<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Aspex Managed Services  | Site-Wide Activity</title>
	<link>https://www.aspex.com.ph/?bp_activities=1</link>
	<atom:link href="https://www.aspex.com.ph/?bp_activities=1&#038;bp_activity_action=feed" rel="self" type="application/rss+xml" />
	<description>Activity feed for the entire site.</description>
	<lastBuildDate>Thu, 30 Apr 2026 07:02:09 +0800</lastBuildDate>
	<generator>https://buddypress.org/?v=</generator>
	<language>en-US</language>
	<ttl>30</ttl>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>2</sy:updateFrequency>
	
						<item>
				<guid isPermaLink="false">ebbbdb8de9cce2b98a35ab714bb4173b</guid>
				<title>Rameses Quiambao started the topic Philippines–South Korea Sign $25.6M Deal for National Cyber Security Center in the forum Community &#038; Resources</title>
				<link>https://www.aspex.com.ph/?topic=philippines-south-korea-sign-25-6m-deal-for-national-cyber-security-center</link>
				<pubDate>Wed, 29 Apr 2026 05:21:02 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Philippines Strengthens Cyber Defense with $25.6M National Cyber Security Center Deal with South Korea</strong></p>
<p>The Philippines has taken a major step toward strengthening its national cyber defense capabilities following a landmark agreement with South Korea to establish a National Cyber Security Center (NCSC). The initiative is backed by a $25.6 million&hellip;<span class="activity-read-more" id="activity-read-more-87"><a href="https://www.aspex.com.ph/?topic=philippines-south-korea-sign-25-6m-deal-for-national-cyber-security-center" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">2312ce527e72a68567e8cb70515c012d</guid>
				<title>Rameses Quiambao started the topic Persistent Cyberattacks Target PH Government - DICT in the forum Advanced Persistent Threats (APTs)</title>
				<link>https://www.aspex.com.ph/?topic=dict-confirms-persistent-apt-style-cyberattacks-targeting-philippine-government</link>
				<pubDate>Mon, 27 Apr 2026 03:36:24 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>The Department of Information and Communications Technology (DICT) confirmed persistent cyberattacks targeting Philippine government agencies, particularly those under the executive branch.</p>
<p>Key points:<br />
• Attacks ongoing since 2023<br />
• Target multiple government offices including the Office of the President<br />
• Conducted by highly organ&hellip;<span class="activity-read-more" id="activity-read-more-86"><a href="https://www.aspex.com.ph/?topic=dict-confirms-persistent-apt-style-cyberattacks-targeting-philippine-government" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">6e08578f6f31f13ff329f572778a6b8a</guid>
				<title>Rameses Quiambao started the topic Cloud Threats 2026: Why Old Weaknesses Still Drive Modern Breaches in the forum Cloud &#038; Infrastructure Security</title>
				<link>https://www.aspex.com.ph/?topic=cloud-threats-2026-why-old-weaknesses-still-drive-modern-breaches</link>
				<pubDate>Thu, 23 Apr 2026 08:28:29 +0800</pubDate>

									<content:encoded><![CDATA[<p>As organizations accelerate their adoption of cloud and AI technologies, the cybersecurity landscape continues to evolve but not always in the way many expect. The Cloud Threats Retrospective 2026 by Wiz highlights a critical reality: while innovation is moving fast, attackers are still succeeding familiar, long-standing weaknesses.</p>
<p>Rather than&hellip;<span class="activity-read-more" id="activity-read-more-85"><a href="https://www.aspex.com.ph/?topic=cloud-threats-2026-why-old-weaknesses-still-drive-modern-breaches" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">80c500d882d9c71e8dab8325d72ff7f2</guid>
				<title>Rameses Quiambao started the topic What does Table-top exercise bring? in the forum Tabletop Exercises</title>
				<link>https://www.aspex.com.ph/?topic=what-does-table-top-exercise-bring</link>
				<pubDate>Thu, 23 Apr 2026 01:08:56 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>Tabletop exercises are simulated, discussion-based cybersecurity scenarios designed to test how an organization would respond to a cyber incident—without executing an actual attack.</p>
<p>They focus on:<br />
• Decision-making under pressure<br />
• Communication across teams<br />
• Validating incident response (IR) plans</p>
<p>Unlike technical testing, tableto&hellip;<span class="activity-read-more" id="activity-read-more-84"><a href="https://www.aspex.com.ph/?topic=what-does-table-top-exercise-bring" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">09fddcfd65e7a2733cc0ce7b0ad8529a</guid>
				<title>Darrel Butil started the topic Recent Malware Attacks in the Philippines (2026) in the forum Malware (Ransomware, Trojans, Spyware)</title>
				<link>https://www.aspex.com.ph/?topic=recent-malware-attacks-in-the-philippines-2026</link>
				<pubDate>Tue, 21 Apr 2026 01:59:44 +0800</pubDate>

									<content:encoded><![CDATA[<p>The Philippines is seeing a rise in malware-related cyberattacks, affecting both organizations and everyday users.</p>
<p>&#x1f50d; What’s happening?<br />
Recent incidents involve different types of malware, including:<br />
&#8211; Trojan malware – disguises itself as legitimate software to secretly access systems<br />
&#8211; Ransomware – locks files and demands payment to restore acces&hellip;<span class="activity-read-more" id="activity-read-more-83"><a href="https://www.aspex.com.ph/?topic=recent-malware-attacks-in-the-philippines-2026" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">f281e235cf74285e29bb94807e43e145</guid>
				<title>Rameses Quiambao started the topic $13.74M Hack Shuts Down Sanctioned Grinex Exchange in the forum Breach Case Studies</title>
				<link>https://www.aspex.com.ph/?topic=13-74m-hack-shuts-down-sanctioned-grinex-exchange</link>
				<pubDate>Tue, 21 Apr 2026 01:26:03 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>A sanctioned cryptocurrency exchange, Grinex, has suspended operations following a $13.74 million cyberattack, which the company claims bears hallmarks of a state-sponsored operation.</p>
<p>Key points:<br />
• Over 1 billion rubles (~$13.74M) stolen from user funds<br />
• Exchange attributes attack to foreign intelligence agencies<br />
• Incident may be linke&hellip;<span class="activity-read-more" id="activity-read-more-82"><a href="https://www.aspex.com.ph/?topic=13-74m-hack-shuts-down-sanctioned-grinex-exchange" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">ff07ada83d132e2d78aa0f6a8b7f027b</guid>
				<title>Rameses Quiambao started the topic Threats Day Bulletin Stories in the forum Zero-Day Exploits</title>
				<link>https://www.aspex.com.ph/?topic=threats-day-bulletin-stories</link>
				<pubDate>Fri, 17 Apr 2026 02:04:53 +0800</pubDate>

