<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>cyber</title>
    <link rel="self" type="application/atom+xml" href="https://links.pgmac.net.au/guest/tags/395/feed"/>
    <updated>2026-05-06T22:19:33+10:00</updated>
    <id>https://links.pgmac.net.au/guest/tags/395/feed</id>
            <entry>
            <id>https://links.pgmac.net.au/links/1804</id>
            <title type="text"><![CDATA[Copy Fail — CVE-2026-31431]]></title>
            <link rel="alternate" href="https://copy.fail/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1804"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Copy Fail (CVE-2026-31431): a 732-byte Linux LPE — straight-line, no race, no per-distro offsets. Same Python script roots Ubuntu, Amazon Linux, RHEL, SUSE since 2017. Page-cache write bypasses on-disk file-integrity tools and crosses container boundaries. Found by Xint Code.]]>
            </summary>
            <updated>2026-05-03T10:44:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1800</id>
            <title type="text"><![CDATA[On April 21, 2026, a major breakthrough in cybersecurity happened: leading standardization initiatives gathered in Washington DC and agreed to begin coordinating collectively on AI security. A… | Rob van der Veer | 28 comments]]></title>
            <link rel="alternate" href="https://www.linkedin.com/posts/robvanderveer_on-april-21-2026-a-major-breakthrough-in-share-7454830488919281664-0Kja" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1800"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[On April 21, 2026, a major breakthrough in cybersecurity happened: leading standardization initiatives gathered in Washington DC and agreed to begin coordinating collectively on AI security. A personal dream come true. The result: MOSAIC: Multi-Organization Secure AI Coordination. The goal: turn a fragmented landscape into clear, consistent standards and guidelines, to deal with the mounting risks of AI.

This important step was taken at the AI Security Policy Forum, organised and led by the OWASP AI Exchange, with SANS Institute as co-host - convening standard makers and policy stakeholders. 

The initiatives at the table included:
👉 BIML (Berryville Institute of Machine Learning)
👉 Center for Internet Security (CIS)
👉 Cloud Security Alliance (CSA)
👉 Coalition for Secure AI (CoSAI)
👉 National Institute of Standards and Technology (NIST)
👉 OWASP AI Exchange (AIX)
👉 OWASP GenAI Security Project
👉 SANS Institute

The group agreed that it is now more important than ever to coordinate around the rapidly evolving possibilities and challenges of AI, as AI security risks mount.

One of the next steps is to provide a standardized map of the participating initiatives and a communication platform to exchange insights on a first list of identified topics (e.g., aligning with other initiatives such as SC42, building on OpenCRE, consensus on definitions), improve consistency, clarity, quality, and prevent unnecessary duplication. The idea is to move fast while maintaining independence and with lightweight coordination - not add more committees.

In addition to the organizations mentioned, the discussion also included journalists, representatives from International Telecommunication Union (ITU), The Aspen Institute, academia, and government — providing valuable perspectives on developments in both policy and industry. This helped prioritize the topics to focus on.

In the picture, from left to right, standing to sitting:
Disesdi Shoshana Cox (AIX), Gary McGraw(BIML), Rob van der Veer (AIX), Anonymous, Duncan Sparrell, John Yeoh (CSA), Rock Lambros (GenAI), Norma Krayem, Brian Calkin (CIS), Matt Altomare (Aspen), Omar Santos (CoSAI), Aruneesh Salhotra (AIX), Jonathan Gibson (The Dispatch), Apostol Vassilev (NIST), Rhea Nygard, Ken Huang, Lav Varshney (Stony Brook University), Sounil Yu, and Sharon Goldman (Fortune)

Not in the picture, but involved, in alphabetical order:
Rob T. Lee (SANS), Ryan Galluzzo (NIST), Soribel F.

A big thank you to:
👏 Disesdi Shoshana Cox for her idea to bring everybody together in a room to fulfil the connecting mission of the Exchange 
👏 The amazing thinktank at the AI Exchange
👏 Spyros Gasteratos for his work on OpenCRE
👏 Violeta Klein, CISSP, CEFA for shaping the story for the Forum
👏 Straiker, Casco (YC X25), AI Security Academy, and SANS for supporting the Forum.
