<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Blog</title>
    <link>https://fieldeffect.com/blog</link>
    <description>Looking for the latest info on cyber security? Keep up to date with industry research, news, and thought leadership on the Field Effect blog.</description>
    <language>en</language>
    <pubDate>Thu, 05 Mar 2026 20:54:15 GMT</pubDate>
    <dc:date>2026-03-05T20:54:15Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>Researchers report a maximum‑severity flaw in a Java JWT library</title>
      <link>https://fieldeffect.com/blog/maximum-severity-flaw-java-jwt-library</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/maximum-severity-flaw-java-jwt-library" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Researchers report a maximum‑severity flaw in a Java JWT library" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; A flaw in a widely used Java library for working with JSON Web Tokens has drawn attention because it weakens one of the core guarantees of token‑based authentication: that only a trusted issuer can create valid tokens. Researchers found that, under certain conditions, the library may incorrectly accept or mis-validate tokens, opening the door to forged credentials or unauthorized access if an attacker can craft tokens that appear legitimate.&lt;/span&gt;&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/maximum-severity-flaw-java-jwt-library" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Researchers report a maximum‑severity flaw in a Java JWT library" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; A flaw in a widely used Java library for working with JSON Web Tokens has drawn attention because it weakens one of the core guarantees of token‑based authentication: that only a trusted issuer can create valid tokens. Researchers found that, under certain conditions, the library may incorrectly accept or mis-validate tokens, opening the door to forged credentials or unauthorized access if an attacker can craft tokens that appear legitimate.&lt;/span&gt;&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fmaximum-severity-flaw-java-jwt-library&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Thu, 05 Mar 2026 20:54:15 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/maximum-severity-flaw-java-jwt-library</guid>
      <dc:date>2026-03-05T20:54:15Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>CISA warns of remote code execution risk in VMware Aria Operations</title>
      <link>https://fieldeffect.com/blog/cisa-rce-vmware-aria-operations</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/cisa-rce-vmware-aria-operations" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="CISA warns of remote code execution risk in VMware Aria Operations" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; CISA has added a high-severity Broadcom VMware Aria Operations vulnerability (CVE-2026-22719) to its Known Exploited Vulnerabilities catalog following reports of active exploitation. The flaw allows unauthenticated command execution during a support-assisted migration workflow and affects Aria Operations along with platforms that integrate it, including VMware Cloud Foundation and VMware Telco products.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/cisa-rce-vmware-aria-operations" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="CISA warns of remote code execution risk in VMware Aria Operations" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; CISA has added a high-severity Broadcom VMware Aria Operations vulnerability (CVE-2026-22719) to its Known Exploited Vulnerabilities catalog following reports of active exploitation. The flaw allows unauthenticated command execution during a support-assisted migration workflow and affects Aria Operations along with platforms that integrate it, including VMware Cloud Foundation and VMware Telco products.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcisa-rce-vmware-aria-operations&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Wed, 04 Mar 2026 18:00:40 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/cisa-rce-vmware-aria-operations</guid>
      <dc:date>2026-03-04T18:00:40Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Cyber spillover risks amid the February 2026 Middle East escalation</title>
      <link>https://fieldeffect.com/blog/cyber-spillover-risks-2026-middle-east-escalation</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/cyber-spillover-risks-2026-middle-east-escalation" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Cyber spillover risks amid the February 2026 Middle East escalation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Escalating conflict following coordinated U.S. and Israeli strikes on Iranian military and nuclear sites has raised concerns about potential cyber spillover. Canadian and UK cybersecurity agencies warn that Iran is likely to use cyber capabilities in response, though no large-scale attacks have been confirmed. Researchers have observed a rise in opportunistic hacktivist activity and unverified claims of DDoS attacks, defacements, and data leaks targeting Iran’s adversaries. Organizations are advised to remain vigilant and reinforce core security controls.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/cyber-spillover-risks-2026-middle-east-escalation" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Cyber spillover risks amid the February 2026 Middle East escalation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Escalating conflict following coordinated U.S. and Israeli strikes on Iranian military and nuclear sites has raised concerns about potential cyber spillover. Canadian and UK cybersecurity agencies warn that Iran is likely to use cyber capabilities in response, though no large-scale attacks have been confirmed. Researchers have observed a rise in opportunistic hacktivist activity and unverified claims of DDoS attacks, defacements, and data leaks targeting Iran’s adversaries. Organizations are advised to remain vigilant and reinforce core security controls.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcyber-spillover-risks-2026-middle-east-escalation&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Wed, 04 Mar 2026 14:32:26 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/cyber-spillover-risks-2026-middle-east-escalation</guid>
