{"@attributes":{"version":"2.0"},"channel":{"title":"Annex Blog","link":"https:\/\/annex.security\/blog","description":"Latest insights on software extensions and managing them","language":"en-us","lastBuildDate":"Wed, 29 Apr 2026 14:11:14 GMT","item":[{"title":{},"link":"https:\/\/annex.security\/blog\/annex-acquired","guid":"https:\/\/annex.security\/blog\/annex-acquired","pubDate":"Tue, 28 Apr 2026 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/annex-acquired\/annex-acq.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/pixel-perfect","guid":"https:\/\/annex.security\/blog\/pixel-perfect","pubDate":"Mon, 23 Feb 2026 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/pixel-perfect\/pixel-header.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/promise-bomb","guid":"https:\/\/annex.security\/blog\/promise-bomb","pubDate":"Mon, 23 Feb 2026 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/promise-bomb\/promise-header.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/worms-lurking","guid":"https:\/\/annex.security\/blog\/worms-lurking","pubDate":"Wed, 28 Jan 2026 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/worms-lurking\/blog-header.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/prompt-poaching","guid":"https:\/\/annex.security\/blog\/prompt-poaching","pubDate":"Mon, 29 Dec 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/prompt-poaching\/prompt-poaching-header.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/glassworm-continued","guid":"https:\/\/annex.security\/blog\/glassworm-continued","pubDate":"Sun, 30 Nov 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/glassworm-continues\/glassworm-header.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/ransomvibe","guid":"https:\/\/annex.security\/blog\/ransomvibe","pubDate":"Wed, 05 Nov 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/ransomvibe\/ransomvibe-header.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/sleepyduck-malware","guid":"https:\/\/annex.security\/blog\/sleepyduck-malware","pubDate":"Sat, 01 Nov 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/sleepyduck-malware\/sleepyduck-header.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/pokemon-or-cryptominer","guid":"https:\/\/annex.security\/blog\/pokemon-or-cryptominer","pubDate":"Fri, 31 Oct 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/whos-that-pokemon\/pokemon-header.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/depin-browser-extensions","guid":"https:\/\/annex.security\/blog\/depin-browser-extensions","pubDate":"Mon, 01 Sep 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/depin-browser-extensions\/depin-header.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/mellow-drama","guid":"https:\/\/annex.security\/blog\/mellow-drama","pubDate":"Mon, 07 Jul 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/mellow-drama\/mellowtel-header.jpeg","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/these-vibes-are-off","guid":"https:\/\/annex.security\/blog\/these-vibes-are-off","pubDate":"Wed, 02 Jul 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/these-vibes-are-off\/blog-header.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/software-extension-management-model","guid":"https:\/\/annex.security\/blog\/software-extension-management-model","pubDate":"Wed, 14 May 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/software-extension-management-model\/management-header.jpg","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/searching-for-something-unknow","guid":"https:\/\/annex.security\/blog\/searching-for-something-unknow","pubDate":"Thu, 10 Apr 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/searching-for-something-unknow\/searching-header.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/buying-browser-extensions","guid":"https:\/\/annex.security\/blog\/buying-browser-extensions","pubDate":"Tue, 18 Mar 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/buying-browser-extensions\/buying-header2.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/sclpfybn-moneitization-scheme","guid":"https:\/\/annex.security\/blog\/sclpfybn-moneitization-scheme","pubDate":"Fri, 03 Jan 2025 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/sclpfybn-monetization-scheme\/sclpfybn.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/cyberhaven-extension-compromise","guid":"https:\/\/annex.security\/blog\/cyberhaven-extension-compromise","pubDate":"Fri, 27 Dec 2024 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/cyberhaven-extension-compromise\/cyberhaven.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/retrieve-chrome-extensions","guid":"https:\/\/annex.security\/blog\/retrieve-chrome-extensions","pubDate":"Thu, 19 Dec 2024 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/retrieve-chrome-extensions\/helpers.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/beware-free-vpn-extensions","guid":"https:\/\/annex.security\/blog\/beware-free-vpn-extensions","pubDate":"Mon, 16 Dec 2024 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/beware-free-vpn-extensions\/beware-free-vpn-extensions.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/analyzing-a-browser-extension","guid":"https:\/\/annex.security\/blog\/analyzing-a-browser-extension","pubDate":"Sun, 15 Dec 2024 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/analyze-extension\/analyze-extension.png","type":"image\/jpeg"}},"author":"John Tuckner"},{"title":{},"link":"https:\/\/annex.security\/blog\/extension-request-workflows","guid":"https:\/\/annex.security\/blog\/extension-request-workflows","pubDate":"Fri, 13 Dec 2024 00:00:00 GMT","description":{},"enclosure":{"@attributes":{"url":"https:\/\/annex.security\/blog-images\/extension-request-workflows\/netscape.png","type":"image\/jpeg"}},"author":"John Tuckner"}]}}