👏 Software Improvement Group for donating the original threat model and initiating the AI Exchange

Let’s make AI a success! | 28 comments on LinkedIn]]>
            </summary>
            <updated>2026-05-02T09:26:25+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1789</id>
            <title type="text"><![CDATA[GitHub RCE Vulnerability: CVE-2026-3854 Breakdown]]></title>
            <link rel="alternate" href="https://www.wiz.io/blog/github-rce-vulnerability-cve-2026-3854" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1789"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-05-01T01:44:40+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1783</id>
            <title type="text"><![CDATA[Fast16: The Cyberweapon That Predates Stuxnet by Five Years - HackingPassion.com : root@HackingPassion.com-[~]]]></title>
            <link rel="alternate" href="https://hackingpassion.com/fast16-pre-stuxnet-cyber-sabotage/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1783"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[For 21 years, fast16 corrupted nuclear research calculations without anyone noticing. It predates Stuxnet by five years. The math was always wrong.]]>
            </summary>
            <updated>2026-04-27T07:54:33+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1775</id>
            <title type="text"><![CDATA[The zero-days are numbered]]></title>
            <link rel="alternate" href="https://blog.mozilla.org/en/privacy-security/ai-security-zero-day-vulnerabilities/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1775"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Since February, the Firefox team has been working around the clock using frontier AI models to find and fix latent security vulnerabilities in the browser.]]>
            </summary>
            <updated>2026-04-22T08:11:03+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1765</id>
            <title type="text"><![CDATA[GitHub - TheMorpheus407/RepoLens: Multi-lens code audit tool — 280 expert AI agents for code review, security testing, and infrastructure auditing · GitHub]]></title>
            <link rel="alternate" href="https://github.com/TheMorpheus407/RepoLens" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1765"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Multi-lens code audit tool — 280 expert AI agents for code review, security testing, and infrastructure auditing - TheMorpheus407/RepoLens]]>
            </summary>
            <updated>2026-04-20T00:34:28+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1761</id>
            <title type="text"><![CDATA[Cybersecurity looks like proof of work now]]></title>
            <link rel="alternate" href="https://www.dbreunig.com/2026/04/14/cybersecurity-is-proof-of-work-now.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1761"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Is security spending more tokens than your attacker?]]>
            </summary>
            <updated>2026-04-18T14:25:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1759</id>
            <title type="text"><![CDATA[RedSun: System user access on Win 11/10 and Server with the April 2026 Update]]></title>
            <link rel="alternate" href="https://github.com/Nightmare-Eclipse/RedSun" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1759"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Red Sun vulnerability repository. Contribute to Nightmare-Eclipse/RedSun development by creating an account on GitHub.]]>
            </summary>
            <updated>2026-04-18T14:25:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1749</id>
            <title type="text"><![CDATA[Trusted access for the next era of cyber defense]]></title>
            <link rel="alternate" href="https://openai.com/index/scaling-trusted-access-for-cyber-defense/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1749"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-16T06:39:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1743</id>
            <title type="text"><![CDATA[This year’s insane timeline of hacks]]></title>
            <link rel="alternate" href="https://ringmast4r.substack.com/p/we-may-be-living-through-the-most" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1743"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-14T14:39:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1734</id>
            <title type="text"><![CDATA[A security scanner as fast as a linter – written in Rust]]></title>
            <link rel="alternate" href="https://github.com/peaktwilight/foxguard" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1734"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A linter-fast, local-first security scanning tool written in rust. - PwnKit-Labs/foxguard]]>
            </summary>
            <updated>2026-04-12T14:41:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1730</id>
            <title type="text"><![CDATA[Small models also found the vulnerabilities that Mythos found]]></title>
            <link rel="alternate" href="https://aisle.com/blog/ai-cybersecurity-after-mythos-the-jagged-frontier" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1730"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Why the moat is the system, not the model]]>
            </summary>
            <updated>2026-04-12T14:41:01+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1725</id>
            <title type="text"><![CDATA[Claude Mythos Preview \ red.anthropic.com]]></title>
            <link rel="alternate" href="https://red.anthropic.com/2026/mythos-preview/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1725"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-11T18:09:41+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1715</id>
            <title type="text"><![CDATA[System Card: Claude Mythos Preview [pdf]]]></title>
            <link rel="alternate" href="https://www-cdn.anthropic.com/53566bf5440a10affd749724787c8913a2ae0841.pdf" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1715"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-08T14:30:02+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1706</id>
            <title type="text"><![CDATA[METATRON - Open-Source AI Penetration Testing Assistant Brings Local LLM Analysis to Linux]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/metatron-ai-penetration-testing/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1706"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A new open-source penetration testing framework called METATRON is gaining attention in the security research community for its fully offline, AI-driven approach to vulnerability assessment.]]>
            </summary>
            <updated>2026-04-07T09:04:14+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1687</id>
            <title type="text"><![CDATA[Claude Code&amp;#039;s Entire Source Code Was Just Leaked via npm Source Maps — Here&amp;#039;s What&amp;#039;s Inside - DEV Community]]></title>
            <link rel="alternate" href="https://dev.to/gabrielanhaia/claude-codes-entire-source-code-was-just-leaked-via-npm-source-maps-heres-whats-inside-cjo" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1687"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A security researcher found Anthropic&amp;#039;s full CLI source code exposed through a source map file. 1,900 files. 512,000+ lines. Everything. Tagged with claudecode, security, typescript, ai.]]>
            </summary>
            <updated>2026-03-31T22:19:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1683</id>
            <title type="text"><![CDATA[Iran-linked hackers deliver ultimatum to Lockheed Martin staff – Australian Aviation]]></title>