									<content:encoded><![CDATA[<p><img loading="lazy" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzTV_mwPjmV14aBlnHuLOX2yEZR6VGpmadgiPHtNBJV0KVNG_Oj2tnqE1cb3U9RhBXN-Mytte3jKs2n2dQwBhX2dYDETy5es4cGUkbW5bdIaV_hx8i3gWQhdaa7se1_Q8NY9t0q90EjUBNXt56_MxjT4YVV-R8D14jV3LequHu0llA84NnEK3PeU56Q54X/s1700-e365/bull-main.jpg" alt="" /></p>
<p><strong>Summary</strong></p>
<p>A weekly cybersecurity threat bulletin highlights multiple active attacks, zero-days, supply chain compromises, ransomware campaigns, and large-scale fraud operations affecting enterprises, cloud environments, browsers, and end users.</p>
<p>The report covers:<br />
• Active exploitation of legacy and new vulnerabilities<br />
• Browser-based malware cam&hellip;<span class="activity-read-more" id="activity-read-more-81"><a href="https://www.aspex.com.ph/?topic=threats-day-bulletin-stories" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">d112c0fa4214374005cf3cbc0a048791</guid>
				<title>Rameses Quiambao started the topic 100 Chrome Extensions Steals Data and Creates Backdoor in the forum Threats &#038; Attack Techniques</title>
				<link>https://www.aspex.com.ph/?topic=malicious-chrome-extensions-campaign-steals-data-and-creates-persistent-backdoor</link>
				<pubDate>Thu, 16 Apr 2026 06:33:22 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>Security researchers have identified a large-scale malicious campaign involving 108 Chrome extensions designed to steal user data, create backdoors, and inject malicious content.</p>
<p>The extensions:<br />
• Installed by over 20,000 users<br />
• Published through multiple developer accounts<br />
• Share the same command-and-control (C2) infra&hellip;<span class="activity-read-more" id="activity-read-more-80"><a href="https://www.aspex.com.ph/?topic=malicious-chrome-extensions-campaign-steals-data-and-creates-persistent-backdoor" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">82082366a2647e9336693f56c67231d0</guid>
				<title>Rameses Quiambao started the topic n8n Webhooks Abused to Deliver Malware via Phishing in the forum Phishing &#038; Social Engineering</title>
				<link>https://www.aspex.com.ph/?topic=n8n-webhooks-abused-to-deliver-malware-via-phishing</link>
				<pubDate>Thu, 16 Apr 2026 01:25:43 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>Threat actors are abusing n8n, a popular workflow automation platform, to launch phishing campaigns that deliver malware and perform device fingerprinting.</p>
<p>The abuse has been observed since October 2025, with a significant spike in activity in 2026.</p>
<p>Key points:<br />
• Attackers use trusted n8n cloud domains to bypass email security f&hellip;<span class="activity-read-more" id="activity-read-more-79"><a href="https://www.aspex.com.ph/?topic=n8n-webhooks-abused-to-deliver-malware-via-phishing" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">e90dcee39dd5ce55366b8245a1f2e996</guid>
				<title>Darrel Butil replied to the topic Unlock Your Path to Becoming a Certified CSA in the forum Training &#038; Workshops</title>
				<link>https://www.aspex.com.ph/?topic=unlock-your-path-to-becoming-a-certified-csa#post-1951</link>
				<pubDate>Wed, 15 Apr 2026 02:11:25 +0800</pubDate>

									<content:encoded><![CDATA[<p>Special thanks to &#8220;the cyber hacking hub&#8221; as they provide this</p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">fe1fc3cdd4826b0caf52d17eb4cb5677</guid>
				<title>Darrel Butil started the topic Unlock Your Path to Becoming a Certified CSA in the forum Training &#038; Workshops</title>
				<link>https://www.aspex.com.ph/?topic=unlock-your-path-to-becoming-a-certified-csa</link>
				<pubDate>Wed, 15 Apr 2026 01:59:36 +0800</pubDate>