      <dc:date>2026-03-04T14:32:26Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Critical TLS authentication bypass impacts VMware Tanzu</title>
      <link>https://fieldeffect.com/blog/tls-authentication-bypass-vmware-tanzu</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/tls-authentication-bypass-vmware-tanzu" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Critical TLS authentication bypass impacts VMware Tanzu" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Broadcom has patched CVE-2025-68121, a critical (CVSS 10.0) flaw in Go’s crypto/tls library that impacts multiple VMware Tanzu products through embedded Go-based components. The vulnerability can undermine TLS authentication integrity during session resumption, potentially allowing unauthorized trust of a peer. Affected products include Tanzu RabbitMQ and several Tanzu Greenplum offerings. Users are urged to upgrade to the fixed versions listed in Broadcom’s advisories.&lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/tls-authentication-bypass-vmware-tanzu" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Critical TLS authentication bypass impacts VMware Tanzu" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Broadcom has patched CVE-2025-68121, a critical (CVSS 10.0) flaw in Go’s crypto/tls library that impacts multiple VMware Tanzu products through embedded Go-based components. The vulnerability can undermine TLS authentication integrity during session resumption, potentially allowing unauthorized trust of a peer. Affected products include Tanzu RabbitMQ and several Tanzu Greenplum offerings. Users are urged to upgrade to the fixed versions listed in Broadcom’s advisories.&lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Ftls-authentication-bypass-vmware-tanzu&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Tue, 03 Mar 2026 13:56:12 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/tls-authentication-bypass-vmware-tanzu</guid>
      <dc:date>2026-03-03T13:56:12Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>MDR for MSPs with a lean cybersecurity team</title>
      <link>https://fieldeffect.com/blog/mdr-for-lean-msps</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/mdr-for-lean-msps" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%202.png" alt="MDR for MSPs with a lean cybersecurity team" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;“My MSP doesn’t have a dedicated security team.”&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/mdr-for-lean-msps" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%202.png" alt="MDR for MSPs with a lean cybersecurity team" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;“My MSP doesn’t have a dedicated security team.”&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fmdr-for-lean-msps&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity education</category>
      <pubDate>Mon, 02 Mar 2026 15:10:20 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/mdr-for-lean-msps</guid>
      <dc:date>2026-03-02T15:10:20Z</dc:date>
      <dc:creator>Field Effect</dc:creator>
    </item>
    <item>
      <title>Cybersecurity insurance and MDR: What businesses and MSPs need to know</title>
      <link>https://fieldeffect.com/blog/cybersecurity-insurance-mdr</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/cybersecurity-insurance-mdr" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Blog-Thumb-Cyber-insurance-MDR.png" alt="Cybersecurity insurance and MDR: What businesses and MSPs need to know" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Cybersecurity insurance (cyber liability insurance) is a policy that helps organizations cover the financial impact of cyber incidents such as ransomware, data breaches, business interruption, and regulatory fines.&amp;nbsp;&lt;br&gt;&lt;br&gt;Unlike traditional insurance, cyber coverage now requires demonstrable cybersecurity controls before approval or renewal.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/cybersecurity-insurance-mdr" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Blog-Thumb-Cyber-insurance-MDR.png" alt="Cybersecurity insurance and MDR: What businesses and MSPs need to know" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Cybersecurity insurance (cyber liability insurance) is a policy that helps organizations cover the financial impact of cyber incidents such as ransomware, data breaches, business interruption, and regulatory fines.&amp;nbsp;&lt;br&gt;&lt;br&gt;Unlike traditional insurance, cyber coverage now requires demonstrable cybersecurity controls before approval or renewal.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcybersecurity-insurance-mdr&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity education</category>
      <pubDate>Mon, 02 Mar 2026 14:50:31 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/cybersecurity-insurance-mdr</guid>
      <dc:date>2026-03-02T14:50:31Z</dc:date>
      <dc:creator>Field Effect</dc:creator>