            <link rel="alternate" href="https://australianaviation.com.au/2026/03/iran-linked-hackers-deliver-ultimatum-to-lockheed-martin-staff/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1683"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The named Lockheed Martin employees have been given a deadline of 48 hours to “cease cooperation with the Zionist regime and leave the occupied territories immediately”.]]>
            </summary>
            <updated>2026-03-30T07:26:56+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1682</id>
            <title type="text"><![CDATA[FBI confirms hack of Director Patel&amp;#039;s personal email inbox]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/fbi-confirms-hack-of-director-patels-personal-email-inbox/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1682"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Handala hackers associated with Iran have breached the personal email account of FBI Director Kash Patel and published photos and documents.]]>
            </summary>
            <updated>2026-03-30T07:26:05+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1601</id>
            <title type="text"><![CDATA[Google closes deal to acquire Wiz]]></title>
            <link rel="alternate" href="https://www.wiz.io/blog/google-closes-deal-to-acquire-wiz" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1601"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-12T14:06:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1581</id>
            <title type="text"><![CDATA[Wikipedia was in read-only mode following mass admin account compromise]]></title>
            <link rel="alternate" href="https://www.wikimediastatus.net" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1581"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Welcome to Wikimedia&amp;#039;s home for real-time and historical data on system performance.]]>
            </summary>
            <updated>2026-03-06T14:01:54+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1580</id>
            <title type="text"><![CDATA[A GitHub Issue Title Compromised 4k Developer Machines]]></title>
            <link rel="alternate" href="https://grith.ai/blog/clinejection-when-your-ai-tool-installs-another" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1580"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A prompt injection in a GitHub issue triggered a chain reaction that ended with 4,000 developers getting OpenClaw installed without consent. The attack composes well-understood vulnerabilities into something new: one AI tool bootstrapping another.]]>
            </summary>
            <updated>2026-03-06T14:01:50+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1503</id>
            <title type="text"><![CDATA[Sandwich Bill of Materials]]></title>
            <link rel="alternate" href="https://nesbitt.io/2026/02/08/sandwich-bill-of-materials.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1503"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[SBOM 1.0: A specification for sandwich supply chain transparency.]]>
            </summary>
            <updated>2026-02-14T14:02:21+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1491</id>
            <title type="text"><![CDATA[Windows Notepad App Remote Code Execution Vulnerability]]></title>
            <link rel="alternate" href="https://www.cve.org/CVERecord?id=CVE-2026-20841" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1491"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-02-12T00:47:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1489</id>
            <title type="text"><![CDATA[The Day the Telnet Died]]></title>
            <link rel="alternate" href="https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1489"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[On January 14, 2026, global telnet traffic observed by GreyNoise sensors fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation.]]>
            </summary>
            <updated>2026-02-12T00:47:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1477</id>
            <title type="text"><![CDATA[Microsoft open-sources LiteBox, a security-focused library OS]]></title>
            <link rel="alternate" href="https://github.com/microsoft/litebox" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1477"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A security-focused library OS supporting kernel- and user-mode execution - microsoft/litebox]]>
            </summary>
            <updated>2026-02-07T14:01:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1329</id>
            <title type="text"><![CDATA[Gpg.fail]]></title>
            <link rel="alternate" href="https://gpg.fail" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1329"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-28T13:51:29+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1260</id>
            <title type="text"><![CDATA[The Letter — Stop Hacklore!]]></title>
            <link rel="alternate" href="https://www.hacklore.org/letter" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1260"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-25T11:20:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1259</id>
            <title type="text"><![CDATA[Years-old bugs in open source took out major clouds at risk • The Register]]></title>
            <link rel="alternate" href="https://www.theregister.com/2025/11/24/fluent_bit_cves/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1259"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[: Fluent Bit has 15B+ deployments … and 5 newly assigned CVEs]]>
            </summary>
            <updated>2025-11-25T07:23:28+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1258</id>
            <title type="text"><![CDATA[Shai-Hulud Returns: Over 300 NPM Packages Infected]]></title>
            <link rel="alternate" href="https://helixguard.ai/blog/malicious-sha1hulud-2025-11-24" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1258"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[HelixGuard provides open-source research on supply chain malware and vulnerability intelligence. Advanced threat detection tools and datasets for the security community.]]>
            </summary>
            <updated>2025-11-25T00:26:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1246</id>
            <title type="text"><![CDATA[Researchers discover security vulnerability in WhatsApp]]></title>
            <link rel="alternate" href="https://www.univie.ac.at/en/news/detail/forscherinnen-entdecken-grosse-sicherheitsluecke-in-whatsapp" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1246"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Worldwide enumeration of accounts was possible due to a —now closed— privacy vulnerability]]>
            </summary>
            <updated>2025-11-20T13:13:49+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1239</id>
            <title type="text"><![CDATA[Azure hit by 15 Tbps DDoS attack using 500k IP addresses]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1239"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Microsoft said today that the Aisuru botnet hit its Azure network with a 15.72 terabits per second (Tbps) DDoS attack, launched from over 500,000 IP addresses.]]>
            </summary>
            <updated>2025-11-18T13:16:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1236</id>
            <title type="text"><![CDATA[Azure hit by 15 Tbps DDoS attack using 500k IP addresses]]></title>
            <link rel="alternate" href="https://techcommunity.microsoft.com/blog/azureinfrastructureblog/defending-the-cloud-azure-neutralized-a-record-breaking-15-tbps-ddos-attack/4470422" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1236"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-18T06:28:53+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1220</id>