									<content:encoded><![CDATA[<p>If you’ve been thinking about leveling up your skills and stepping into the world of CSA (Certified System Administrator or Customer Success Associate, depending on your track), there’s never been a better time to start—especially when you can do it for free.</p>
<p>Today, I’m excited to share a free video training that breaks down the essenti&hellip;<span class="activity-read-more" id="activity-read-more-77"><a href="https://www.aspex.com.ph/?topic=unlock-your-path-to-becoming-a-certified-csa" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">97ac9c99773ed66a2bf400fa3de87568</guid>
				<title>Rameses Quiambao started the topic New Google DNS Parser into Pixel 10 Modem in the forum Network Security</title>
				<link>https://www.aspex.com.ph/?topic=new-google-dns-parser-into-pixel-10-modem</link>
				<pubDate>Wed, 15 Apr 2026 01:14:48 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>Google has introduced a Rust-based DNS parser into the modem firmware of its upcoming Pixel 10 devices to improve security and reduce memory-related vulnerabilities.</p>
<p>This marks a major step in adopting memory-safe programming at a deeper system level, particularly within the cellular baseband — a traditionally high-risk attack s&hellip;<span class="activity-read-more" id="activity-read-more-76"><a href="https://www.aspex.com.ph/?topic=new-google-dns-parser-into-pixel-10-modem" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">599efea25d24afe88093c3a359582796</guid>
				<title>Rameses Quiambao started the topic CVE-2026-21643 - Fortinet SQL Injection Vulnerability in the forum CVE &#038; Patch Management</title>
				<link>https://www.aspex.com.ph/?topic=cve-2026-21643-fortinet-sql-injection-vulnerability</link>
				<pubDate>Tue, 14 Apr 2026 05:11:04 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary </strong></p>
<p>On April 7, 2026, a supply chain attack has been identified involving a malicious npm package named gemini-ai-checker, designed to steal credentials and sensitive data from AI development environments.</p>
<p>The package masqueraded as a utility for validating Google Gemini API tokens but instead deployed malware capable of credential&hellip;<span class="activity-read-more" id="activity-read-more-75"><a href="https://www.aspex.com.ph/?topic=cve-2026-21643-fortinet-sql-injection-vulnerability" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">17e89c3395177eb2058ec0255654a263</guid>
				<title>Darrel Butil started the topic Simple Cyber Risk Basics for Startups in the forum Risk Management</title>
				<link>https://www.aspex.com.ph/?topic=simple-cyber-risk-basics-for-startups</link>
				<pubDate>Tue, 14 Apr 2026 03:56:00 +0800</pubDate>

									<content:encoded><![CDATA[<p>Startups move fast—but that can make them easy targets for cyber-attacks. The good news? You don’t need to be an expert to manage risks.</p>
<p>Start by knowing what you need to protect, like customer data and important accounts. Focus on the biggest risks first—what could hurt your business the most?</p>
<p>Use simple protections: strong passwords, multi&hellip;<span class="activity-read-more" id="activity-read-more-74"><a href="https://www.aspex.com.ph/?topic=simple-cyber-risk-basics-for-startups" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">6e1ae1090e8dcece2b55ba8911a6cb32</guid>
				<title>Darrel Butil started the topic Zero Trust in 3 Simple Detection Steps in the forum Zero Trust Architecture</title>
				<link>https://www.aspex.com.ph/?topic=zero-trust-in-3-simple-detection-steps</link>
				<pubDate>Mon, 13 Apr 2026 07:28:57 +0800</pubDate>

									<content:encoded><![CDATA[<p>Zero Trust Architecture means never automatically trusting anyone—but to make it effective, detection must be simple and smart.</p>
<p>Here are the top 3 easy ways to spot threats:<br />
1. Watch for Unusual Behavior<br />
Look for actions that don’t feel normal:<br />
• Logging in at odd hours<br />
• Accessing files, they usually don’t<br />
• Sudden large downloads&hellip;<span class="activity-read-more" id="activity-read-more-73"><a href="https://www.aspex.com.ph/?topic=zero-trust-in-3-simple-detection-steps" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">6b6810139e8bd2c8266815eac0ab2321</guid>
				<title>Rameses Quiambao started the topic Adobe Acrobat CVE-2026-34621 Actively Exploited in the forum CVE &#038; Patch Management</title>
				<link>https://www.aspex.com.ph/?topic=adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621</link>
				<pubDate>Mon, 13 Apr 2026 03:00:13 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>On April 7, 2026, a supply chain attack has been identified involving a malicious npm package named gemini-ai-checker, designed to steal credentials and sensitive data from AI development environments.</p>
<p>The package masqueraded as a utility for validating Google Gemini API tokens but instead deployed malware capable of credential&hellip;<span class="activity-read-more" id="activity-read-more-72"><a href="https://www.aspex.com.ph/?topic=adobe-patches-actively-exploited-acrobat-reader-flaw-cve-2026-34621" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">d6ac0db4619bda9b522cc1bedaa21cdd</guid>
				<title>Joseph Malibiran wrote a new post</title>
				<link>https://www.aspex.com.ph/?p=1864</link>
				<pubDate>Wed, 08 Apr 2026 05:20:41 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong><a href="https://www.aspex.com.ph/?p=1864" rel="nofollow ugc">Cybersecurity Compliance in the Philippines Explained</a></strong><a href="https://www.aspex.com.ph/?p=1864" rel="nofollow ugc"><img loading="lazy" src="https://www.aspex.com.ph/wp-content/uploads/2026/02/Digital-Forensics2-300x155.png" /></a> As digital transformation accelerates across industries, cybersecurity compliance has become a business-critical requirement for organizations operating <a href="https://www.aspex.com.ph/?p=1864" rel="nofollow ugc"><span>[&hellip;]</span></a></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">d626c130c27832de684c681ae052bf63</guid>
				<title>Darrel Butil started the topic A Simple Guide for Beginners in the forum Threat Hunting Techniques</title>
				<link>https://www.aspex.com.ph/?topic=a-simple-guide-for-beginners</link>
				<pubDate>Wed, 08 Apr 2026 04:24:59 +0800</pubDate>