    </item>
    <item>
      <title>Researchers report FreePBX exploitation: 900+ systems compromised</title>
      <link>https://fieldeffect.com/blog/freepbx-exploitation-900-systems-compromised</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/freepbx-exploitation-900-systems-compromised" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Researchers report FreePBX exploitation: 900+ systems compromised" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Researchers report more than 900 Sangoma FreePBX instances infected with persistent web shells following exploitation of CVE-2025-64328, a high-severity (CVSS 8.6) post-authentication command-injection vulnerability in the FreePBX Endpoint Manager filestore module. Affecting versions 17.0.2.36 and above up to (but not including) 17.0.3, the flaw stems from improper handling of user input in the SSH test-connection function, enabling arbitrary command execution as the asterisk user. Exploitation has been observed since December 2025, despite patches released in November 2025. &lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/freepbx-exploitation-900-systems-compromised" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Researchers report FreePBX exploitation: 900+ systems compromised" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Researchers report more than 900 Sangoma FreePBX instances infected with persistent web shells following exploitation of CVE-2025-64328, a high-severity (CVSS 8.6) post-authentication command-injection vulnerability in the FreePBX Endpoint Manager filestore module. Affecting versions 17.0.2.36 and above up to (but not including) 17.0.3, the flaw stems from improper handling of user input in the SSH test-connection function, enabling arbitrary command execution as the asterisk user. Exploitation has been observed since December 2025, despite patches released in November 2025. &lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Ffreepbx-exploitation-900-systems-compromised&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Mon, 02 Mar 2026 14:13:33 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/freepbx-exploitation-900-systems-compromised</guid>
      <dc:date>2026-03-02T14:13:33Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>HIPAA &amp; what it means for MSPs</title>
      <link>https://fieldeffect.com/blog/hipaa-for-msps</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/hipaa-for-msps" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Blog-Thumb-HIPAA_v2.png" alt="HIPAA &amp;amp; what it means for MSPs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;For MSPs that support healthcare organizations, HIPAA compliance can be slightly intimidating.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/hipaa-for-msps" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Blog-Thumb-HIPAA_v2.png" alt="HIPAA &amp;amp; what it means for MSPs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;For MSPs that support healthcare organizations, HIPAA compliance can be slightly intimidating.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fhipaa-for-msps&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>From the experts</category>
      <pubDate>Mon, 02 Mar 2026 12:45:00 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/hipaa-for-msps</guid>
      <dc:date>2026-03-02T12:45:00Z</dc:date>
      <dc:creator>Matt Lewis</dc:creator>
    </item>
    <item>
      <title>Zyxel patches critical UPnP command‑injection flaw, POC available</title>
      <link>https://fieldeffect.com/blog/zyxel-patch-upnp-command-injection-flaw</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/zyxel-patch-upnp-command-injection-flaw" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Zyxel patches critical UPnP command‑injection flaw, POC available" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Zyxel disclosed CVE-2025-13942, a critical (CVSS 9.8) command-injection vulnerability in the UPnP service of the EX3510-B0 router, affecting firmware through version 5.17(ABUP.15.1)C0. The flaw allows unauthenticated remote attackers to execute operating system commands via specially crafted UPnP SOAP requests when both UPnP and WAN access are enabled. Proof-of-concept code has been released, and exploitation requires minimal complexity once the service is exposed. &lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/zyxel-patch-upnp-command-injection-flaw" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Zyxel patches critical UPnP command‑injection flaw, POC available" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Zyxel disclosed CVE-2025-13942, a critical (CVSS 9.8) command-injection vulnerability in the UPnP service of the EX3510-B0 router, affecting firmware through version 5.17(ABUP.15.1)C0. The flaw allows unauthenticated remote attackers to execute operating system commands via specially crafted UPnP SOAP requests when both UPnP and WAN access are enabled. Proof-of-concept code has been released, and exploitation requires minimal complexity once the service is exposed. &lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fzyxel-patch-upnp-command-injection-flaw&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Fri, 27 Feb 2026 13:51:01 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/zyxel-patch-upnp-command-injection-flaw</guid>
      <dc:date>2026-02-27T13:51:01Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Why law firms need smarter cybersecurity solutions</title>