            <title type="text"><![CDATA[sudo-rs Affected By Multiple Security Vulnerabilities - Impacting Ubuntu 25.10 - Phoronix]]></title>
            <link rel="alternate" href="https://www.phoronix.com/news/sudo-rs-security-ubuntu-25.10" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1220"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Ubuntu 25.10 transition to using some Rust system utilities continues proving quite rocky]]>
            </summary>
            <updated>2025-11-13T11:01:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1216</id>
            <title type="text"><![CDATA[FFmpeg to Google: Fund us or stop sending bugs]]></title>
            <link rel="alternate" href="https://thenewstack.io/ffmpeg-to-google-fund-us-or-stop-sending-bugs/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1216"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A lively discussion about open source, security, and who pays the bills has erupted on Twitter.]]>
            </summary>
            <updated>2025-11-17T15:57:50+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1196</id>
            <title type="text"><![CDATA[Inside the breach that broke the internet: The untold story of Log4Shell - The GitHub Blog]]></title>
            <link rel="alternate" href="https://github.blog/open-source/inside-the-breach-that-broke-the-internet-the-untold-story-of-log4shell/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1196"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Log4Shell proved that open source security isn&amp;#039;t guaranteed and isn’t just a code problem.]]>
            </summary>
            <updated>2025-11-06T08:41:31+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1184</id>
            <title type="text"><![CDATA[MCP-Scanner – Scan MCP Servers for vulnerabilities]]></title>
            <link rel="alternate" href="https://github.com/cisco-ai-defense/mcp-scanner" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1184"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Scan MCP Servers for vulnerabilities. Contribute to cisco-ai-defense/mcp-scanner development by creating an account on GitHub.]]>
            </summary>
            <updated>2025-10-28T13:10:49+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1135</id>
            <title type="text"><![CDATA[OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/openssh-vulnerability-proxycommand/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1135"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A new command injection vulnerability in OpenSSH, tracked as CVE-2025-61984, has been disclosed, which could allow an attacker to achieve remote code execution on a victim&amp;#039;s machine.]]>
            </summary>
            <updated>2025-10-07T20:51:14+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1133</id>
            <title type="text"><![CDATA[Introducing CodeMender: an AI agent for code security - Google DeepMind]]></title>
            <link rel="alternate" href="https://deepmind.google/discover/blog/introducing-codemender-an-ai-agent-for-code-security/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1133"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[CodeMender is a new AI-powered agent that improves code security automatically. It instantly patches new software vulnerabilities, and rewrites and secures existing code, eliminating entire...]]>
            </summary>
            <updated>2025-10-07T09:45:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1132</id>
            <title type="text"><![CDATA[Red Hat data breach escalates as ShinyHunters joins extortion]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/red-hat-data-breach-escalates-as-shinyhunters-joins-extortion/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1132"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Enterprise software giant Red Hat is now being extorted by the ShinyHunters gang, with samples of stolen customer engagement reports (CERs) leaked on their data leak site.]]>
            </summary>
            <updated>2025-10-07T07:40:50+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1124</id>
            <title type="text"><![CDATA[Almost 1 billion Salesforce records stolen, hacker group claims]]></title>
            <link rel="alternate" href="https://www.reuters.com/sustainability/boards-policy-regulation/almost-1-billion-salesforce-records-stolen-hacker-group-claims-2025-10-03/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1124"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Cybercriminals connected to a recent string of ransomware attacks on major British retailers said on Friday they had stolen almost 1 billion records from cloud technology giant Salesforce, opens new tab by focusing on companies that use its software]]>
            </summary>
            <updated>2025-10-05T12:50:44+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1123</id>
            <title type="text"><![CDATA[Discord customer service data breach leaks user info and scanned photo IDs | The Verge]]></title>
            <link rel="alternate" href="https://www.theverge.com/news/792032/discord-customer-service-data-breach-hack" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1123"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[One of Discord’s third-party customer service providers was compromised by an “unauthorized party” that may have accessed things like names, usernames, and emails.]]>
            </summary>
            <updated>2025-10-04T20:44:56+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1119</id>
            <title type="text"><![CDATA[From MCP to shell: MCP auth flaws enable RCE in Claude Code, Gemini CLI and more]]></title>
            <link rel="alternate" href="https://verialabs.com/blog/from-mcp-to-shell/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1119"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[How MCP Authentication Flaws Enable RCE in Claude Code, Gemini CLI, and More]]>
            </summary>
            <updated>2025-10-06T18:14:49+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1103</id>
            <title type="text"><![CDATA[One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens - dirkjanm.io]]></title>
            <link rel="alternate" href="https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1103"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise every Entra ID tenant in the world (except probably those in national cloud deployments). If you are an Entra ID admin reading this, yes that means complete access to your tenant. The vulnerability consisted of two components: undocumented impersonation tokens that Microsoft uses in their backend for service-to-service (S2S) communication, called “Actor tokens”, and a critical vulnerability in the (legacy) Azure AD Graph API that did not properly validate the originating tenant, allowing these tokens to be used for cross-tenant access.]]>
            </summary>
            <updated>2025-09-18T15:25:51+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1066</id>
            <title type="text"><![CDATA[The Critical Flaw in CVE Scoring]]></title>
            <link rel="alternate" href="https://www.darkreading.com/vulnerabilities-threats/critical-flaw-cve-scoring" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1066"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[With informed decision-making, organizations can strengthen their overall resilience and maintain the agility needed to adapt to emerging threats, without sacrificing innovation or productivity.]]>
