<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[🪝 We&#x27;ve hooked another review 🪝]]></title><description><![CDATA[<p>🪝 We've hooked another review 🪝</p><p>This week, Aleksandra Scalco reviews 𝙋𝙝𝙞𝙨𝙝𝙞𝙣𝙜 𝙛𝙤𝙧 𝘼𝙣𝙨𝙬𝙚𝙧𝙨: 𝙍𝙞𝙨𝙠 𝙄𝙙𝙚𝙣𝙩𝙞𝙛𝙞𝙘𝙖𝙩𝙞𝙤𝙣 𝙖𝙣𝙙 𝙈𝙞𝙩𝙞𝙜𝙖𝙩𝙞𝙤𝙣 𝙎𝙩𝙧𝙖𝙩𝙚𝙜𝙞𝙚𝙨, an IET book authored by Terry Merz and Lawrence Shaw...</p><p><img src="https://board.circlewithadot.net/assets/plugins/nodebb-plugin-emoji/emoji/android/1f4dd.png?v=28325c671da" class="not-responsive emoji emoji-android emoji--memo" style="height:23px;width:auto;vertical-align:middle" title="📝" alt="📝" /> <a href="https://cybercanon.org/phishing-for-answers-risk-identification-and-mitigation-strategies/" rel="nofollow noopener"><span>https://</span><span>cybercanon.org/phishing-for-an</span><span>swers-risk-identification-and-mitigation-strategies/</span></a> </p><p><a href="https://infosec.exchange/tags/CybersecurityBooks" rel="tag">#<span>CybersecurityBooks</span></a> <a href="https://infosec.exchange/tags/SecurityAwareness" rel="tag">#<span>SecurityAwareness</span></a> <a href="https://infosec.exchange/tags/Risk" rel="tag">#<span>Risk</span></a></p>

<div class="row mt-3"><div class="col-12 mt-3"><img class="img-thumbnail" src="https://media.infosec.exchange/infosec.exchange/media_attachments/files/116/482/808/338/542/422/original/fdeb2864ad30750c.png" alt="Link Preview Image" /></div></div>]]></description><link>https://board.circlewithadot.net/topic/5505ea2c-f10d-41d1-8f6a-e4b875e00cea/we-ve-hooked-another-review</link><generator>RSS for Node</generator><lastBuildDate>Fri, 15 May 2026 03:39:01 GMT</lastBuildDate><atom:link href="https://board.circlewithadot.net/topic/5505ea2c-f10d-41d1-8f6a-e4b875e00cea.rss" rel="self" type="application/rss+xml"/><pubDate>Tue, 28 Apr 2026 14:30:03 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to 🪝 We&#x27;ve hooked another review 🪝 on Tue, 28 Apr 2026 14:30:03 GMT]]></title><description><![CDATA[<p>𝘛𝘩𝘳𝘰𝘶𝘨𝘩 𝘱𝘳𝘰𝘷𝘰𝘤𝘢𝘵𝘪𝘷𝘦, 𝘸𝘦𝘭𝘭-𝘳𝘦𝘴𝘦𝘢𝘳𝘤𝘩𝘦𝘥 𝘳𝘦𝘷𝘪𝘦𝘸𝘴 𝘰𝘧 𝘱𝘩𝘪𝘴𝘩𝘪𝘯𝘨 𝘢𝘵𝘵𝘢𝘤𝘬 𝘮𝘦𝘵𝘩𝘰𝘥𝘴 𝘢𝘯𝘥 𝘤𝘢𝘴𝘦 𝘴𝘵𝘶𝘥𝘪𝘦𝘴, [..] 𝘔𝘦𝘳𝘻 𝘢𝘯𝘥 𝘚𝘩𝘢𝘸 𝘱𝘳𝘦𝘴𝘦𝘯𝘵 𝘢 𝘤𝘰𝘮𝘱𝘦𝘭𝘭𝘪𝘯𝘨 𝘢𝘳𝘨𝘶𝘮𝘦𝘯𝘵 𝘢𝘣𝘰𝘶𝘵 𝘸𝘩𝘺 𝘤𝘶𝘳𝘳𝘦𝘯𝘵 𝘢𝘱𝘱𝘳𝘰𝘢𝘤𝘩𝘦𝘴 𝘵𝘰 𝘱𝘩𝘪𝘴𝘩𝘪𝘯𝘨 𝘤𝘢𝘮𝘱𝘢𝘪𝘨𝘯𝘴 𝘢𝘳𝘦 𝘪𝘯𝘦𝘧𝘧𝘦𝘤𝘵𝘪𝘷𝘦.</p>]]></description><link>https://board.circlewithadot.net/post/https://infosec.exchange/users/CyberSecCanon/statuses/116482808448396052</link><guid isPermaLink="true">https://board.circlewithadot.net/post/https://infosec.exchange/users/CyberSecCanon/statuses/116482808448396052</guid><dc:creator><![CDATA[cyberseccanon@infosec.exchange]]></dc:creator><pubDate>Tue, 28 Apr 2026 14:30:03 GMT</pubDate></item></channel></rss>