									<content:encoded><![CDATA[<p>Threat hunting is the proactive process of searching for hidden cyber threats that evade traditional security tools. Instead of waiting for alerts, analysts actively look for suspicious behavior within systems.</p>
<p>&#x1f9e0; What Makes Threat Hunting Important?</p>
<p>Modern attacks are often stealthy. Threat hunting helps detect attackers who may already be&hellip;<span class="activity-read-more" id="activity-read-more-70"><a href="https://www.aspex.com.ph/?topic=a-simple-guide-for-beginners" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">e39516de1e2579708e17ecad912875e4</guid>
				<title>Rameses Quiambao started the topic Fake Gemini npm Package Targets AI Developers in New Supply Chain Attack in the forum Latest Cybersecurity News &#038; Trends</title>
				<link>https://www.aspex.com.ph/?topic=fake-gemini-npm-package-targets-ai-developers-in-new-supply-chain-attack</link>
				<pubDate>Wed, 08 Apr 2026 02:36:11 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>On April 7, 2026, a supply chain attack has been identified involving a malicious npm package named gemini-ai-checker, designed to steal credentials and sensitive data from AI development environments.</p>
<p>The package masqueraded as a utility for validating Google Gemini API tokens but instead deployed malware capable of credential&hellip;<span class="activity-read-more" id="activity-read-more-69"><a href="https://www.aspex.com.ph/?topic=fake-gemini-npm-package-targets-ai-developers-in-new-supply-chain-attack" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">7d21fa4d9f7312bc64aad4647cdf5036</guid>
				<title>Rameses Quiambao started the topic Critical React2Shell Flaw Actively Exploited to Breach 766 Hosts in the forum CVE &#038; Patch Management</title>
				<link>https://www.aspex.com.ph/?topic=critical-react2shell-flaw-actively-exploited-to-breach-766-hosts</link>
				<pubDate>Wed, 08 Apr 2026 01:06:56 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>On April 7, 2026, a large-scale exploitation campaign targeting Next.js applications have been observed, leveraging the critical React2Shell vulnerability.</p>
<p>The vulnerabilities:<br />
• CVE-2025-55182 (React2Shell)<br />
• CVE-2025-66478 (Next.js related exposure)</p>
<p>The flaw allows unauthenticated remote code execution (RCE) via a crafted HTT&hellip;<span class="activity-read-more" id="activity-read-more-68"><a href="https://www.aspex.com.ph/?topic=critical-react2shell-flaw-actively-exploited-to-breach-766-hosts" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">bb792cdeca67567bcb16a79af63f3007</guid>
				<title>Darrel Butil started the topic A Practical Starter Guide in the forum Building a SOC from Scratch</title>
				<link>https://www.aspex.com.ph/?topic=building-a-security-operations-center-soc-from-scratch-a-practical-starter-gu</link>
				<pubDate>Tue, 07 Apr 2026 04:58:48 +0800</pubDate>

									<content:encoded><![CDATA[<p>Starting a Security Operations Center (SOC) from the ground up can feel overwhelming, but with the right structure and priorities, you can build a capable and scalable defense hub for your organization.</p>
<p>1. Define Your Mission and Scope<br />
Begin by identifying what your SOC is protecting and why. Clarify business objectives, compliance&hellip;<span class="activity-read-more" id="activity-read-more-67"><a href="https://www.aspex.com.ph/?topic=building-a-security-operations-center-soc-from-scratch-a-practical-starter-gu" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">2e6a1399dcb8d2320ec2336ae3d9d178</guid>
				<title>Rameses Quiambao started the topic ChatGPT Vulnerability Exposed Silent Data Exfiltration via DNS Tunneling in the forum Latest Cybersecurity News &#038; Trends</title>
				<link>https://www.aspex.com.ph/?topic=chatgpt-vulnerability-exposed-silent-data-exfiltration-via-dns-tunneling</link>
				<pubDate>Mon, 06 Apr 2026 03:02:29 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>On March 30, 2026, Check Point Research (CPR) disclosed a critical vulnerability in ChatGPT’s code execution environment that allowed for silent data exfiltration.<br />
The flaw leveraged a hidden outbound communication channel (DNS tunneling) to bypass OpenAI’s sandboxing, allowing sensitive user data including uploaded files and chat his&hellip;<span class="activity-read-more" id="activity-read-more-66"><a href="https://www.aspex.com.ph/?topic=chatgpt-vulnerability-exposed-silent-data-exfiltration-via-dns-tunneling" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">da5284c6441ae7f319a5e6624b8b7238</guid>
				<title>Darrel Butil started the topic Hack Yourself First: Website Penetration Testing Guide in the forum Web App Security Testing</title>
				<link>https://www.aspex.com.ph/?topic=hack-yourself-first-a-practical-guide-to-pentesting-your-own-website</link>
				<pubDate>Wed, 01 Apr 2026 04:53:06 +0800</pubDate>

									<content:encoded><![CDATA[<p>One of the most proactive measures you can take to improve your security posture is penetration testing, or pentesting, your own website. Consider it morally &#8220;hacking yourself&#8221; before someone else does.</p>
<p>Why Do You Pentest Your Website?<br />
Attacks such as SQL injection, cross-site scripting (XSS), and authentication bypass frequently target&hellip;<span class="activity-read-more" id="activity-read-more-65"><a href="https://www.aspex.com.ph/?topic=hack-yourself-first-a-practical-guide-to-pentesting-your-own-website" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">100a89afca9bfd35241aaeb3c3594124</guid>
				<title>Rameses Quiambao started the topic Axios NPM Supply Chain Compromise in the forum Malware (Ransomware, Trojans, Spyware)</title>
				<link>https://www.aspex.com.ph/?topic=axios-npm-supply-chain-compromise</link>
				<pubDate>Wed, 01 Apr 2026 02:34:13 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>On March 31, 2026, a critical supply chain attack has been identified involving the widely used JavaScript library axios, where malicious packages were introduced into the NPM ecosystem.</p>
<p>The compromise allowed attackers to deploy a remote access trojan (RAT) capable of stealing credentials and maintaining persistent access across&hellip;<span class="activity-read-more" id="activity-read-more-64"><a href="https://www.aspex.com.ph/?topic=axios-npm-supply-chain-compromise" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">6b5a9de28d5e8e451ec45c36c0a1bfbb</guid>
				<title>Darrel Butil started the topic What to Do When the Worst Happens in the forum Ransomware Recovery Strategies</title>
				<link>https://www.aspex.com.ph/?topic=what-to-do-when-the-worst-happens</link>
				<pubDate>Tue, 31 Mar 2026 04:32:48 +0800</pubDate>