      <link>https://fieldeffect.com/blog/law-firms-cybersecurity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/law-firms-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%201.png" alt="Why law firms need smarter cybersecurity solutions" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Law firms are trusted with some of the most sensitive information: client records, case details, financial data, and intellectual property. In today’s digital-first world, this data is a prime target for cybercriminals. Unfortunately, many firms still rely on outdated security measures or a patchwork of tools that leave dangerous gaps.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/law-firms-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%201.png" alt="Why law firms need smarter cybersecurity solutions" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Law firms are trusted with some of the most sensitive information: client records, case details, financial data, and intellectual property. In today’s digital-first world, this data is a prime target for cybercriminals. Unfortunately, many firms still rely on outdated security measures or a patchwork of tools that leave dangerous gaps.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Flaw-firms-cybersecurity&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity education</category>
      <pubDate>Thu, 26 Feb 2026 05:45:00 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/law-firms-cybersecurity</guid>
      <dc:date>2026-02-26T05:45:00Z</dc:date>
      <dc:creator>Field Effect</dc:creator>
    </item>
    <item>
      <title>Maximum‑severity zero day in Cisco Catalyst SD‑WAN now patched</title>
      <link>https://fieldeffect.com/blog/max-severity-zero-day-cisco-catalyst-sd-wan-patched</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/max-severity-zero-day-cisco-catalyst-sd-wan-patched" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Maximum‑severity zero day in Cisco Catalyst SD‑WAN now patched" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Cisco disclosed CVE-2026-20127, a maximum-severity zero-day in Catalyst SD-WAN Controller and Manager that allows unauthenticated remote access to high-privilege internal accounts. Exploitation enables attackers to reach the NETCONF interface and manipulate routing and policy across the SD-WAN control plane. Limited in-the-wild activity was confirmed prior to patch release. &lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/max-severity-zero-day-cisco-catalyst-sd-wan-patched" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Maximum‑severity zero day in Cisco Catalyst SD‑WAN now patched" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Cisco disclosed CVE-2026-20127, a maximum-severity zero-day in Catalyst SD-WAN Controller and Manager that allows unauthenticated remote access to high-privilege internal accounts. Exploitation enables attackers to reach the NETCONF interface and manipulate routing and policy across the SD-WAN control plane. Limited in-the-wild activity was confirmed prior to patch release. &lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fmax-severity-zero-day-cisco-catalyst-sd-wan-patched&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Wed, 25 Feb 2026 21:00:58 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/max-severity-zero-day-cisco-catalyst-sd-wan-patched</guid>
      <dc:date>2026-02-25T21:00:58Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Typosquatting campaign targets npm, CI pipelines, and AI‑driven development</title>
      <link>https://fieldeffect.com/blog/typosquatting-campaign-sandworm-mode</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/typosquatting-campaign-sandworm-mode" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Typosquatting campaign targets npm, CI pipelines, and AI‑driven development" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Researchers detailed SANDWORM_MODE, a supply-chain attack campaign involving at least 19 malicious npm packages impersonating popular developer utilities and AI coding tools. The typosquatted packages deployed a malicious Model Context Protocol (MCP) server and used embedded prompt-injection techniques to harvest SSH keys, cloud credentials, npm tokens, and environment secrets across developer and CI environments. The activity highlights how AI-integrated toolchains create new paths for credential theft. &lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/typosquatting-campaign-sandworm-mode" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="Typosquatting campaign targets npm, CI pipelines, and AI‑driven development" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Researchers detailed SANDWORM_MODE, a supply-chain attack campaign involving at least 19 malicious npm packages impersonating popular developer utilities and AI coding tools. The typosquatted packages deployed a malicious Model Context Protocol (MCP) server and used embedded prompt-injection techniques to harvest SSH keys, cloud credentials, npm tokens, and environment secrets across developer and CI environments. The activity highlights how AI-integrated toolchains create new paths for credential theft. &lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Ftyposquatting-campaign-sandworm-mode&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Wed, 25 Feb 2026 14:37:50 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/typosquatting-campaign-sandworm-mode</guid>
      <dc:date>2026-02-25T14:37:50Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>What is the difference between MDR, XDR, and EDR?</title>
