<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Weekly-Roundup on microsegment.io</title>
    <link>https://microsegment.io/tags/weekly-roundup/</link>
    <description>Recent content in Weekly-Roundup on microsegment.io</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Fri, 10 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://microsegment.io/tags/weekly-roundup/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Weekly Security Landscape: April 4 - 10, 2026</title>
      <link>https://microsegment.io/post/2026-04-10-weekly-security-landscape-w15/</link>
      <pubDate>Fri, 10 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://microsegment.io/post/2026-04-10-weekly-security-landscape-w15/</guid>
      <description>&lt;h2 id=&#34;the-week-at-a-glance&#34;&gt;The Week at a Glance&lt;/h2&gt;&#xA;&lt;p&gt;This week was not really about malware. It was about trust boundaries failing in quiet, high-leverage places.&lt;/p&gt;&#xA;&lt;p&gt;Older routers became token theft infrastructure. Helpdesks and BPOs became initial access. Mobile and endpoint management platforms kept showing up in CISA KEV. AI kept compressing the window between disclosure and weaponization. And all of it pointed to the same uncomfortable truth: the highest-risk systems are often the ones defenders still treat as support plumbing.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Weekly Security Landscape: March 28 - April 3, 2026</title>
      <link>https://microsegment.io/post/2026-04-03-weekly-security-landscape-w14/</link>
      <pubDate>Fri, 03 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://microsegment.io/post/2026-04-03-weekly-security-landscape-w14/</guid>
      <description>&lt;h2 id=&#34;the-week-at-a-glance&#34;&gt;The Week at a Glance&lt;/h2&gt;&#xA;&lt;p&gt;This was the week supply chain attacks went industrial, management plane vulnerabilities kept stacking up, and AI proved it can write kernel exploits faster than most organizations can triage a CVE. Here&amp;rsquo;s what happened - and what it means for your architecture.&lt;/p&gt;&#xA;&lt;hr&gt;&#xA;&lt;h2 id=&#34;-critical-teampcp-supply-chain-campaign-expands&#34;&gt;🔴 Critical: TeamPCP Supply Chain Campaign Expands&lt;/h2&gt;&#xA;&lt;p&gt;&lt;strong&gt;The biggest story of the month continued to grow.&lt;/strong&gt; TeamPCP&amp;rsquo;s supply chain attack, which started with compromising Aqua Security&amp;rsquo;s Trivy vulnerability scanner via GitHub Actions, expanded to hit LiteLLM (95 million PyPI downloads/month), Checkmarx KICS, and the Axios npm package (100 million weekly downloads).&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