									<content:encoded><![CDATA[<p>Attacks using ransomware have the ability to stop operations in a matter of minutes. In my experience as a cybersecurity analyst, responding swiftly and meticulously can make the difference between chaos and recovery. This is a quick way to recovering from ransomware.</p>
<p>1. Isolate Right Away<br />
Disconnect impacted systems from the network as soon&hellip;<span class="activity-read-more" id="activity-read-more-63"><a href="https://www.aspex.com.ph/?topic=what-to-do-when-the-worst-happens" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">d5cc630129dc3d71811144d81287a0bc</guid>
				<title>Anthony Borbe started the topic Cybersecurity Reminder About the Data Privacy Act in the forum Data Privacy Act (Philippines)</title>
				<link>https://www.aspex.com.ph/?topic=cybersecurity-reminder-about-the-data-privacy-act</link>
				<pubDate>Tue, 31 Mar 2026 04:29:15 +0800</pubDate>

									<content:encoded><![CDATA[<p>If you’re working in cybersecurity, the Data Privacy Act of 2012 is something you should always remember. It’s not just about compliance it directly affects how we protect and handle personal data every day. From monitoring alerts to responding to incidents, there’s always a chance that sensitive information is involved, and it’s our respons&hellip;<span class="activity-read-more" id="activity-read-more-62"><a href="https://www.aspex.com.ph/?topic=cybersecurity-reminder-about-the-data-privacy-act" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">0d8d8427730f6fe8af0bccd92e6e091f</guid>
				<title>Rameses Quiambao started the topic CVE-2026-3055 Citrix NetScaler Out-of-Bounds Read Vulnerability in the forum CVE &#038; Patch Management</title>
				<link>https://www.aspex.com.ph/?topic=cve-2026-3055-citrix-netscaler-out-of-bounds-read-vulnerability</link>
				<pubDate>Tue, 31 Mar 2026 02:10:06 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>March 30, 2026, the Cybersecurity and Infrastructure Security Agency (CISA) has added a new vulnerability to its Known Exploited Vulnerabilities (KEV) Catalog due to confirmed active exploitation.</p>
<p>The vulnerability added:<br />
• CVE-2026-3055 – Citrix NetScaler Out-of-Bounds Read Vulnerability</p>
<p>CISA warns that this type of vul&hellip;<span class="activity-read-more" id="activity-read-more-61"><a href="https://www.aspex.com.ph/?topic=cve-2026-3055-citrix-netscaler-out-of-bounds-read-vulnerability" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">80a198af8e487d84366d13d5dcbef66e</guid>
				<title>Anthony Borbe started the topic NIST Cybersecurity Framework for Incident Response in the forum NIST Framework</title>
				<link>https://www.aspex.com.ph/?topic=leveraging-the-nist-cybersecurity-framework-for-effective-incident-response</link>
				<pubDate>Mon, 30 Mar 2026 09:08:16 +0800</pubDate>

									<content:encoded><![CDATA[<p>I’ve seen firsthand how a structured approach can make a critical difference during security incidents. One framework that consistently proves its value is the NIST Cybersecurity Framework.</p>
<p>Recently, an organization faced a phishing attack that compromised several employee accounts. Because our incident response program was aligned with NIST C&hellip;<span class="activity-read-more" id="activity-read-more-60"><a href="https://www.aspex.com.ph/?topic=leveraging-the-nist-cybersecurity-framework-for-effective-incident-response" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">6f803cd4f663e66ad8107728a4bc3eb6</guid>
				<title>Jun Amoroto started the topic How to Become a VAPT Professional: Roadmap &#038; Certifications in the forum Career Advice &#038; Certifications</title>
				<link>https://www.aspex.com.ph/?topic=how-to-become-a-vapt-professional-career-roadmap-certifications</link>
				<pubDate>Mon, 30 Mar 2026 08:52:11 +0800</pubDate>

									<content:encoded><![CDATA[<p>Becoming a VAPT (Vulnerability Assessment and Penetration Testing) professional means building strong skills in cybersecurity, networking, and ethical hacking. Here’s a clear, realistic roadmap you can follow—from beginner to job-ready.</p>
<p>&#x1f9ed; 1. Understand What VAPT Is<br />
VAPT combines:<br />
Vulnerability Assessment → Finding weakn&hellip;<span class="activity-read-more" id="activity-read-more-59"><a href="https://www.aspex.com.ph/?topic=how-to-become-a-vapt-professional-career-roadmap-certifications" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">be5b4a3919053434c09558e6959b6f0f</guid>
				<title>Darrel Butil started the topic Cybersecurity Pause: Holy Week 2026 in the forum Cybersecurity in the Philippines</title>
				<link>https://www.aspex.com.ph/?topic=cybersecurity-pause-holy-week-202</link>
				<pubDate>Mon, 30 Mar 2026 08:20:57 +0800</pubDate>