      <link>https://fieldeffect.com/blog/mdr-xdr-edr</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/mdr-xdr-edr" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/blog_featured-Difference-between-MDR-XDR-and-EDR.jpg" alt="MDR XDR EDR Thumbnail" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The cybersecurity world can sometimes feel like a tangled web of acronyms, each longer and more complex than the last. We've previously covered &lt;a href="https://fieldeffect.com/blog/cyber-security-solutions-how-they-work/"&gt;some of the more common terms&lt;/a&gt;, but today, let's dive deeper into the world of detection and response, focusing on three heavy hitters:&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/mdr-xdr-edr" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/blog_featured-Difference-between-MDR-XDR-and-EDR.jpg" alt="MDR XDR EDR Thumbnail" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The cybersecurity world can sometimes feel like a tangled web of acronyms, each longer and more complex than the last. We've previously covered &lt;a href="https://fieldeffect.com/blog/cyber-security-solutions-how-they-work/"&gt;some of the more common terms&lt;/a&gt;, but today, let's dive deeper into the world of detection and response, focusing on three heavy hitters:&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fmdr-xdr-edr&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity education</category>
      <pubDate>Tue, 24 Feb 2026 19:45:00 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/mdr-xdr-edr</guid>
      <dc:date>2026-02-24T19:45:00Z</dc:date>
      <dc:creator>Field Effect</dc:creator>
    </item>
    <item>
      <title>Cyber myth buster: EDR and backups aren’t a security strategy</title>
      <link>https://fieldeffect.com/blog/cyber-myth-buster-edr-and-backups-arent-a-security-strategy</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/cyber-myth-buster-edr-and-backups-arent-a-security-strategy" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Blog-Thumb-Myth-Buster.png" alt="Cyber myth buster: EDR and backups aren’t a security strategy" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Endpoint detection and response (EDR) and data backups are essential tools in any cybersecurity program. They help detect threats on endpoints and recover data when things go wrong. But relying on them alone leaves critical gaps.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/cyber-myth-buster-edr-and-backups-arent-a-security-strategy" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Blog-Thumb-Myth-Buster.png" alt="Cyber myth buster: EDR and backups aren’t a security strategy" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Endpoint detection and response (EDR) and data backups are essential tools in any cybersecurity program. They help detect threats on endpoints and recover data when things go wrong. But relying on them alone leaves critical gaps.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fcyber-myth-buster-edr-and-backups-arent-a-security-strategy&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Products and services</category>
      <pubDate>Tue, 24 Feb 2026 19:26:54 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/cyber-myth-buster-edr-and-backups-arent-a-security-strategy</guid>
      <dc:date>2026-02-24T19:26:54Z</dc:date>
      <dc:creator>Field Effect</dc:creator>
    </item>
    <item>
      <title>The best alternatives to Blackpoint for managed detection &amp; response</title>
      <link>https://fieldeffect.com/blog/best-alternatives-blackpoint-managed-detection-response</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/best-alternatives-blackpoint-managed-detection-response" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Why do organizations seek alternatives to Blackpoint?&lt;/h2&gt; 
&lt;p&gt;Blackpoint Cyber is a familiar name among MSPs seeking a managed SOC-as-a-service offering. However, as cybersecurity demands evolve, many MSPs and lean IT teams find themselves looking for more integrated, complete, and value-driven MDR solutions.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/best-alternatives-blackpoint-managed-detection-response" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Why do organizations seek alternatives to Blackpoint?&lt;/h2&gt; 
&lt;p&gt;Blackpoint Cyber is a familiar name among MSPs seeking a managed SOC-as-a-service offering. However, as cybersecurity demands evolve, many MSPs and lean IT teams find themselves looking for more integrated, complete, and value-driven MDR solutions.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fbest-alternatives-blackpoint-managed-detection-response&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Products and services</category>
      <pubDate>Tue, 24 Feb 2026 18:20:43 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/best-alternatives-blackpoint-managed-detection-response</guid>
      <dc:date>2026-02-24T18:20:43Z</dc:date>
      <dc:creator>Field Effect</dc:creator>
    </item>
    <item>
      <title>How to calculate the ROI of MDR solutions</title>
      <link>https://fieldeffect.com/blog/how-to-calculate-the-roi-of-mdr-solutions</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/how-to-calculate-the-roi-of-mdr-solutions" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Return on investment (ROI) for managed detection and response (MDR) is often misunderstood.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/how-to-calculate-the-roi-of-mdr-solutions" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Return on investment (ROI) for managed detection and response (MDR) is often misunderstood.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fhow-to-calculate-the-roi-of-mdr-solutions&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Products and services</category>