            </summary>
            <updated>2025-10-05T12:50:35+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1036</id>
            <title type="text"><![CDATA[Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai – Krebs on Security]]></title>
            <link rel="alternate" href="https://krebsonsecurity.com/2025/07/poor-passwords-tattle-on-ai-hiring-bot-maker-paradox-ai/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1036"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[People gonna people]]>
            </summary>
            <updated>2025-07-18T12:45:58+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1027</id>
            <title type="text"><![CDATA[@bagder.mastodon.social.ap.brid.gy on Bluesky]]></title>
            <link rel="alternate" href="https://bsky.app/profile/bagder.mastodon.social.ap.brid.gy/post/3ltodxecunfy2" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1027"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[It has officially begun. The CRA info request counter is no longer at zero.]]>
            </summary>
            <updated>2025-07-11T20:45:03+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1010</id>
            <title type="text"><![CDATA[China breaks RSA encryption with a quantum computer - Earth.com]]></title>
            <link rel="alternate" href="https://www.earth.com/news/china-breaks-rsa-encryption-with-a-quantum-computer-threatening-global-data-security/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1010"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Researchers in Shanghai break record by factoring 22-bit RSA key using quantum computing, threatening future cryptographic keys.]]>
            </summary>
            <updated>2025-06-25T20:47:33+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/998</id>
            <title type="text"><![CDATA[Defending the Internet: how Cloudflare blocked a monumental 7.3 Tbps DDoS attack]]></title>
            <link rel="alternate" href="https://blog.cloudflare.com/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/998"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[In mid-May 2025, blocked the largest DDoS attack ever recorded: a staggering 7.3 terabits per second (Tbps).]]>
            </summary>
            <updated>2025-06-19T23:22:26+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/974</id>
            <title type="text"><![CDATA[Scammers impersonating the ASD&amp;#039;s ACSC | Cyber.gov.au]]></title>
            <link rel="alternate" href="https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/email-scammers-impersonating-asds-acsc" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/974"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Scammers are impersonating the ASD&amp;#039;s ACSC sending out phishing emails to the public with the email content suggesting to download a malicious antivirus program.]]>
            </summary>
            <updated>2025-06-13T08:33:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/957</id>
            <title type="text"><![CDATA[Designing Blue Team playbooks with Wazuh for proactive incident response]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/designing-blue-team-playbooks-with-wazuh-for-proactive-incident-response/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/957"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Blue Team playbooks are essential—but tools like Wazuh take them to the next level. From credential dumping to web shells and brute-force attacks, see how Wazuh strengthens real-time detection and automated response.]]>
            </summary>
            <updated>2025-06-10T05:13:42+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/954</id>
            <title type="text"><![CDATA[Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/kali-gpt/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/954"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Kali GPT, a specialized AI model built on GPT-4 architecture, has been specifically developed to integrate seamlessly with Kali Linux, offering unprecedented support for offensive security professionals and students alike.]]>
            </summary>
            <updated>2025-06-08T08:29:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/950</id>
            <title type="text"><![CDATA[Covert Web-to-App Tracking via Localhost on Android]]></title>
            <link rel="alternate" href="https://localmess.github.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/950"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Facebook and Yandex link Web and App usage via a localhost network connection]]>
            </summary>
            <updated>2025-06-10T08:50:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/911</id>
            <title type="text"><![CDATA[This no-code, security-focused n8n alternative works with everything, and it&amp;#039;s free]]></title>
            <link rel="alternate" href="https://www.xda-developers.com/cloud-based-n8n-alternative/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/911"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tines is worth trying out for a fully cloud-based, secure solution to automation.]]>
            </summary>
            <updated>2025-06-03T22:52:05+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/904</id>
            <title type="text"><![CDATA[GitHub - OperantAI/woodpecker: Red Teaming for AI and Cloud]]></title>
            <link rel="alternate" href="https://github.com/OperantAI/woodpecker" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/904"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Red Teaming for AI and Cloud. Contribute to OperantAI/woodpecker development by creating an account on GitHub.]]>
            </summary>
            <updated>2025-05-29T09:21:24+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/903</id>
            <title type="text"><![CDATA[Securing CI/CD workflows with Wazuh]]></title>
            <link rel="alternate" href="https://thehackernews.com/2025/05/securing-cicd-workflows-with-wazuh.html?m=1" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/903"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:12:10+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/902</id>
            <title type="text"><![CDATA[ASD releases joint advice on AI data security – ARN]]></title>
            <link rel="alternate" href="https://www.arnnet.com.au/article/3993677/asd-releases-joint-advice-on-ai-data-security.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/902"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Australian Securities Directorate (ASD), in collaboration with international partners, has come with new advice on best practices for securing data throughout the artificial intelligence (AI) and machine learning (ML) system lifecycle.]]>
            </summary>
            <updated>2025-05-28T01:12:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/900</id>
            <title type="text"><![CDATA[KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS]]></title>
            <link rel="alternate" href="https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/900"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been…]]>
            </summary>
            <updated>2025-05-28T01:12:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/899</id>
            <title type="text"><![CDATA[Have I Been Pwned 2.0 is Now Live!]]></title>
            <link rel="alternate" href="https://www.troyhunt.com/have-i-been-pwned-2-0-is-now-live/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/899"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[This has been a very long time coming, but finally, after a marathon effort, the brand new Have I Been Pwned website is now live!




