<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>Updates on Williams Consulting, Inc.</title>
    <link>https://wci-website.pages.dev/updates/</link>
    <description>Recent content in Updates on Williams Consulting, Inc.</description>
    <generator>Hugo -- 0.152.2</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 03 Mar 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://wci-website.pages.dev/updates/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations</title>
      <link>https://wci-website.pages.dev/updates/fake-tech-support-spam-deploys-havoc-c2/</link>
      <pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://wci-website.pages.dev/updates/fake-tech-support-spam-deploys-havoc-c2/</guid>
      <description>Attackers flood inboxes with spam, then call victims posing as IT support to deliver the Havoc command-and-control framework via DLL sideloading and social engineering.</description>
    </item>
    <item>
      <title>Vibe-Coded Spam: AI Tools Are Making Phishing Emails Harder to Spot</title>
      <link>https://wci-website.pages.dev/updates/vibe-coded-spam-ai-phishing-emails/</link>
      <pubDate>Wed, 25 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://wci-website.pages.dev/updates/vibe-coded-spam-ai-phishing-emails/</guid>
      <description>AI-assisted &amp;ldquo;vibe coding&amp;rdquo; now lets spammers produce polished, visually convincing phishing emails with almost no technical skill — making traditional red flags like poor formatting far less reliable.</description>
    </item>
    <item>
      <title>Starkiller Phishing-as-a-Service Platform Proxies Real Login Pages to Bypass MFA</title>
      <link>https://wci-website.pages.dev/updates/starkiller-phishing-service-proxies-login-pages-mfa/</link>
      <pubDate>Sat, 21 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://wci-website.pages.dev/updates/starkiller-phishing-service-proxies-login-pages-mfa/</guid>
      <description>A new phishing platform called Starkiller loads legitimate login pages through headless browsers, intercepting credentials and session tokens in real time to defeat MFA.</description>
    </item>
    <item>
      <title>ShinyHunters Gang Targets Microsoft Entra Accounts with Device Code Vishing Attacks</title>
      <link>https://wci-website.pages.dev/updates/shinyhunters-device-code-vishing-microsoft-entra/</link>
      <pubDate>Thu, 19 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://wci-website.pages.dev/updates/shinyhunters-device-code-vishing-microsoft-entra/</guid>
      <description>The ShinyHunters extortion gang is combining voice phishing with OAuth device code flows to hijack Microsoft Entra accounts and bypass MFA.</description>
    </item>
    <item>
      <title>CISA Flags Four Actively Exploited Vulnerabilities — Including a Chrome Zero-Day</title>
      <link>https://wci-website.pages.dev/updates/cisa-kev-four-flaws-february-2026/</link>
      <pubDate>Wed, 18 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://wci-website.pages.dev/updates/cisa-kev-four-flaws-february-2026/</guid>
      <description>CISA added four flaws to its Known Exploited Vulnerabilities catalog. A Chrome use-after-free and a critical Zimbra SSRF top the list. Patch now.</description>
    </item>
    <item>
      <title>Citizen Lab: Cellebrite Used to Extract Data from Kenyan Activist&#39;s Phone in Police Custody</title>
      <link>https://wci-website.pages.dev/updates/cellebrite-kenyan-activist-citizen-lab/</link>
      <pubDate>Wed, 18 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://wci-website.pages.dev/updates/cellebrite-kenyan-activist-citizen-lab/</guid>
      <description>Citizen Lab found forensic extraction indicators on a seized Samsung phone belonging to a Kenyan pro-democracy activist. The case adds to a growing pattern of surveillance tool misuse.</description>
    </item>
    <item>
      <title>Microsoft Copilot Bug Summarized Confidential Emails Despite DLP Policies</title>
      <link>https://wci-website.pages.dev/updates/copilot-bug-confidential-emails/</link>
      <pubDate>Wed, 18 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://wci-website.pages.dev/updates/copilot-bug-confidential-emails/</guid>
      <description>A code bug let Microsoft 365 Copilot read and summarize emails marked confidential — bypassing sensitivity labels and DLP policies since late January.</description>
    </item>
    <item>
      <title>Bitwarden Adds Free Shared Vaults for Two Users</title>
      <link>https://wci-website.pages.dev/updates/bitwarden-cupid-vault-password-sharing/</link>
      <pubDate>Thu, 12 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://wci-website.pages.dev/updates/bitwarden-cupid-vault-password-sharing/</guid>
      <description>Bitwarden&amp;rsquo;s new Cupid Vault feature lets free-tier users securely share credentials with one other person — no more texting passwords.</description>
    </item>
    <item>
      <title>Patch Tuesday: February 2026 — Six Zero-Days Already Under Attack</title>
      <link>https://wci-website.pages.dev/updates/patch-tuesday-february-2026/</link>
      <pubDate>Tue, 10 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://wci-website.pages.dev/updates/patch-tuesday-february-2026/</guid>
      <description>Microsoft&amp;rsquo;s February patch batch fixes 50+ vulnerabilities, including six zero-days actively exploited in the wild. Patch now.</description>
    </item>
    <item>
      <title>AI Makes the Easy Part Easier and the Hard Part Harder</title>
      <link>https://wci-website.pages.dev/updates/ai-easy-part-easier-hard-part-harder/</link>
      <pubDate>Mon, 09 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://wci-website.pages.dev/updates/ai-easy-part-easier-hard-part-harder/</guid>
      <description>A developer&amp;rsquo;s take on the real tradeoff with AI coding tools: writing code was never the hard part, and skipping it makes the hard parts — reading, reviewing, and understanding — even harder.</description>
    </item>
    <item>
      <title>RFC 3092: The Etymology of Foo</title>
      <link>https://wci-website.pages.dev/updates/rfc-3092-etymology-of-foo/</link>
      <pubDate>Mon, 09 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://wci-website.pages.dev/updates/rfc-3092-etymology-of-foo/</guid>
      <description>An April Fools&amp;rsquo; RFC that traces the surprisingly deep history of &amp;lsquo;foo,&amp;rsquo; &amp;lsquo;bar,&amp;rsquo; and the other placeholder names every programmer uses without thinking.</description>
    </item>
    <item>
      <title>IT Hygiene Is Not Optional — Why SIEM/XDR Matters for Small Firms</title>
      <link>https://wci-website.pages.dev/updates/it-hygiene-siem-xdr/</link>
      <pubDate>Fri, 06 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://wci-website.pages.dev/updates/it-hygiene-siem-xdr/</guid>
      <description>Forgotten accounts, unpatched software, and unauthorized services create real risk. A recent article breaks down how centralized monitoring tools help keep environments clean.</description>
    </item>
    <item>
      <title>Now Publishing Regular Updates</title>
      <link>https://wci-website.pages.dev/updates/welcome/</link>
      <pubDate>Fri, 06 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://wci-website.pages.dev/updates/welcome/</guid>
      <description>We&amp;rsquo;re starting a regular series of posts covering security news, compliance changes, and lessons from the field.</description>
    </item>
  </channel>
</rss>
