<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>NSI | Managed IT Services Temecula | Murrieta</title>
	<atom:link href="https://www.nsi-ca.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.nsi-ca.com/</link>
	<description>When your business success depends on IT</description>
	<lastBuildDate>Fri, 13 Mar 2026 13:40:34 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>The Good, the Bad and the Ugly in Cybersecurity – Week 11</title>
		<link>https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-11/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Fri, 13 Mar 2026 13:40:34 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-11/</guid>

					<description><![CDATA[<p>The Good &#124; Authorities Disrupt Proxy Network and Charge BlackCat Insider, Vendors Patch Critical RCE Bugs U.S. and European law enforcement have dismantled the SocksEscort cybercrime proxy network, which relied on Linux edge devices infected with AVRecon malware. New research found that the service maintained roughly 20,000 compromised devices weekly and offered criminals access to [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-11/">The Good, the Bad and the Ugly in Cybersecurity – Week 11</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>FortiGate Edge Intrusions &#124; Stolen Service Accounts Lead to Rogue Workstations and Deep AD Compromise</title>
		<link>https://www.nsi-ca.com/network-security/fortigate-edge-intrusions-stolen-service-accounts-lead-to-rogue-workstations-and-deep-ad-compromise/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Tue, 10 Mar 2026 14:40:29 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/fortigate-edge-intrusions-stolen-service-accounts-lead-to-rogue-workstations-and-deep-ad-compromise/</guid>

					<description><![CDATA[<p>Overview Throughout early 2026, SentinelOne’s® Digital Forensics &#38; Incident Response (DFIR) team has responded to several incidents where FortiGate Next-Generation Firewall (NGFW) appliances have been compromised to establish a foothold into the targeted environment. Each incident was detected and stopped during the lateral movement phase of the attack. Fortinet has disclosed and issued patches for [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/fortigate-edge-intrusions-stolen-service-accounts-lead-to-rogue-workstations-and-deep-ad-compromise/">FortiGate Edge Intrusions | Stolen Service Accounts Lead to Rogue Workstations and Deep AD Compromise</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>The Good, the Bad and the Ugly in Cybersecurity – Week 10</title>
		<link>https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-10/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Fri, 06 Mar 2026 15:41:47 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-10/</guid>

					<description><![CDATA[<p>The Good &#124; Global Authorities Disrupt Tycoon2FA, LeakBase &#38; Phobos Ransomware Europol has successfully disrupted Tycoon2FA in an international operation, taking down the phishing-as-a-service (PhaaS) platform responsible for sending tens of millions of phishing emails each month. Authorities seized 330 domains used to host phishing pages and control infrastructure. Active since 2023, Tycoon2FA enabled attackers [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-10/">The Good, the Bad and the Ugly in Cybersecurity – Week 10</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook</title>
		<link>https://www.nsi-ca.com/network-security/sentinelone-intelligence-brief-iranian-cyber-activity-outlook/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Sat, 28 Feb 2026 20:40:58 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/sentinelone-intelligence-brief-iranian-cyber-activity-outlook/</guid>

					<description><![CDATA[<p>To Our Partners and Customers The following intelligence brief was sent to all SentinelOne partners and customers today: Executive Summary Recent U.S. and Israeli strikes against Iranian targets, followed by Iranian attacks on multiple regional locations, present a highly dynamic geopolitical situation with credible cyber threat implications. Iran has historically incorporated cyber operations into periods [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/sentinelone-intelligence-brief-iranian-cyber-activity-outlook/">SentinelOne Intelligence Brief: Iranian Cyber Activity Outlook</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>The Good, the Bad and the Ugly in Cybersecurity – Week 9</title>
		<link>https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-9/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Fri, 27 Feb 2026 14:42:07 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-9/</guid>

					<description><![CDATA[<p>The Good &#124; Authorities Arrest Hacktivist &#38; Convict L3Harris Insider for Selling Secrets to Russia Spanish authorities have arrested four suspected members of “Anonymous Fénix”, a hacktivist group accused of launching distributed denial-of-service (DDoS) attacks against government ministries, political parties, and public institutions in Spain and parts of South America. According to the Spanish Civil [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-9/">The Good, the Bad and the Ugly in Cybersecurity – Week 9</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>From Access to Execution: Securing Identity in the Age of Autonomous Agents</title>
		<link>https://www.nsi-ca.com/network-security/from-access-to-execution-securing-identity-in-the-age-of-autonomous-agents/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Wed, 25 Feb 2026 14:49:51 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/from-access-to-execution-securing-identity-in-the-age-of-autonomous-agents/</guid>