									<content:encoded><![CDATA[<p>Holy Week in the Philippines is a unique pause—streets quiet down, inboxes slow, and even the digital noise seems to soften. For cybersecurity professionals, this isn’t just a break; it’s an opportunity to recalibrate both personally and professionally.<br />
Here’s how a cybersecurity analyst can make the most of Holy Week 2026:</p>
<p>1. Disconn&hellip;<span class="activity-read-more" id="activity-read-more-58"><a href="https://www.aspex.com.ph/?topic=cybersecurity-pause-holy-week-202" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">7f03d987fda770c342b08d1802402f5b</guid>
				<title>Rameses Quiambao started the topic DPWH ransomware attack linked to Bashe group (APT73) in the forum Malware (Ransomware, Trojans, Spyware)</title>
				<link>https://www.aspex.com.ph/?topic=dpwh-ransomware-incident-attributed-to-the-bashe-ransomware-group-apt73</link>
				<pubDate>Mon, 30 Mar 2026 03:51:06 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>On March 29, 2026, the Department of Public Works and Highways (DPWH) ransomware incident has escalated following partial data leaks attributed to the Bashe Ransomware group (APT73).</p>
<p>The threat actor claimed to have exfiltrated approximately 50GB of data, with an initial 1.77GB sample already released and analyzed.</p>
<p>Initial&hellip;<span class="activity-read-more" id="activity-read-more-57"><a href="https://www.aspex.com.ph/?topic=dpwh-ransomware-incident-attributed-to-the-bashe-ransomware-group-apt73" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">ddd3400e24040be8a51d82191ce11319</guid>
				<title>Joseph Malibiran wrote a new post</title>
				<link>https://www.aspex.com.ph/?p=1840</link>
				<pubDate>Mon, 30 Mar 2026 03:17:56 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong><a href="https://www.aspex.com.ph/?p=1840" rel="nofollow ugc">Why Cyber Incidents Are Still Detected Too Late</a></strong><a href="https://www.aspex.com.ph/?p=1840" rel="nofollow ugc"><img loading="lazy" src="https://www.aspex.com.ph/wp-content/uploads/2026/03/pixabay-4610993-300x200.jpg" /></a> Despite billions invested in cybersecurity tools, many organizations still detect cyber incidents far too late — often weeks or even months after the i <a href="https://www.aspex.com.ph/?p=1840" rel="nofollow ugc"><span>[&hellip;]</span></a></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">749bab62590e99a64661980906f804a6</guid>
				<title>Rameses Quiambao started the topic Kali Linux 2026.1 8 New Hacking Tools Released in the forum Vulnerability Management &#038; Pentesting</title>
				<link>https://www.aspex.com.ph/?topic=kali-linux-2026-1-8-new-hacking-tools-released</link>
				<pubDate>Wed, 25 Mar 2026 05:28:29 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>On March 25, 2026, Kali Linux released version 2026.1, marking the first major update of the year for the widely used penetration testing distribution.</p>
<p>The update introduces 8 new security tools, major system improvements, and enhancements in mobile penetration testing capabilities.</p>
<p>Key updates include:<br />
• Linux kernel upgraded t&hellip;<span class="activity-read-more" id="activity-read-more-55"><a href="https://www.aspex.com.ph/?topic=kali-linux-2026-1-8-new-hacking-tools-released" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">97e835b963d02532b4d0b6349711913a</guid>
				<title>Rameses Quiambao started the topic Over 511,000 Outdated Microsoft IIS Servers Exposed Online in the forum Latest Cybersecurity News &#038; Trends</title>
				<link>https://www.aspex.com.ph/?topic=over-511000-outdated-microsoft-iis-servers-exposed-online</link>
				<pubDate>Tue, 24 Mar 2026 05:22:33 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>On March 23, 2026, Shadowserver’s daily network scans revealed over 511,000 End-of-Life (EOL) Microsoft Internet Information Services (IIS) instances actively exposed on the internet.</p>
<p>The exposed servers:<br />
• Include more than 227,000 servers beyond the Microsoft Extended Security Updates (ESU) period.<br />
• Are geographically conce&hellip;<span class="activity-read-more" id="activity-read-more-54"><a href="https://www.aspex.com.ph/?topic=over-511000-outdated-microsoft-iis-servers-exposed-online" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">a911700460f0c113a602ffdd6e3dcf0a</guid>
				<title>Rameses Quiambao started the topic Windows 11 Emergency Update Fixes Microsoft Account Sign-In Issue in the forum Crisis Communication</title>
				<link>https://www.aspex.com.ph/?topic=windows-11-emergency-update-fixes-microsoft-account-sign-in-issue</link>
				<pubDate>Mon, 23 Mar 2026 07:21:13 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>On March 21, 2026, Microsoft released an emergency out-of-band (OOB) update for Windows 11 to fix a critical Microsoft account sign-in failure introduced by the March 2026 Patch Tuesday update.</p>
<p>The issue affected users who installed the cumulative update KB5079473, preventing them from signing into Microsoft services due to a false&hellip;<span class="activity-read-more" id="activity-read-more-53"><a href="https://www.aspex.com.ph/?topic=windows-11-emergency-update-fixes-microsoft-account-sign-in-issue" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">3d8a4b240759b8709bf7454d22592d73</guid>
				<title>Rameses Quiambao started the topic Signed Malware Masquerading as Teams, Zoom Apps Drops RMM Backdoors in the forum Phishing &#038; Social Engineering</title>
				<link>https://www.aspex.com.ph/?topic=signed-malware-masquerading-as-teams-zoom-apps-drops-rmm-backdoors</link>
				<pubDate>Tue, 10 Mar 2026 07:06:03 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>Security researchers uncovered a phishing campaign distributing digitally signed malware disguised as legitimate workplace applications such as Microsoft Teams, Zoom, and Adobe Acrobat Reader.</p>
<p>The attackers used valid Extended Validation (EV) code-signing certificates to make the malicious executables appear legitimate, helping them&hellip;<span class="activity-read-more" id="activity-read-more-52"><a href="https://www.aspex.com.ph/?topic=signed-malware-masquerading-as-teams-zoom-apps-drops-rmm-backdoors" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">2ff333410e6d0286b05318ca5c0534d4</guid>
				<title>Rameses Quiambao started the topic LexisNexis confirms data breach as hackers leak stolen files in the forum Breach Case Studies</title>
				<link>https://www.aspex.com.ph/?topic=lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files</link>
				<pubDate>Thu, 05 Mar 2026 08:41:48 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>LexisNexis Legal &amp; Professional confirmed that threat actors breached its servers and accessed customer and business information after attackers leaked approximately 2GB of stolen data on underground forums.</p>
<p>The breach reportedly involved unauthorized access to several internal servers containing legacy and deprecated data, primarily&hellip;<span class="activity-read-more" id="activity-read-more-51"><a href="https://www.aspex.com.ph/?topic=lexisnexis-confirms-data-breach-as-hackers-leak-stolen-files" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">88999785c4e09dadceeec1377f99a316</guid>
				<title>Alpert Sebastian started the topic CVE &#038; Patch Management — Managing Vulnerabilities Effectively in the forum CVE &#038; Patch Management</title>
				<link>https://www.aspex.com.ph/?topic=cve-patch-management-managing-vulnerabilities-effectively</link>
				<pubDate>Thu, 05 Mar 2026 08:41:31 +0800</pubDate>