      <pubDate>Tue, 24 Feb 2026 18:05:35 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/how-to-calculate-the-roi-of-mdr-solutions</guid>
      <dc:date>2026-02-24T18:05:35Z</dc:date>
      <dc:creator>Field Effect</dc:creator>
    </item>
    <item>
      <title>Low‑skill threat actor leverages AI in FortiGate intrusion activity</title>
      <link>https://fieldeffect.com/blog/threat-actor-ai-fortigate-intrusion-activity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/threat-actor-ai-fortigate-intrusion-activity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Low‑skill threat actor leverages AI in FortiGate intrusion activity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; More than 600 FortiGate devices were compromised worldwide after a low-skill, financially motivated actor used commercial AI tools to automate reconnaissance, credential harvesting, and intrusion activity against exposed management interfaces with weak authentication. The campaign highlights how AI can amplify opportunistic attacks. Organizations should restrict internet-facing management access, enforce MFA, rotate credentials, and monitor for anomalous activity to reduce risk. &lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/threat-actor-ai-fortigate-intrusion-activity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Low‑skill threat actor leverages AI in FortiGate intrusion activity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; More than 600 FortiGate devices were compromised worldwide after a low-skill, financially motivated actor used commercial AI tools to automate reconnaissance, credential harvesting, and intrusion activity against exposed management interfaces with weak authentication. The campaign highlights how AI can amplify opportunistic attacks. Organizations should restrict internet-facing management access, enforce MFA, rotate credentials, and monitor for anomalous activity to reduce risk. &lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fthreat-actor-ai-fortigate-intrusion-activity&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Tue, 24 Feb 2026 14:01:04 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/threat-actor-ai-fortigate-intrusion-activity</guid>
      <dc:date>2026-02-24T14:01:04Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Evaluating MDR vendors: Why MSPs choose Field Effect MDR</title>
      <link>https://fieldeffect.com/blog/evaluating-mdr-vendors-why-msps-choose-field-effect-mdr</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/evaluating-mdr-vendors-why-msps-choose-field-effect-mdr" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;For managed service providers (MSPs), choosing a managed detection and response (MDR) vendor is no longer just a technology decision, it's a business risk decision.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/evaluating-mdr-vendors-why-msps-choose-field-effect-mdr" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;For managed service providers (MSPs), choosing a managed detection and response (MDR) vendor is no longer just a technology decision, it's a business risk decision.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fevaluating-mdr-vendors-why-msps-choose-field-effect-mdr&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Products and services</category>
      <pubDate>Mon, 23 Feb 2026 15:36:57 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/evaluating-mdr-vendors-why-msps-choose-field-effect-mdr</guid>
      <dc:date>2026-02-23T15:36:57Z</dc:date>
      <dc:creator>Field Effect</dc:creator>
    </item>
    <item>
      <title>The best alternatives to Sophos MDR for managed detection &amp; response</title>
      <link>https://fieldeffect.com/blog/best-alternatives-sophos-mdr</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/best-alternatives-sophos-mdr" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Why do organizations seek alternatives to Sophos?&lt;/h2&gt; 
&lt;p&gt;Sophos MDR and its broader cybersecurity suite have earned recognition for extending managed detection and response to a wide customer base. Yet, many organizations (especially MSPs, lean IT teams, and mid-market businesses) seek alternatives to reduce complexity, eliminate blind spots, and improve response times.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/best-alternatives-sophos-mdr" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Field%20Effect%202024/Featured/Featured%20-%20Field%20Effect%20MDR%203.png" alt="Managed detection and response MDR" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;Why do organizations seek alternatives to Sophos?&lt;/h2&gt; 
&lt;p&gt;Sophos MDR and its broader cybersecurity suite have earned recognition for extending managed detection and response to a wide customer base. Yet, many organizations (especially MSPs, lean IT teams, and mid-market businesses) seek alternatives to reduce complexity, eliminate blind spots, and improve response times.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fbest-alternatives-sophos-mdr&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Products and services</category>
      <pubDate>Mon, 23 Feb 2026 15:03:46 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/best-alternatives-sophos-mdr</guid>
      <dc:date>2026-02-23T15:03:46Z</dc:date>
      <dc:creator>Field Effect</dc:creator>
    </item>
    <item>
      <title>Predictable credentials generated by AI tools introduce new risks</title>
