16/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 14:40:18 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-16/</guid>

					<description><![CDATA[<p>The Good &#124; U.S. Authorities Seize W3LL Phishing Ring &#38; Jail DPRK IT Worker Scheme Facilitators The FBI has dismantled the “W3LL” phishing platform, seized its infrastructure, and arrested its alleged developer in its first joint crackdown on a phishing kit developer together with Indonesian authorities. Sold for $500 per kit, W3LL-enabled criminals to clone [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-16/">The Good, the Bad and the Ugly in Cybersecurity – Week 16</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Frontier AI Reinforces the Future of Modern Cyber Defense</title>
		<link>https://www.nsi-ca.com/network-security/frontier-ai-reinforces-the-future-of-modern-cyber-defense/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Thu, 16 Apr 2026 20:40:55 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/frontier-ai-reinforces-the-future-of-modern-cyber-defense/</guid>

					<description><![CDATA[<p>The latest announcements from OpenAI and Anthropic mark another important step forward for frontier AI. They also reinforce something we’ve believed at SentinelOne for years: the future of cybersecurity will be shaped by AI-native defense. SentinelOne has worked closely with frontier labs for years, including OpenAI, Anthropic, and Google DeepMind, and naturally continues to do [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/frontier-ai-reinforces-the-future-of-modern-cyber-defense/">Frontier AI Reinforces the Future of Modern Cyber Defense</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Securing the Software Supply Chain: How SentinelOne’s AI EDR Autonomously Blocked the CPU-Z Watering Hole Cyber Attack</title>
		<link>https://www.nsi-ca.com/network-security/securing-the-software-supply-chain-how-sentinelones-ai-edr-autonomously-blocked-the-cpu-z-watering-hole-cyber-attack/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 23:45:03 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/securing-the-software-supply-chain-how-sentinelones-ai-edr-autonomously-blocked-the-cpu-z-watering-hole-cyber-attack/</guid>

					<description><![CDATA[<p>On April 9, 2026, cpuid.com was actively serving malware through its own official download button. Threat actors had compromised the CPUID domain at the API level and were silently redirecting legitimate download requests to attacker-controlled infrastructure. The attack ran for approximately 19 hours. Users who navigated directly to the official site received a legitimate, properly [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/securing-the-software-supply-chain-how-sentinelones-ai-edr-autonomously-blocked-the-cpu-z-watering-hole-cyber-attack/">Securing the Software Supply Chain: How SentinelOne’s AI EDR Autonomously Blocked the CPU-Z Watering Hole Cyber Attack</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>The Good, the Bad and the Ugly in Cybersecurity – Week 15</title>
		<link>https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-15/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 14:44:14 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-15/</guid>

					<description><![CDATA[<p>The Good &#124; DoJ Disrupts TP-Link Router Network Run by Russian Spy Org This week, authorities in the U.S. carried out Operation Masquerade, a court-authorized operation to disrupt a DNS hijacking network run by Russia’s GRU Unit 26165 (APT28). The network involved the compromise of thousands of TP-Link small home and small office routers, spread [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-15/">The Good, the Bad and the Ugly in Cybersecurity – Week 15</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Edge Decay: How a Failing Perimeter Is Fueling Modern Intrusions</title>
		<link>https://www.nsi-ca.com/network-security/edge-decay-how-a-failing-perimeter-is-fueling-modern-intrusions/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Thu, 09 Apr 2026 13:42:25 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/edge-decay-how-a-failing-perimeter-is-fueling-modern-intrusions/</guid>

					<description><![CDATA[<p>In the first blog of this series, we explored the Identity Paradox and how attackers exploit valid credentials to operate undetected inside enterprise environments. However, identity compromise rarely happens in isolation. To understand how these attacks begin, we need to look earlier in the intrusion lifecycle at the place many organizations still assume is secure: [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/edge-decay-how-a-failing-perimeter-is-fueling-modern-intrusions/">Edge Decay: How a Failing Perimeter Is Fueling Modern Intrusions</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>The Good, the Bad and the Ugly in Cybersecurity – Week 14</title>
		<link>https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-14-2/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Fri, 03 Apr 2026 13:40:19 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-14-2/</guid>

					<description><![CDATA[<p>The Good &#124; SentinelOne AI EDR Stops LiteLLM Supply Chain Attack in Real Time This week, SentinelOne demonstrated how autonomous, AI-driven endpoint protection can detect and stop sophisticated supply chain attacks in real time, without human intervention. On the same day the attack was launched, Singularity Platform identified and blocked a trojanized version of LiteLLM, [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-14-2/">The Good, the Bad and the Ugly in Cybersecurity – Week 14</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Securing the Supply Chain: How SentinelOne®’s AI EDR Stops the Axios Attack Autonomously</title>
		<link>https://www.nsi-ca.com/network-security/securing-the-supply-chain-how-sentinelones-ai-edr-stops-the-axios-attack-autonomously/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 21:41:25 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/securing-the-supply-chain-how-sentinelones-ai-edr-stops-the-axios-attack-autonomously/</guid>

					<description><![CDATA[<p>A guide to the suspected North Korean cyber attack—and how SentinelOne defends against it at machine speed On March 31, 2026, a North Korean state actor hijacked the npm credentials of the primary Axios maintainer and published two backdoored releases that deployed a cross-platform remote access trojan (RAT) to Windows, macOS, and Linux systems. Axios [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/securing-the-supply-chain-how-sentinelones-ai-edr-stops-the-axios-attack-autonomously/">Securing the Supply Chain: How SentinelOne®’s AI EDR Stops the Axios Attack Autonomously</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
