<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Patch Management on ap7i.com</title>
    <link>https://ap7i.com/tags/patch-management/</link>
    <description>Recent content in Patch Management on ap7i.com</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Sun, 12 Apr 2026 12:15:31 -0400</lastBuildDate>
    <atom:link href="https://ap7i.com/tags/patch-management/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Adobe Reader Zero-Day Was Active for 4 Months. Fleet Response.</title>
      <link>https://ap7i.com/posts/adobe-reader-zero-day/</link>
      <pubDate>Sun, 12 Apr 2026 12:15:31 -0400</pubDate>
      <guid>https://ap7i.com/posts/adobe-reader-zero-day/</guid>
      <description>Adobe patched CVE-2026-34621 on April 11 after a prototype pollution flaw in Acrobat Reader was actively exploited via malicious PDFs since November 2025. If you manage a large fleet of Windows endpoints, here&amp;rsquo;s what to do today — beyond hitting Check for Updates.</description>
    </item>
  </channel>
</rss>
