<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Rescana]]></title><description><![CDATA[Rescana]]></description><link>https://www.rescana.com/blog</link><generator>RSS for Node</generator><lastBuildDate>Fri, 17 Apr 2026 14:27:52 GMT</lastBuildDate><atom:link href="https://www.rescananotifications.com/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[JanaWare Ransomware: Six-Year Campaign Targeting Turkish Home Users and SMBs with Advanced Geo-Fencing and Evasion Techniques]]></title><description><![CDATA[Executive Summary A sophisticated and persistent ransomware campaign has been targeting Turkish home users and small-to-medium businesses (SMBs) for at least six years, leveraging a strain identified as JanaWare . This campaign is distinguished by its exclusive focus on Turkish victims, achieved through rigorous geofencing and language checks, and by its use of advanced evasion techniques. The attackers employ low ransom demands, typically ranging from $200 to $400 USD, and utilize...]]></description><link>https://www.rescana.com/post/janaware-ransomware-six-year-campaign-targeting-turkish-home-users-and-smbs-with-advanced-geo-fenci</link><guid isPermaLink="false">69e086a0934ce577917182dd</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Thu, 16 Apr 2026 07:21:21 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_bba60dc4f7d14cce940fcb10a78ce17a~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[Surge in Malware and Phishing Attacks via n8n Webhooks: Analysis of Cloud Workflow Automation Abuse (2025-2026)]]></title><description><![CDATA[Executive Summary Since October 2025, cybercriminals have been actively exploiting the webhook functionality of the n8n  workflow automation platform to deliver malware and conduct advanced phishing campaigns. By leveraging the trusted cloud infrastructure of n8n , attackers have been able to bypass traditional email security controls, automate malicious payload delivery, and perform device fingerprinting on victims. This abuse has resulted in a dramatic increase in phishing incidents, with a...]]></description><link>https://www.rescana.com/post/surge-in-malware-and-phishing-attacks-via-n8n-webhooks-analysis-of-cloud-workflow-automation-abuse</link><guid isPermaLink="false">69e086c1c0d279b375a89a3c</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Thu, 16 Apr 2026 07:21:03 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_5e39d0e8c4cb4d118c06e104db2c6bc1~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[Critical CVE-2024-3273 Authentication Bypass in Nginx UI Actively Exploited – Immediate Patch Required]]></title><description><![CDATA[Executive Summary A critical authentication bypass vulnerability, tracked as CVE-2024-3273 , has been discovered in the Nginx UI  web management interface. This flaw is now being actively exploited in the wild, enabling unauthenticated remote attackers to gain administrative access to Nginx UI  instances. The vulnerability arises from an unprotected endpoint that allows attackers to execute privileged actions without authentication, leading to full server compromise, configuration...]]></description><link>https://www.rescana.com/post/critical-cve-2024-3273-authentication-bypass-in-nginx-ui-actively-exploited-immediate-patch-requir</link><guid isPermaLink="false">69e086c2c0d279b375a89a45</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Thu, 16 Apr 2026 07:20:43 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_356c4129e37b4923af059de2a7882221~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[Over 100 Malicious Chrome Extensions in Chrome Web Store Steal Google and Telegram Data, Create Persistent Backdoors]]></title><description><![CDATA[Executive Summary Between April 2026 and the time of this report, a coordinated campaign involving over 100 malicious Chrome extensions  has been identified in the official Chrome Web Store . These extensions, published under five distinct developer identities, have collectively amassed approximately 20,000 installations. The extensions target a broad user base by masquerading as legitimate tools, including gaming applications, social media utilities, and translation services. However, they...]]