      <link>https://fieldeffect.com/blog/predictable-credentials-generated-ai-tools-risks</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/predictable-credentials-generated-ai-tools-risks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Predictable credentials generated by AI tools introduce new risks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; New research shows that passwords generated by AI systems are often predictable and repeat across sessions due to the statistical token-based nature of LLMs. Because these passwords appear complex, they frequently pass standard strength checks and may be embedded into code or configuration files without detection. Organizations should instead rely on cryptographically secure random number generators for password creation tasks to reduce the risk of credential compromise. &lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/predictable-credentials-generated-ai-tools-risks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_03.jpg" alt="Predictable credentials generated by AI tools introduce new risks" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; New research shows that passwords generated by AI systems are often predictable and repeat across sessions due to the statistical token-based nature of LLMs. Because these passwords appear complex, they frequently pass standard strength checks and may be embedded into code or configuration files without detection. Organizations should instead rely on cryptographically secure random number generators for password creation tasks to reduce the risk of credential compromise. &lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fpredictable-credentials-generated-ai-tools-risks&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Fri, 20 Feb 2026 22:20:24 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/predictable-credentials-generated-ai-tools-risks</guid>
      <dc:date>2026-02-20T22:20:24Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Chrome and Chromium-based browsers receive fixes for exploited flaw</title>
      <link>https://fieldeffect.com/blog/chrome-chromium-browsers-fixes-exploited-flaw</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/chrome-chromium-browsers-fixes-exploited-flaw" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Chrome and Chromium-based browsers receive fixes for exploited flaw" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; CISA has added CVE-2026-2441, a high-severity Chrome and Chromium vulnerability with a public exploit available, to its Known Exploited Vulnerabilities (KEV) catalog following confirmed in-the-wild exploitation. Google and other major Chromium-based browsers have released updates to address the flaw. Organizations should upgrade to the latest versions immediately to reduce exposure. &lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/chrome-chromium-browsers-fixes-exploited-flaw" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_02.jpg" alt="Chrome and Chromium-based browsers receive fixes for exploited flaw" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; CISA has added CVE-2026-2441, a high-severity Chrome and Chromium vulnerability with a public exploit available, to its Known Exploited Vulnerabilities (KEV) catalog following confirmed in-the-wild exploitation. Google and other major Chromium-based browsers have released updates to address the flaw. Organizations should upgrade to the latest versions immediately to reduce exposure. &lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fchrome-chromium-browsers-fixes-exploited-flaw&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Thu, 19 Feb 2026 22:54:46 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/chrome-chromium-browsers-fixes-exploited-flaw</guid>
      <dc:date>2026-02-19T22:54:46Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Packaging cybersecurity as a strategic growth lever for MSPs</title>
      <link>https://fieldeffect.com/blog/packaging-cybersecurity-msps</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/packaging-cybersecurity-msps" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Growth-Lever-Blog.png" alt="Packaging cybersecurity as a strategic growth lever for MSPs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Managed service providers (MSPs) know cybersecurity is no longer optional, but packaging it effectively remains one of the biggest challenges in the channel.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/packaging-cybersecurity-msps" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Growth-Lever-Blog.png" alt="Packaging cybersecurity as a strategic growth lever for MSPs" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Managed service providers (MSPs) know cybersecurity is no longer optional, but packaging it effectively remains one of the biggest challenges in the channel.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fpackaging-cybersecurity-msps&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Cybersecurity education</category>
      <pubDate>Thu, 19 Feb 2026 16:00:58 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/packaging-cybersecurity-msps</guid>
      <dc:date>2026-02-19T16:00:58Z</dc:date>
      <dc:creator>Field Effect</dc:creator>
    </item>
    <item>
      <title>End‑to‑end update verification arrives in Notepad++ with version 8.9.2</title>