Feb last year is when I made the first commit to the public repo for the rebranded service, and we soft-launched the new brand in]]>
            </summary>
            <updated>2025-05-28T01:12:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/862</id>
            <title type="text"><![CDATA[CISA extends funding to ensure &amp;#039;no lapse in critical CVE services&amp;#039;]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/cisa-extends-funding-to-ensure-no-lapse-in-critical-cve-services/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/862"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[CISA says the U.S. government has extended MITRE&amp;#039;s funding to ensure no continuity issues with the critical Common Vulnerabilities and Exposures (CVE) program.]]>
            </summary>
            <updated>2025-05-28T01:06:03+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/861</id>
            <title type="text"><![CDATA[CVE Foundation]]></title>
            <link rel="alternate" href="https://www.thecvefoundation.org/home" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/861"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Common Vulnerabilities and Exposures (CVE) Program has become the cornerstone of vulnerability management. Nearly all technology vendors and service providers identify vulnerabilities with CVEs when they publish security advisories. Most security products and services related to vulnerabilities]]>
            </summary>
            <updated>2025-05-28T01:05:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/860</id>
            <title type="text"><![CDATA[CVE program faces swift end after DHS fails to renew contract. Leaving security flaw tracking in limbo]]></title>
            <link rel="alternate" href="https://www.csoonline.com/article/3963190/cve-program-faces-swift-end-after-dhs-fails-to-renew-contract-leaving-security-flaw-tracking-in-limbo.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/860"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[After DHS did not renew its funding contract for reasons unspecified, MITRE’s 25-year-old Common Vulnerabilities and Exposures (CVE) program was slated for an abrupt shutdown on April 16, which would have left security flaw tracking in limbo. CISA stepped in to provide a bridge.]]>
            </summary>
            <updated>2025-05-28T01:05:10+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/857</id>
            <title type="text"><![CDATA[The CVE program for tracking security flaws is about to lose federal funding]]></title>
            <link rel="alternate" href="https://www.theverge.com/news/649314/cve-mitre-funding-vulnerabilities-exposures-funding" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/857"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The federally funded organization behind the Common Vulnerabilities and Exposures (CVE) program confirmed that its contract to support the system will expire on April 16th.]]>
            </summary>
            <updated>2025-05-28T01:05:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/854</id>
            <title type="text"><![CDATA[Enhancing your DevSecOps with Wazuh. The open source XDR platform]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/enhancing-your-devsecops-with-wazuh-the-open-source-xdr-platform/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/854"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security shouldn&amp;#039;t wait until the end of development. Wazuh brings real-time threat detection, compliance, and vulnerability scanning into your DevOps pipeline—powering a stronger DevSecOps strategy from day one. Learn more about how Wazuh can help secure your development cycle.]]>
            </summary>
            <updated>2025-05-28T01:04:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/846</id>
            <title type="text"><![CDATA[Frida Penetration Testing Tool Kit Released With New APIs for Threat Monitoring]]></title>
            <link rel="alternate" href="https://search.app/1yiQn4N9PWiF9ZtL8" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/846"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Frida 16.7.0, the latest version of the popular dynamic instrumentation toolkit, has been released with powerful new APIs specifically.]]>
            </summary>
            <updated>2025-05-28T01:03:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/844</id>
            <title type="text"><![CDATA[The “S” in MCP Stands for Security]]></title>
            <link rel="alternate" href="https://elenacross7.medium.com/%EF%B8%8F-the-s-in-mcp-stands-for-security-91407b33ed6b" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/844"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:03:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/843</id>
            <title type="text"><![CDATA[Google launches Sec-Gemini v1. A new experimental cybersecurity model]]></title>
            <link rel="alternate" href="https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html?m=1" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/843"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:02:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/833</id>
            <title type="text"><![CDATA[CodeQLEAKED – Public Secrets Exposure Leads to Supply Chain Attack on GitHub CodeQL]]></title>
            <link rel="alternate" href="https://www.praetorian.com/blog/codeqleaked-public-secrets-exposure-leads-to-supply-chain-attack-on-github-codeql/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/833"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[An exposed GitHub token could have been used to launch a supply chain attack on GitHub CodeQL, resulting in source code exposure and repository tampering of CodeQL users.]]>
            </summary>
            <updated>2025-05-28T01:01:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/831</id>
            <title type="text"><![CDATA[Remote Code Execution Vulnerabilities in Ingress NGINX | Wiz Blog]]></title>
            <link rel="alternate" href="https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/831"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:00:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/830</id>
            <title type="text"><![CDATA[https://cybernews.com/security/troy-hunt-falls-victim-to-phishing-attack/]]></title>
            <link rel="alternate" href="https://cybernews.com/security/troy-hunt-falls-victim-to-phishing-attack/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/830"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:00:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/784</id>
            <title type="text"><![CDATA[Paul Butler – Smuggling arbitrary data through an emoji]]></title>
            <link rel="alternate" href="https://paulbutler.org/2025/smuggling-arbitrary-data-through-an-emoji/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/784"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T00:52:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/781</id>
            <title type="text"><![CDATA[splunk/DECEIVE]]></title>
            <link rel="alternate" href="https://github.com/splunk/DECEIVE" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/781"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work! - splunk/DECEIVE]]>
            </summary>
            <updated>2025-05-28T00:52:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/755</id>
            <title type="text"><![CDATA[https://iterm2.com/downloads/stable/iTerm2-3_5_11.changelog]]></title>
            <link rel="alternate" href="https://iterm2.com/downloads/stable/iTerm2-3_5_11.changelog" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/755"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T00:48:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/730</id>
            <title type="text"><![CDATA[Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Secu]]></title>
            <link rel="alternate" href="https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/730"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Introduction
Hello, I’m RyotaK (@ryotkak
), a security engineer at Flatt Security Inc.
A few days ago, I was upgrading my home lab network, and I decided to upgrade the OpenWrt
 on my router.1 After accessing the LuCI, which is the web interface of OpenWrt, I noticed that there is a section called Attended Sysupgrade, so I tried to upgrade the firmware using it.