></description><link>https://www.rescana.com/post/over-100-malicious-chrome-extensions-in-chrome-web-store-steal-google-and-telegram-data-create-pers</link><guid isPermaLink="false">69e086c7c0d279b375a89a50</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Thu, 16 Apr 2026 07:20:27 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_22f6832d34884b64b6d47da6a9c6d1d4~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[Critical Supply Chain Attack on EssentialPlugin WordPress Suite Exposes Over 400,000 Websites to Malware]]></title><description><![CDATA[Executive Summary A critical supply chain compromise has impacted the EssentialPlugin  suite of WordPress plugins, resulting in the deployment of malware to thousands of websites. Following the acquisition of EssentialPlugin  in August/September 2025, a malicious actor introduced a dormant backdoor into over 30 plugins, which remained inactive until April 2026. Upon activation, the backdoor enabled arbitrary file writes and malware injection, leading to the creation of spam pages, redirects,...]]></description><link>https://www.rescana.com/post/critical-supply-chain-attack-on-essentialplugin-wordpress-suite-exposes-over-400-000-websites-to-mal</link><guid isPermaLink="false">69e086cfc0d279b375a89a64</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Thu, 16 Apr 2026 07:20:02 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_a36ff70d4be3431092823ffbe3e6d358~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[Critical nginx-ui Vulnerability CVE-2026-33032: Actively Exploited Authentication Bypass Allowing Full Nginx Server Takeover]]></title><description><![CDATA[Executive Summary CVE-2026-33032  is a critical, actively exploited authentication bypass vulnerability in the nginx-ui  web interface for Nginx . This flaw enables unauthenticated remote attackers to gain full control over the underlying Nginx  server, including the ability to modify configuration files, restart services, and intercept or disrupt traffic. Public proof-of-concept code is available, and thousands of vulnerable instances have been identified in the wild. The vulnerability stems...]]></description><link>https://www.rescana.com/post/critical-nginx-ui-vulnerability-cve-2026-33032-actively-exploited-authentication-bypass-allowing-fu</link><guid isPermaLink="false">69e086d7832a840dd4709e5d</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Thu, 16 Apr 2026 07:19:40 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_933950c6ebbe40e2a083f86423bc3c27~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[AgingFly Malware: UAC-0247 Cyberattacks Target Ukrainian Government and Hospitals with Digitally Signed Malware]]></title><description><![CDATA[Executive Summary A new and highly sophisticated malware strain, AgingFly , has been identified as the primary tool in a wave of cyberattacks targeting Ukrainian government agencies and hospitals. These attacks, attributed to the threat cluster UAC-0247 , leverage advanced social engineering, multi-stage payload delivery, and custom malware to achieve persistent access, data exfiltration, and operational disruption. The campaign, active since at least March 2026, demonstrates a high degree of...]]></description><link>https://www.rescana.com/post/agingfly-malware-uac-0247-cyberattacks-target-ukrainian-government-and-hospitals-with-digitally-sig</link><guid isPermaLink="false">69e086de832a840dd4709e73</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Thu, 16 Apr 2026 07:18:36 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_50c46492af67497c93cbda89b85a01c8~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[Dragon Boss Solutions Signed Software Abused to Disable Antivirus Protection in Global Malware Campaign]]></title><description><![CDATA[Executive Summary A sophisticated and widespread cyber campaign has been identified in which digitally signed software, distributed by Dragon Boss Solutions LLC , is being abused to deploy scripts that systematically disable antivirus (AV) protections on thousands of endpoints worldwide. This campaign leverages the trust inherent in code-signing certificates and the capabilities of commercial installer frameworks to escalate privileges, evade detection, and persistently remove security...]]