									<content:encoded><![CDATA[<p>Summary</p>
<p>CVE and patch management are important practices for identifying and fixing security vulnerabilities in systems and software. A Common Vulnerabilities and Exposures (CVE) is a publicly known security flaw that attackers may exploit. Patch management ensures that security updates are applied quickly to protect systems from these&hellip;<span class="activity-read-more" id="activity-read-more-50"><a href="https://www.aspex.com.ph/?topic=cve-patch-management-managing-vulnerabilities-effectively" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">d3daf85b208c5d8ee6c49927e591d6f5</guid>
				<title>Darrel Butil started the topic Public Awareness: Cyberattacks on Iranian Apps and Websites in the forum Latest Cybersecurity News &#038; Trends</title>
				<link>https://www.aspex.com.ph/?topic=public-awareness-cyberattacks-on-iranian-apps-and-websites</link>
				<pubDate>Thu, 05 Mar 2026 04:26:04 +0800</pubDate>

									<content:encoded><![CDATA[<p>Recently, reports showed that hackers targeted several Iranian apps and websites following military strikes involving the United States and Israel. These cyber incidents show how global conflicts can also spread into the digital world. Instead of only fighting on the battlefield, attackers may try to disrupt online services or spread messages&hellip;<span class="activity-read-more" id="activity-read-more-49"><a href="https://www.aspex.com.ph/?topic=public-awareness-cyberattacks-on-iranian-apps-and-websites" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">5411ea8833df410ea9a5340c1d42945c</guid>
				<title>Rameses Quiambao started the topic MC1239187 - Defender for Office 365 URL click alerts now include Microsoft Teams in the forum SIEM &#038; XDR Discussions</title>
				<link>https://www.aspex.com.ph/?topic=mc1239187-defender-for-office-365-url-click-alerts-now-include-microsoft-teams</link>
				<pubDate>Wed, 04 Mar 2026 08:34:12 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>On February 26, 2026, Microsoft Defender for Office 365 (MDO) URL click alerts will now include Microsoft Teams messages. This update allows security teams to detect and investigate malicious link clicks in Teams, extending visibility beyond email without affecting user workflows.</p>
<p>Feature Rollout Timeline:</p>
<p>• Public Preview (&hellip;<span class="activity-read-more" id="activity-read-more-48"><a href="https://www.aspex.com.ph/?topic=mc1239187-defender-for-office-365-url-click-alerts-now-include-microsoft-teams" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">8ec9fb0012582c3bf0eed3aa91955a61</guid>
				<title>Rameses Quiambao started the topic Microsoft AI-Powered Sentinel Playbook Generator for Next-Gen SOC Automation in the forum Automation &#038; SOAR</title>
				<link>https://www.aspex.com.ph/?topic=microsoft-ai-powered-sentinel-playbook-generator-for-next-gen-soc-automation</link>
				<pubDate>Tue, 03 Mar 2026 09:40:48 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>On February 23, 2026, Microsoft has unveiled the Sentinel playbook generator, a new automation capability designed to revolutionize SOC automation by allowing teams to create fully functional Sentinel playbooks using natural language descriptions rather than hand-coded workflows. This marks the first milestone in Microsoft’s n&hellip;<span class="activity-read-more" id="activity-read-more-47"><a href="https://www.aspex.com.ph/?topic=microsoft-ai-powered-sentinel-playbook-generator-for-next-gen-soc-automation" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">f1826c2733b10402ebd6bb2b3e2f4245</guid>
				<title>Anthony Borbe started the topic Red vs Blue — It’s Really Red and Blue vs Threats in the forum Red Team vs Blue Team</title>
				<link>https://www.aspex.com.ph/?topic=red-vs-blue-its-really-red-and-blue-vs-threats</link>
				<pubDate>Tue, 03 Mar 2026 09:40:43 +0800</pubDate>

									<content:encoded><![CDATA[<p>In cybersecurity discussions, we often hear Red Team vs Blue Team. But in reality, it’s less about competition and more about strengthening defenses through collaboration.</p>
<p><strong>Red Team</strong> – Simulates real-world attackers. They perform adversary emulation, penetration testing, and advanced attack simulations to identify security gaps before actual thr&hellip;<span class="activity-read-more" id="activity-read-more-46"><a href="https://www.aspex.com.ph/?topic=red-vs-blue-its-really-red-and-blue-vs-threats" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">e272b3fca6047030bd188c1c98cc6724</guid>
				<title>Alpert Sebastian started the topic GCash Scams: What’s Happening and How to Stay Safe in the forum Latest Cybersecurity News &#038; Trends</title>
				<link>https://www.aspex.com.ph/?topic=gcash-scams-whats-happening-and-how-to-stay-safe</link>
				<pubDate>Fri, 27 Feb 2026 07:17:44 +0800</pubDate>

									<content:encoded><![CDATA[<p>With the rise of digital payments in the Philippines, GCash has become a daily tool for many Filipinos. Unfortunately, scammers are also taking advantage of its popularity.</p>
<p>Common GCash Scams to Watch Out For<br />
• Phishing links via SMS, email, or social media pretending to be GCash<br />
• Fake promos or giveaways asking you to click a link or sen&hellip;<span class="activity-read-more" id="activity-read-more-45"><a href="https://www.aspex.com.ph/?topic=gcash-scams-whats-happening-and-how-to-stay-safe" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">96c99f1d043e16657eb1c085729f2883</guid>
				<title>Svepllana RJ Calestre replied to the topic What are the benefits of being a VAPT Analyst? in the forum VAPT Discussions</title>
				<link>https://www.aspex.com.ph/?topic=what-are-the-benefits-of-being-a-vapt-analyst#post-1760</link>
				<pubDate>Fri, 27 Feb 2026 06:34:03 +0800</pubDate>

