<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>RoxoHost Tech Blog – Hosting, Cloud &amp;amp; Security News &amp; Category: Cyber Threat</title>
<link>https://blog.roxohost.com/rss/category/cyber-threat-explained</link>
<description>RoxoHost Tech Blog – Hosting, Cloud &amp;amp; Security News &amp; Cyber Threat</description>
<dc:language>en</dc:language>
<dc:rights></dc:rights>

<item>
<title>Your Security Is Only as Strong as Your Weakest Vendor</title>
<link>https://blog.roxohost.com/supply-chain-attacks-weakest-vendor-cybersecurity-2026</link>
<guid>https://blog.roxohost.com/supply-chain-attacks-weakest-vendor-cybersecurity-2026</guid>
<description><![CDATA[ You can do everything right and still get hacked — through someone you trusted. Here&#039;s how supply chain attacks work and why they&#039;re the defining cyberthreat of 2026. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202605/image_750x_6a03f1380b0b9.jpg" length="49398" type="image/jpeg"/>
<pubDate>Wed, 13 May 2026 09:05:00 +0530</pubDate>
<dc:creator>ziyan lakhani</dc:creator>
<media:keywords>supply chain attack, third-party breach, cybersecurity 2026, vendor risk management, software supply chain security, SolarWinds, open source vulnerability</media:keywords>
</item>

<item>
<title>Someone May Already Have Stolen Your Data. They&amp;apos;re Just Waiting to Read It.</title>
<link>https://blog.roxohost.com/harvest-now-decrypt-later-quantum-threat-explained</link>
<guid>https://blog.roxohost.com/harvest-now-decrypt-later-quantum-threat-explained</guid>
<description><![CDATA[ Hackers are collecting your encrypted data today to unlock it when quantum computers arrive. Here&#039;s what that means for you — in plain English. ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202605/image_750x_6a03ecde575af.jpg" length="49398" type="image/jpeg"/>
<pubDate>Wed, 13 May 2026 08:47:00 +0530</pubDate>
<dc:creator>ziyan lakhani</dc:creator>
<media:keywords>harvest now decrypt later, quantum computing threat, HNDL attack, data security, post-quantum cryptography, Q-Day explained, future of encryption</media:keywords>
</item>

<item>
<title>AI&amp;Powered Social Engineering: The Manipulation You Can&amp;apos;t See Coming</title>
<link>https://blog.roxohost.com/ai-powered-social-engineering-the-manipulation-you-cant-see-coming</link>
<guid>https://blog.roxohost.com/ai-powered-social-engineering-the-manipulation-you-cant-see-coming</guid>
<description><![CDATA[  ]]></description>
<enclosure url="http://blog.roxohost.com/uploads/images/202605/image_750x_6a01949457f0f.jpg" length="71856" type="image/jpeg"/>
<pubDate>Mon, 11 May 2026 14:05:11 +0530</pubDate>
<dc:creator>Sujith</dc:creator>
<media:keywords>#cybersecurity #socialengineering #hacking</media:keywords>
</item>

</channel>
</rss>