></description><link>https://www.rescana.com/post/dragon-boss-solutions-signed-software-abused-to-disable-antivirus-protection-in-global-malware-campa</link><guid isPermaLink="false">69e086edb088eb30d61287b6</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Thu, 16 Apr 2026 07:18:14 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_5281075df8e44695b220179a5dd41f1b~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[April 2026 Patch Tuesday: Critical Vulnerabilities in SAP, Adobe, Microsoft SharePoint, Fortinet, and ColdFusion Threaten Enterprise Security]]></title><description><![CDATA[Executive Summary April 2026’s Patch Tuesday has introduced a critical wave of security updates from leading vendors including SAP , Adobe , Microsoft , and Fortinet . This month’s coordinated patch release addresses multiple high-severity vulnerabilities, several of which are already being actively exploited in the wild. The vulnerabilities span a range of attack vectors, including SQL injection, remote code execution, authentication bypass, and sensitive data exposure. Organizations...]]></description><link>https://www.rescana.com/post/april-2026-patch-tuesday-critical-vulnerabilities-in-sap-adobe-microsoft-sharepoint-fortinet-an</link><guid isPermaLink="false">69e08709b088eb30d612883e</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Thu, 16 Apr 2026 07:17:51 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_cdd1795347c4470d812a5aaeb4f19b60~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[OpenAI GPT-5.4-Cyber: Advanced AI for Security Teams – Features, Risks, and Third-Party Risk Management]]></title><description><![CDATA[Executive Summary Publication Date: April 14, 2026 OpenAI  has unveiled GPT-5.4-Cyber , a specialized variant of its GPT-5.4  large language model, designed exclusively for vetted security professionals and organizations. This release, part of the Trusted Access for Cyber  program, marks a significant evolution in the application of artificial intelligence to defensive cybersecurity. By lowering refusal boundaries and introducing advanced capabilities such as binary reverse engineering,...]]></description><link>https://www.rescana.com/post/openai-gpt-5-4-cyber-advanced-ai-for-security-teams-features-risks-and-third-party-risk-managem</link><guid isPermaLink="false">69df37251847596b2f534a2e</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Wed, 15 Apr 2026 07:12:00 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_2fc95c20531a47f397685659bf0d51da~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[Microsoft’s $10B Japan AI Initiative: Enhancing Azure Cloud Infrastructure, Cybersecurity, and Local Talent Development (2026–2029)]]></title><description><![CDATA[Executive Summary Publication Date: April 2026 Microsoft  has announced a $10 billion investment in Japan, spanning from 2026 to 2029, with the goal of accelerating the nation’s artificial intelligence ( AI ) infrastructure, strengthening cybersecurity, and developing local talent. This initiative, structured around the pillars of Technology, Trust, and Talent, is designed to support both public and private sector digital transformation. The following report provides a comprehensive analysis...]]></description><link>https://www.rescana.com/post/microsoft-s-10b-japan-ai-initiative-enhancing-azure-cloud-infrastructure-cybersecurity-and-local</link><guid isPermaLink="false">69df3725c0d279b375a506c6</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Wed, 15 Apr 2026 07:11:26 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_9f9c7aa1355243ee94a3d78c5d42bb41~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[Google Integrates Rust-Based DNS Parser into Pixel 10 Modem Firmware to Strengthen Mobile Security]]></title><description><![CDATA[Executive Summary Publication Date: April 2026 Google  has taken a pioneering step in mobile device security by integrating a Rust-based DNS parser into the modem firmware of the Pixel 10  series. This move addresses longstanding vulnerabilities in cellular baseband software, which has historically been a target for sophisticated attackers. By leveraging the memory safety guarantees of Rust , Google  aims to significantly reduce the risk of remote code execution and buffer overflow attacks...]]