After reading the description, I found that it states it builds new firmware using an online service.]]>
            </summary>
            <updated>2026-01-26T04:00:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/718</id>
            <title type="text"><![CDATA[New AWS Security Incident Response helps organizations respond to and recover from security events |]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/aws/new-aws-security-incident-response-helps-organizations-respond-to-and-recover-from-security-events/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/718"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[AWS introduces a new service to streamline security event response, providing automated triage, coordinated communication, and expert guidance to recover from cybersecurity threats.]]>
            </summary>
            <updated>2026-01-26T04:00:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/685</id>
            <title type="text"><![CDATA[FBI says hackers are sending fraudulent police data requests to tech giants to steal people&amp;#039;s privat]]></title>
            <link rel="alternate" href="https://techcrunch.com/2024/11/08/fbi-says-hackers-are-sending-fraudulent-police-data-requests-to-tech-giants-to-steal-peoples-private-information/?guccounter=1" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/685"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The warning is a rare admission from the FBI about the threat from fake emergency data requests submitted by hackers with access to police email accounts.]]>
            </summary>
            <updated>2026-01-21T04:00:52+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/681</id>
            <title type="text"><![CDATA[Google Claims World First As AI Finds 0-Day Security Vulnerability]]></title>
            <link rel="alternate" href="https://www.forbes.com/sites/daveywinder/2024/11/04/google-claims-world-first-as-ai-finds-0-day-security-vulnerability/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/681"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Google’s Project Zero hackers and DeepMind boffins have collaborated to uncover a zero-day security vulnerability in real-world code for the first time using AI.]]>
            </summary>
            <updated>2026-01-21T02:00:44+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/674</id>
            <title type="text"><![CDATA[OpenSSF Adds Minder as a Sandbox Project to Simplify the Integration and Use of Open Source Security]]></title>
            <link rel="alternate" href="https://openssf.org/blog/2024/10/28/openssf-adds-minder-as-a-sandbox-project-to-simplify-the-integration-and-use-of-open-source-security-tools/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/674"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-21T04:00:33+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/672</id>
            <title type="text"><![CDATA[dns recon &amp;amp; research -find &amp;amp; lookup dns records]]></title>
            <link rel="alternate" href="https://dnsdumpster.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/672"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Free domain research tool to discover hosts related to a domain. Find visible hosts from the attackers perspective for Red and Blue Teams.]]>
            </summary>
            <updated>2026-01-21T04:00:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/671</id>
            <title type="text"><![CDATA[&amp;#039;Shift Left&amp;#039; Triggers Security Soul Searching]]></title>
            <link rel="alternate" href="https://www.darkreading.com/application-security/shift-left-pushback-triggers-security-soul-searching" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/671"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-19T08:00:15+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/629</id>
            <title type="text"><![CDATA[Internet Archive hacked data breach impacts 31 million users]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/internet-archive-hacked-data-breach-impacts-31-million-users/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/629"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Internet Archive&amp;#039;s &amp;quot;The Wayback Machine&amp;quot; has suffered a data breach after a threat actor compromised the website and stole a user authentication database containing 31 million unique records.]]>
            </summary>
            <updated>2026-01-10T04:00:49+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/626</id>
            <title type="text"><![CDATA[Palo Alto Networks warns of firewall hijack bugs with public exploit]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-firewall-hijack-bugs-with-public-exploit/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/626"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Palo Alto Networks warned customers today to patch security vulnerabilities (with public exploit code) that can be chained to let attackers hijack PAN-OS firewalls.]]>
            </summary>
            <updated>2026-01-07T20:00:39+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/627</id>
            <title type="text"><![CDATA[The Australian government has introduced new cyber security laws. Here’s what you need to know]]></title>
            <link rel="alternate" href="https://theconversation.com/the-australian-government-has-introduced-new-cyber-security-laws-heres-what-you-need-to-know-240889" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/627"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The long-awaited law, if passed, will be Australia’s first standalone cyber security act.]]>
            </summary>
            <updated>2026-01-07T20:00:40+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/625</id>
            <title type="text"><![CDATA[How open source SIEM and XDR tackle evolving threats]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/how-open-source-siem-and-xdr-tackle-evolving-threats/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/625"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Evolving threats require security solutions that match the sophistication of modern threats. Learn more about how Wazuh, the open-source XDR and SIEM, tackles these threats.]]>
            </summary>
            <updated>2026-01-14T04:00:13+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/603</id>
            <title type="text"><![CDATA[How Cloudflare auto-mitigated world record 3.8 Tbps DDoS attack]]></title>
            <link rel="alternate" href="https://blog.cloudflare.com/how-cloudflare-auto-mitigated-world-record-3-8-tbps-ddos-attack/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/603"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Over the past couple of weeks, Cloudflare&amp;#039;s DDoS protection systems have automatically and successfully mitigated multiple hyper-volumetric L3/4 DDoS attacks exceeding 3 billion packets per second (Bpps). Our systems also automatically mitigated multiple attacks exceeding 3 terabits per second (Tbps), with the largest ones exceeding 3.65 Tbps. The scale of these attacks is unprecedented.]]>
            </summary>
            <updated>2026-01-01T04:00:42+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/593</id>
            <title type="text"><![CDATA[Critical doomsday Linux bug is CUPS-based vulnerability • The Register]]></title>
            <link rel="alternate" href="https://www.theregister.com/2024/09/26/unauthenticated_rce_bug_linux/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/593"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[No patches yet, can be mitigated, requires user interaction]]>
            </summary>