					<description><![CDATA[<p>The definition of identity is expanding. Employees are no longer the only actors – or ‘workers’ – inside enterprise environments. Service accounts, APIs, workload identities, and increasingly autonomous AI agents are now executing actions on behalf of humans and systems at machine speed and scale. This is the next generation of identity and its risks. [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/from-access-to-execution-securing-identity-in-the-age-of-autonomous-agents/">From Access to Execution: Securing Identity in the Age of Autonomous Agents</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>The Good, the Bad and the Ugly in Cybersecurity – Week 8</title>
		<link>https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-8/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Fri, 20 Feb 2026 18:40:21 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-8/</guid>

					<description><![CDATA[<p>The Good &#124; Law Enforcement Arrest Extortionist, Phobos Affiliate &#38; Financial Scammers A Dutch man was arrested this week after he allegedly downloaded confidential documents mistakenly shared with him and tried to extort authorities by refusing to delete them without compensation. The man kept the files, prompting a hacking investigation and a search of his [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-8/">The Good, the Bad and the Ugly in Cybersecurity – Week 8</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>OneClaw: Discovery and Observability for the Agentic Era</title>
		<link>https://www.nsi-ca.com/network-security/oneclaw-discovery-and-observability-for-the-agentic-era/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Wed, 18 Feb 2026 17:43:37 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/oneclaw-discovery-and-observability-for-the-agentic-era/</guid>

					<description><![CDATA[<p>Autonomous agents and personal AI assistants are moving from experimentation to enterprise reality. Tools like OpenClaw (formerly Moltbot and Clawdbot), Nanobot and Picoclaw are being embedded across development environments, cloud workflows, and operational pipelines. They install quickly, evolve dynamically, and often operate with deep system-level access. For CISOs and security leaders, this presents a new [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/oneclaw-discovery-and-observability-for-the-agentic-era/">OneClaw: Discovery and Observability for the Agentic Era</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users</title>
		<link>https://www.nsi-ca.com/network-security/shadow-agents-how-sentinelone-secures-the-ai-tools-that-act-like-users/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Tue, 17 Feb 2026 21:42:11 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/shadow-agents-how-sentinelone-secures-the-ai-tools-that-act-like-users/</guid>

					<description><![CDATA[<p>AI adoption is accelerating faster than security programs can adapt. Organizations are already experiencing breaches tied directly to unsanctioned AI usage, at significantly higher cost than traditional incidents, while the vast majority still lack meaningful governance controls to manage the risk. Traditional cybersecurity measures are necessary but insufficient. Securing AI requires purpose-built capabilities that span [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/shadow-agents-how-sentinelone-secures-the-ai-tools-that-act-like-users/">Shadow Agents: How SentinelOne Secures the AI Tools That Act Like Users</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
		<item>
		<title>The Good, the Bad and the Ugly in Cybersecurity – Week 7</title>
		<link>https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-7/</link>
		
		<dc:creator><![CDATA[nsi-Admin01]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 19:46:53 +0000</pubDate>
				<category><![CDATA[Network Security]]></category>
		<guid isPermaLink="false">https://www.nsi-ca.com/blog/the-good-the-bad-and-the-ugly-in-cybersecurity-week-7/</guid>

					<description><![CDATA[<p>The Good &#124; Authorities Crack Down on Identity, Romance Baiting &#38; Phishing Schemes Two individuals have been indicted for a years-long scheme that used stolen identities from 3,000 victims to siphon $3 million from sportsbooks. Amitoj Kapoor and Siddharth Lillaney allegedly bought personally identifying information (PII) on dark markets and Telegram, opened thousands of fake [&#8230;]</p>
<p>The post <a href="https://www.nsi-ca.com/network-security/the-good-the-bad-and-the-ugly-in-cybersecurity-week-7/">The Good, the Bad and the Ugly in Cybersecurity – Week 7</a> appeared first on <a href="https://www.nsi-ca.com">NSI | Managed IT Services Temecula | Murrieta</a>.</p>
]]></description>
		
		
		
			</item>
	</channel>
</rss>