></description><link>https://www.rescana.com/post/google-integrates-rust-based-dns-parser-into-pixel-10-modem-firmware-to-strengthen-mobile-security</link><guid isPermaLink="false">69df374547c3def1ffeeb0a8</guid><category><![CDATA[Active Exploitation Alert]]></category><pubDate>Wed, 15 Apr 2026 07:11:04 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_3284fd05fe454fdca84843886c7ce485~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[Microsoft Patch Tuesday April 2026: Critical Vulnerabilities, RDP and Secure Boot Zero-Days Impacting Windows Systems]]></title><description><![CDATA[Executive Summary The April 2026 edition of Patch Tuesday  represents a watershed moment in enterprise cybersecurity, with Microsoft  addressing a record-breaking 167 vulnerabilities across its ecosystem. This release is distinguished by the presence of 11 Critical-rated vulnerabilities  and 2 actively exploited zero-days , both of which have been publicly disclosed and are under active investigation by the global security community. The urgency of this cycle is further amplified by the...]]></description><link>https://www.rescana.com/post/microsoft-patch-tuesday-april-2026-critical-vulnerabilities-rdp-and-secure-boot-zero-days-impactin</link><guid isPermaLink="false">69df37781847596b2f534b28</guid><category><![CDATA[Active Exploitation Alert]]></category><pubDate>Wed, 15 Apr 2026 07:10:43 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_9dd17fe68f1b44769eccb2a1bb05c9e8~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[McGraw-Hill Salesforce Data Breach 2026: Analysis of ShinyHunters Extortion and Cloud Misconfiguration Risks]]></title><description><![CDATA[Executive Summary On April 14, 2026, McGraw-Hill  publicly confirmed a data breach following an extortion threat from the ShinyHunters group. The breach was traced to a misconfiguration in the company’s Salesforce  environment, which allowed unauthorized access to internal data hosted on Salesforce web resources. According to McGraw-Hill , the breach did not impact its Salesforce accounts, customer databases, or internal systems, and the exposed data was described as limited and...]]></description><link>https://www.rescana.com/post/mcgraw-hill-salesforce-data-breach-2026-analysis-of-shinyhunters-extortion-and-cloud-misconfigurati</link><guid isPermaLink="false">69df378147c3def1ffeeb173</guid><category><![CDATA[Active Exploitation Alert]]></category><pubDate>Wed, 15 Apr 2026 07:10:21 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_e6df3bcafe3d4688af2c20062a4782d2~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[CPUID Supply Chain Attack: STX RAT Malware Distributed via Trojanized CPU-Z and HWMonitor Downloads]]></title><description><![CDATA[Executive Summary Between April 9 and April 10, 2026, the official website of CPUID , the developer of widely used system utilities HWMonitor  and CPU-Z , was compromised through a supply chain attack. Attackers gained access to a secondary API, allowing them to alter download links on the official site for approximately six hours. During this window, users attempting to download HWMonitor , CPU-Z , and related tools were redirected to attacker-controlled Cloudflare R2 storage, where they...]]></description><link>https://www.rescana.com/post/cpuid-supply-chain-attack-stx-rat-malware-distributed-via-trojanized-cpu-z-and-hwmonitor-downloads</link><guid isPermaLink="false">69dca5e775afb0779a76c8c3</guid><category><![CDATA[Active Exploitation Alert]]></category><pubDate>Mon, 13 Apr 2026 08:43:31 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_04841e0f9bbc4b6e96424da8c7c74c02~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[Adobe Acrobat and Reader CVE-2026-34621: Critical Prototype Pollution Vulnerability Actively Exploited, Urgent Patch Released]]></title><description><![CDATA[Executive Summary Adobe  has released urgent security patches to address a critical vulnerability, CVE-2026-34621 , affecting Adobe Acrobat  and Adobe Acrobat Reader  on both Windows and macOS platforms. This flaw, classified as a prototype pollution vulnerability in the embedded JavaScript engine, enables attackers to execute arbitrary code when a user opens a specially crafted PDF file. The vulnerability has been actively exploited in the wild since late 2025, with threat actors leveraging...]]