            <updated>2025-12-26T12:00:45+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/594</id>
            <title type="text"><![CDATA[NIST Drops Password Complexity Mandatory Reset Rules]]></title>
            <link rel="alternate" href="https://www.darkreading.com/identity-access-management-security/nist-drops-password-complexity-mandatory-reset-rules" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/594"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-26T14:00:38+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/591</id>
            <title type="text"><![CDATA[Critical Unauthenticated RCE Flaw Impacts all GNU/Linux systems]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/critical-unauthenticated-rce-flaw/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/591"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Critical Unauthenticated RCE Flaw, no Common CVE identifiers have been assigned yet, although experts suggest there should be at least three to six.]]>
            </summary>
            <updated>2026-01-01T04:00:30+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/588</id>
            <title type="text"><![CDATA[Secure your software by design]]></title>
            <link rel="alternate" href="https://www.iriusrisk.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/588"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-01T04:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/587</id>
            <title type="text"><![CDATA[OWASP Threat Dragon]]></title>
            <link rel="alternate" href="https://owasp.org/www-project-threat-dragon/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/587"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[OWASP Threat Dragon is a threat modeling tool; great for both developers and defenders alike. Use on your desktop or as a web application.]]>
            </summary>
            <updated>2025-12-30T04:00:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/586</id>
            <title type="text"><![CDATA[Threagile — Agile Threat Modeling Toolkit]]></title>
            <link rel="alternate" href="https://threagile.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/586"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Threagile enables teams to execute Agile Threat Modeling as seamless as possible, even highly-integrated into DevSecOps environments.]]>
            </summary>
            <updated>2025-12-30T04:00:21+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/584</id>
            <title type="text"><![CDATA[This Windows PowerShell Phish Has Scary Potential]]></title>
            <link rel="alternate" href="https://krebsonsecurity.com/2024/09/this-windows-powershell-phish-has-scary-potential/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/584"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Many GitHub users this week received a novel phishing email warning of critical security holes in their code. Those who clicked the link for details were asked to distinguish themselves from bots by pressing a combination of keyboard keys that…]]>
            </summary>
            <updated>2025-12-30T04:00:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/574</id>
            <title type="text"><![CDATA[Platform Engineering Is Security Engineering]]></title>
            <link rel="alternate" href="https://www.darkreading.com/application-security/platform-engineering-is-security-engineering" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/574"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-24T06:00:25+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/566</id>
            <title type="text"><![CDATA[We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI]]></title>
            <link rel="alternate" href="https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/566"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Welcome back to another watchTowr Labs blog. Brace yourselves, this is one of our most astounding discoveries.


Summary

What started out as a bit of fun between colleagues while avoiding the Vegas heat and $20 bottles of water in our Black Hat hotel rooms - has now seemingly become a]]>
            </summary>
            <updated>2025-12-26T04:00:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/564</id>
            <title type="text"><![CDATA[https://www.helpnetsecurity.com/2024/09/10/open-source-cybersec-tools/]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2024/09/10/open-source-cybersec-tools/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/564"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Here, you&amp;#039;ll find a list of free, open-source cybersec tools that are ready to be added to your organization&amp;#039;s arsenal.]]>
            </summary>
            <updated>2025-12-26T04:00:13+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/562</id>
            <title type="text"><![CDATA[pushsecurity/saas-attacks]]></title>
            <link rel="alternate" href="https://github.com/pushsecurity/saas-attacks?tab=readme-ov-file" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/562"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Offensive security drives defensive security. We&amp;#039;re sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown - pushsecurity/saas-attacks]]>
            </summary>
            <updated>2025-12-25T04:00:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/549</id>
            <title type="text"><![CDATA[Bypassing airport security via SQL injection]]></title>
            <link rel="alternate" href="https://ian.sh/tsa" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/549"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[We discovered a serious vulnerability in the Known Crewmember (KCM) and Cockpit Access Security System (CASS) programs used by the Transportation Security Administration.]]>
            </summary>
            <updated>2025-12-24T04:00:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/543</id>
            <title type="text"><![CDATA[Nuclei: Open-source vulnerability scanner - Help Net Security]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2024/08/26/nuclei-open-source-vulnerability-scanner/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/543"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Nuclei is a fast and customizable open-source vulnerability scanner powered by YAML-based templates. With its flexible templating system, Nuclei can be]]>
            </summary>
            <updated>2025-12-24T04:00:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/537</id>
            <title type="text"><![CDATA[Local Networks Go Global When Domain Names Collide – Krebs on Security]]></title>
            <link rel="alternate" href="https://krebsonsecurity.com/2024/08/local-networks-go-global-when-domain-names-collide/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/537"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft authentication systems years ago using domain names in TLDs that didn&amp;#039;t exist at the time. Meaning, they are continuously sending…]]>
            </summary>
            <updated>2025-12-21T04:00:24+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/531</id>
            <title type="text"><![CDATA[OpenCTI: Open-source cyber threat intelligence platform - Help Net Security]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2024/08/21/opencti-open-source-cyber-threat-intelligence-platform/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/531"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence (CTI) data and observables.]]>
            </summary>
            <updated>2025-12-20T04:00:15+10:00</updated>
        </entry>
    </feed>