									<content:encoded><![CDATA[<p>One key question for organizations is how often should VAPT be conducted? wherein security isn’t a one-time task, it’s an ongoing effort. Systems constantly evolve through updates, new integrations, and configuration changes, each of which can introduce new vulnerabilities. That’s why regular testing, especially after major updates or infra&hellip;<span class="activity-read-more" id="activity-read-more-44"><a href="https://www.aspex.com.ph/?topic=what-are-the-benefits-of-being-a-vapt-analyst#post-1760" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">5c6c844cf16f4be0ab8adaf068bd8917</guid>
				<title>Darrel Butil replied to the topic Chrome 145 Fixes 11 Bugs in the forum VAPT Discussions</title>
				<link>https://www.aspex.com.ph/?topic=chrome-145-fixes-11-bugs#post-1758</link>
				<pubDate>Fri, 27 Feb 2026 06:18:58 +0800</pubDate>

									<content:encoded><![CDATA[<p>Recommended update timeline<br />
• Ideally within 24–72 hours of release for internet-facing systems and high-risk users (admins, finance, executives).<br />
• No later than 7 days in most enterprise environments.<br />
• If there is confirmed active exploitation, rollout should be immediate (same day or next day).<br />
Since Google mentioned there’s no evidence&hellip;<span class="activity-read-more" id="activity-read-more-43"><a href="https://www.aspex.com.ph/?topic=chrome-145-fixes-11-bugs#post-1758" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">bc85af04c6d08de6acdb69dcbfb67027</guid>
				<title>Alpert Sebastian replied to the topic Chrome 145 Fixes 11 Bugs in the forum VAPT Discussions</title>
				<link>https://www.aspex.com.ph/?topic=chrome-145-fixes-11-bugs#post-1757</link>
				<pubDate>Fri, 27 Feb 2026 05:44:57 +0800</pubDate>

									<content:encoded><![CDATA[<p>Given the high-severity memory corruption flaws fixed in Google Chrome 145, what is the recommended update timeline for enterprise environments, and are there any additional mitigations advised for systems that cannot be patched immediately?</p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">2b51389c6db74c118c36707655c33ba4</guid>
				<title>Darrel Butil started the topic Start Smart: Digital Forensics Analysts&#039; Beginning Advice in the forum Digital Forensics</title>
				<link>https://www.aspex.com.ph/?topic=start-smart-digital-forensics-analysts-beginning-advice</link>
				<pubDate>Fri, 27 Feb 2026 03:54:21 +0800</pubDate>

									<content:encoded><![CDATA[<p>It&#8217;s thrilling and difficult to enter the field of digital forensics. Law enforcement, private companies, and corporate security teams are all in more need of qualified analysts as cybercrime continues to change. Here are some useful, fundamental pointers to help you gain expertise and confidence in the subject if you&#8217;re just getting&hellip;<span class="activity-read-more" id="activity-read-more-41"><a href="https://www.aspex.com.ph/?topic=start-smart-digital-forensics-analysts-beginning-advice" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">41f0aa0c3b813623533d6c8ffabee07a</guid>
				<title>Rameses Quiambao started the topic Critical Cisco SD‑WAN Zero‑Day Vulnerability Actively Exploited Since 2023 in the forum Zero-Day Exploits</title>
				<link>https://www.aspex.com.ph/?topic=critical-cisco-sd-wan-zero-day-vulnerability-actively-exploited-since-2023</link>
				<pubDate>Fri, 27 Feb 2026 02:53:45 +0800</pubDate>

									<content:encoded><![CDATA[<p><strong>Summary</strong></p>
<p>On February 26, 2026, Cisco disclosed a critical zero‑day vulnerability in its Catalyst SD‑WAN products that has been actively exploited in the wild since at least 2023 by a sophisticated threat actor. The flaw allows unauthenticated attackers to bypass authentication controls and gain administrative access to SD‑WAN contr&hellip;<span class="activity-read-more" id="activity-read-more-39"><a href="https://www.aspex.com.ph/?topic=critical-cisco-sd-wan-zero-day-vulnerability-actively-exploited-since-2023" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">b196b8d0def81b9b9764ef365e83ac62</guid>
				<title>Alpert Sebastian replied to the topic How to Become a SOC Analyst: Career Roadmap &#038; Certifications in the forum Career Advice &#038; Certifications</title>
				<link>https://www.aspex.com.ph/?topic=how-to-become-a-soc-analyst-career-roadmap-certifications#post-1752</link>
				<pubDate>Fri, 27 Feb 2026 02:52:45 +0800</pubDate>

									<content:encoded><![CDATA[<p>This is a great and realistic guide for anyone interested in becoming a SOC Analyst. You clearly explain what the role involves and what skills actually matter on the job.</p>
<p>I like that you focus on hands-on experience, not just certifications. Labs, log analysis, and real practice are what truly prepare someone for a SOC role. The suggestion to&hellip;<span class="activity-read-more" id="activity-read-more-38"><a href="https://www.aspex.com.ph/?topic=how-to-become-a-soc-analyst-career-roadmap-certifications#post-1752" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
					<item>
				<guid isPermaLink="false">09de32567467b06ae685f7d9e2646621</guid>
				<title>Alpert Sebastian replied to the topic Chinese group (UNC6201) exploited a zero-day vulnerability in Dell RecoveryPoint in the forum Advanced Persistent Threats (APTs)</title>
				<link>https://www.aspex.com.ph/?topic=chinese-group-unc6201-exploited-a-zero-day-vulnerability-in-dell-recoverypoint#post-1750</link>
				<pubDate>Fri, 27 Feb 2026 02:24:49 +0800</pubDate>

									<content:encoded><![CDATA[<p>This article shows how attackers can take advantage of vulnerabilities in backup systems like Dell RecoverPoint for Virtual Machines. The issue allowed unauthorized access and long-term persistence, which is especially risky since these systems are often not closely monitored.</p>
<p>Organizations using affected versions should patch immediately and&hellip;<span class="activity-read-more" id="activity-read-more-37"><a href="https://www.aspex.com.ph/?topic=chinese-group-unc6201-exploited-a-zero-day-vulnerability-in-dell-recoverypoint#post-1750" rel="nofollow ugc">Read more</a></span></p>
]]></content:encoded>
				
				
							</item>
		
	</channel>
</rss>