></description><link>https://www.rescana.com/post/adobe-acrobat-and-reader-cve-2026-34621-critical-prototype-pollution-vulnerability-actively-exploit</link><guid isPermaLink="false">69dca54908699375c7afc4c5</guid><category><![CDATA[Active Exploitation Alert]]></category><pubDate>Mon, 13 Apr 2026 08:13:26 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_59d0db8ad15c40359438bf433b62e2e9~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[Hims &#38; Hers Zendesk Data Breach 2026: Okta SSO Compromise Exposes Sensitive Customer Support Information]]></title><description><![CDATA[Executive Summary Between February 4 and February 7, 2026, Hims &#38; Hers  experienced a data breach that exposed sensitive customer support data, including full names, email addresses, phone numbers, physical mailing addresses, order-related information, and general correspondence contained within support tickets. The breach was discovered on February 5, 2026, and was executed via a social engineering attack that compromised an employee’s Okta  Single Sign-On (SSO) credentials, granting...]]></description><link>https://www.rescana.com/post/hims-hers-zendesk-data-breach-2026-okta-sso-compromise-exposes-sensitive-customer-support-informa</link><guid isPermaLink="false">69da232175afb0779a71898e</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Sun, 12 Apr 2026 07:23:24 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_6431d23eed5e4b2c8a75f0af54016cb7~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[Rockwell Automation/Allen-Bradley PLCs: Nearly 4,000 US Industrial Devices Exposed to Iranian Cyberattacks in 2026]]></title><description><![CDATA[Executive Summary Nearly 4,000 industrial control devices in the United States, primarily Rockwell Automation/Allen-Bradley programmable logic controllers (PLCs) , have been exposed to and targeted by Iranian state-backed cyberattacks since March 2026. These attacks have resulted in operational disruptions, forced manual operation at affected sites, and financial losses. The threat actors, attributed to Iranian advanced persistent threat (APT) groups affiliated with the Islamic Revolutionary...]]></description><link>https://www.rescana.com/post/rockwell-automation-allen-bradley-plcs-nearly-4-000-us-industrial-devices-exposed-to-iranian-cybera</link><guid isPermaLink="false">69da233bf955c1c96625b5e9</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Sun, 12 Apr 2026 07:22:59 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_6bbc9ec15f4b4a0d9e4aa7fb840c9238~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[Critical Orthanc DICOM Server Vulnerabilities Expose Healthcare Systems to Crashes and Remote Code Execution (RCE)]]></title><description><![CDATA[Executive Summary Critical vulnerabilities have been identified in Orthanc , the widely adopted open-source DICOM server used for medical imaging workflows across healthcare and research environments. These vulnerabilities, present in all versions up to and including 1.12.10 , enable attackers to crash servers, exhaust system memory, leak sensitive information, and in certain scenarios, achieve remote code execution (RCE). The root causes include unsafe arithmetic operations, missing bounds...]]></description><link>https://www.rescana.com/post/critical-orthanc-dicom-server-vulnerabilities-expose-healthcare-systems-to-crashes-and-remote-code-e</link><guid isPermaLink="false">69da234b8614fb4128adb377</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Sun, 12 Apr 2026 07:22:26 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_b78895987c94495b848b07749f0cc4c9~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item><item><title><![CDATA[CPUID Website Compromised: Malware Delivered via CPU-Z and HWMonitor Download Links in April 2026]]></title><description><![CDATA[Executive Summary Between April 9 and April 10, 2026, the official website of CPUID , the vendor behind the widely used CPU-Z  and HWMonitor  utilities, was compromised for approximately six hours. Attackers gained access to a secondary backend API, altering download links on the site to serve a trojanized installer instead of legitimate binaries. The malicious file, masquerading as a legitimate hardware monitoring tool, was designed to steal browser credentials and potentially other...]]></description><link>https://www.rescana.com/post/cpuid-website-compromised-malware-delivered-via-cpu-z-and-hwmonitor-download-links-in-april-2026</link><guid isPermaLink="false">69da234cf955c1c96625b60d</guid><category><![CDATA[Cybersecurity Incident Analysis]]></category><pubDate>Sun, 12 Apr 2026 07:22:04 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/eee5a8_43ee29c76e9e4ff18aa0dfb61b64384b~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Rescana</dc:creator></item></channel></rss>