<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Reports on microsegment.io</title>
    <link>https://microsegment.io/categories/reports/</link>
    <description>Recent content in Reports on microsegment.io</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Fri, 10 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://microsegment.io/categories/reports/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Weekly Security Landscape: April 4 - 10, 2026</title>
      <link>https://microsegment.io/post/2026-04-10-weekly-security-landscape-w15/</link>
      <pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://microsegment.io/post/2026-04-10-weekly-security-landscape-w15/</guid>
      <description>&lt;h2 id=&#34;the-week-at-a-glance&#34;&gt;The Week at a Glance&lt;/h2&gt;&#xA;&lt;p&gt;This week was not really about malware. It was about trust boundaries failing in quiet, high-leverage places.&lt;/p&gt;&#xA;&lt;p&gt;Older routers became token theft infrastructure. Helpdesks and BPOs became initial access. Mobile and endpoint management platforms kept showing up in CISA KEV. AI kept compressing the window between disclosure and weaponization. And all of it pointed to the same uncomfortable truth: the highest-risk systems are often the ones defenders still treat as support plumbing.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Weekly Security Landscape: March 28 - April 3, 2026</title>
      <link>https://microsegment.io/post/2026-04-03-weekly-security-landscape-w14/</link>
      <pubDate>Fri, 03 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://microsegment.io/post/2026-04-03-weekly-security-landscape-w14/</guid>
      <description>&lt;h2 id=&#34;the-week-at-a-glance&#34;&gt;The Week at a Glance&lt;/h2&gt;&#xA;&lt;p&gt;This was the week supply chain attacks went industrial, management plane vulnerabilities kept stacking up, and AI proved it can write kernel exploits faster than most organizations can triage a CVE. Here&amp;rsquo;s what happened - and what it means for your architecture.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-critical-teampcp-supply-chain-campaign-expands&#34;&gt;🔴 Critical: TeamPCP Supply Chain Campaign Expands&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;The biggest story of the month continued to grow.&lt;/strong&gt; TeamPCP&amp;rsquo;s supply chain attack, which started with compromising Aqua Security&amp;rsquo;s Trivy vulnerability scanner via GitHub Actions, expanded to hit LiteLLM (95 million PyPI downloads/month), Checkmarx KICS, and the Axios npm package (100 million weekly downloads).&lt;/p&gt;</description>
    </item>
    <item>
      <title>M-Trends 2025: Unpacking the Threats and Why Microsegmentation is Your Strongest Defense</title>
      <link>https://microsegment.io/post/2025-05-20-m-trends-2025-analysis-the-power-of-microsegmentation/</link>
      <pubDate>Tue, 20 May 2025 00:00:00 +0000</pubDate>
      <guid>https://microsegment.io/post/2025-05-20-m-trends-2025-analysis-the-power-of-microsegmentation/</guid>
      <description>&lt;h2 id=&#34;m-trends-2025-unpacking-the-threats-and-why-microsegmentation-is-your-strongest-defense&#34;&gt;M-Trends 2025: Unpacking the Threats and Why Microsegmentation is Your Strongest Defense&lt;/h2&gt;&#xA;&lt;p&gt;The recently released Mandiant M-Trends 2025 report offers a insightful look into the evolving cybersecurity landscape. As we digest its key findings, one thing becomes abundantly clear: attackers are becoming more opportunistic and sophisticated, exploiting any weakness they can find. For those of us focused on building resilient security architectures, the report underscores the importance of granular control and containment – principles at the heart of microsegmentation.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