      <link>https://fieldeffect.com/blog/notepad-version-8.9.2</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/notepad-version-8.9.2" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="End‑to‑end update verification arrives in Notepad++ with version 8.9.2" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Notepad++ version 8.9.2 introduces cryptographic verification of the XML update manifest, completing end-to-end verification of both update metadata and installers following the 2025 supply-chain compromise. The update closes the remaining gap that allowed threat actors to manipulate update metadata and redirect GUP to execute malicious payloads. Organizations running 8.9.1 or earlier are recommended to upgrade to 8.9.2 and remove any deprecated self-signed certificates. &lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/notepad-version-8.9.2" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_01.jpg" alt="End‑to‑end update verification arrives in Notepad++ with version 8.9.2" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Notepad++ version 8.9.2 introduces cryptographic verification of the XML update manifest, completing end-to-end verification of both update metadata and installers following the 2025 supply-chain compromise. The update closes the remaining gap that allowed threat actors to manipulate update metadata and redirect GUP to execute malicious payloads. Organizations running 8.9.1 or earlier are recommended to upgrade to 8.9.2 and remove any deprecated self-signed certificates. &lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fnotepad-version-8.9.2&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Wed, 18 Feb 2026 21:58:26 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/notepad-version-8.9.2</guid>
      <dc:date>2026-02-18T21:58:26Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Weekly Threat Round-Up: Critical Apple flaw, eBPF rootkit &amp; more</title>
      <link>https://fieldeffect.com/blog/weekly-threat-round-up-critical-apple-flaw-ebpf-rootkit-more</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/weekly-threat-round-up-critical-apple-flaw-ebpf-rootkit-more" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Blog-Thumb-SECURITY%20INTELLIGENCE%20RECAP.jpg" alt="Weekly Threat Round-Up: Critical Apple flaw, eBPF rootkit &amp;amp; more" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h1&gt;&lt;span style="color: #006aff;"&gt;Threat round-up&lt;/span&gt;&lt;/h1&gt; 
&lt;p&gt;Stay ahead of emerging cyber threats with expert insights from Field Effect’s cybersecurity analysts.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/weekly-threat-round-up-critical-apple-flaw-ebpf-rootkit-more" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Blog-Thumb-SECURITY%20INTELLIGENCE%20RECAP.jpg" alt="Weekly Threat Round-Up: Critical Apple flaw, eBPF rootkit &amp;amp; more" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h1&gt;&lt;span style="color: #006aff;"&gt;Threat round-up&lt;/span&gt;&lt;/h1&gt; 
&lt;p&gt;Stay ahead of emerging cyber threats with expert insights from Field Effect’s cybersecurity analysts.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fweekly-threat-round-up-critical-apple-flaw-ebpf-rootkit-more&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Tue, 17 Feb 2026 21:56:49 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/weekly-threat-round-up-critical-apple-flaw-ebpf-rootkit-more</guid>
      <dc:date>2026-02-17T21:56:49Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
    <item>
      <title>Study Tests Zero‑Knowledge Protections in Cloud Password Managers</title>
      <link>https://fieldeffect.com/blog/malicious-server-risks-cloud-password-managers</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/malicious-server-risks-cloud-password-managers" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Study Tests Zero‑Knowledge Protections in Cloud Password Managers" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Researchers disclosed 27 attack paths affecting major cloud-based password managers showing that with a provider’s cloud infrastructure compromised, it's possible to manipulate recovery workflows and client-side logic to recover stored passwords or alter vault contents, despite zero-knowledge encryption protections. Vendors have been notified and are implementing mitigations, but the findings highlight systemic risks if password-manager infrastructure is breached. &lt;/p&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://fieldeffect.com/blog/malicious-server-risks-cloud-password-managers" title="" class="hs-featured-image-link"&gt; &lt;img src="https://fieldeffect.com/hubfs/Website-Blog/Blog-Thumb-Threat-Brief_04.jpg" alt="Study Tests Zero‑Knowledge Protections in Cloud Password Managers" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div class="info-box" style="padding: 30px 30px 5px 30px; margin-bottom: 30px; color: #17212b; font-style: italic; background-color: #f1f6f9; border: 1px solid #BFDEFF; border-bottom-width: 3px;"&gt; 
 &lt;p style="color: inherit; font-style: inherit;"&gt;&lt;span style="font-weight: bold;"&gt;At a glance:&lt;/span&gt; Researchers disclosed 27 attack paths affecting major cloud-based password managers showing that with a provider’s cloud infrastructure compromised, it's possible to manipulate recovery workflows and client-side logic to recover stored passwords or alter vault contents, despite zero-knowledge encryption protections. Vendors have been notified and are implementing mitigations, but the findings highlight systemic risks if password-manager infrastructure is breached. &lt;/p&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=8376691&amp;amp;k=14&amp;amp;r=https%3A%2F%2Ffieldeffect.com%2Fblog%2Fmalicious-server-risks-cloud-password-managers&amp;amp;bu=https%253A%252F%252Ffieldeffect.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security intelligence</category>
      <pubDate>Tue, 17 Feb 2026 21:29:25 GMT</pubDate>
      <guid>https://fieldeffect.com/blog/malicious-server-risks-cloud-password-managers</guid>
      <dc:date>2026-02-17T21:29:25Z</dc:date>
      <dc:creator>Field Effect Security Intelligence Team</dc:creator>
    </item>
  </channel>
</rss>
