<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
    <title>security</title>
    <link rel="self" type="application/atom+xml" href="https://links.pgmac.net.au/guest/tags/8/feed"/>
    <updated>2026-04-21T17:55:45+10:00</updated>
    <id>https://links.pgmac.net.au/guest/tags/8/feed</id>
            <entry>
            <id>https://links.pgmac.net.au/links/1765</id>
            <title type="text"><![CDATA[GitHub - TheMorpheus407/RepoLens: Multi-lens code audit tool — 280 expert AI agents for code review, security testing, and infrastructure auditing · GitHub]]></title>
            <link rel="alternate" href="https://github.com/TheMorpheus407/RepoLens" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1765"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Multi-lens code audit tool — 280 expert AI agents for code review, security testing, and infrastructure auditing - TheMorpheus407/RepoLens]]>
            </summary>
            <updated>2026-04-20T00:34:28+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1761</id>
            <title type="text"><![CDATA[Cybersecurity looks like proof of work now]]></title>
            <link rel="alternate" href="https://www.dbreunig.com/2026/04/14/cybersecurity-is-proof-of-work-now.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1761"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Is security spending more tokens than your attacker?]]>
            </summary>
            <updated>2026-04-18T14:25:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1759</id>
            <title type="text"><![CDATA[RedSun: System user access on Win 11/10 and Server with the April 2026 Update]]></title>
            <link rel="alternate" href="https://github.com/Nightmare-Eclipse/RedSun" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1759"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Red Sun vulnerability repository. Contribute to Nightmare-Eclipse/RedSun development by creating an account on GitHub.]]>
            </summary>
            <updated>2026-04-18T14:25:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1749</id>
            <title type="text"><![CDATA[Trusted access for the next era of cyber defense]]></title>
            <link rel="alternate" href="https://openai.com/index/scaling-trusted-access-for-cyber-defense/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1749"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-16T06:39:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1743</id>
            <title type="text"><![CDATA[This year’s insane timeline of hacks]]></title>
            <link rel="alternate" href="https://ringmast4r.substack.com/p/we-may-be-living-through-the-most" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1743"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-14T14:39:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1734</id>
            <title type="text"><![CDATA[A security scanner as fast as a linter – written in Rust]]></title>
            <link rel="alternate" href="https://github.com/peaktwilight/foxguard" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1734"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A linter-fast, local-first security scanning tool written in rust. - PwnKit-Labs/foxguard]]>
            </summary>
            <updated>2026-04-12T14:41:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1730</id>
            <title type="text"><![CDATA[Small models also found the vulnerabilities that Mythos found]]></title>
            <link rel="alternate" href="https://aisle.com/blog/ai-cybersecurity-after-mythos-the-jagged-frontier" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1730"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Why the moat is the system, not the model]]>
            </summary>
            <updated>2026-04-12T14:41:01+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1725</id>
            <title type="text"><![CDATA[Claude Mythos Preview \ red.anthropic.com]]></title>
            <link rel="alternate" href="https://red.anthropic.com/2026/mythos-preview/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1725"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-11T18:09:41+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1720</id>
            <title type="text"><![CDATA[Open Source Security at Astral]]></title>
            <link rel="alternate" href="https://astral.sh/blog/open-source-security-at-astral" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1720"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Insights and guidance from our engineering team on how Astral secures its tools.]]>
            </summary>
            <updated>2026-04-10T01:14:38+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1715</id>
            <title type="text"><![CDATA[System Card: Claude Mythos Preview [pdf]]]></title>
            <link rel="alternate" href="https://www-cdn.anthropic.com/53566bf5440a10affd749724787c8913a2ae0841.pdf" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1715"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-08T14:30:02+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1706</id>
            <title type="text"><![CDATA[METATRON - Open-Source AI Penetration Testing Assistant Brings Local LLM Analysis to Linux]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/metatron-ai-penetration-testing/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1706"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A new open-source penetration testing framework called METATRON is gaining attention in the security research community for its fully offline, AI-driven approach to vulnerability assessment.]]>
            </summary>
            <updated>2026-04-07T09:04:14+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1694</id>
            <title type="text"><![CDATA[The Claude Code Source Leak: fake tools, frustration regexes, undercover mode]]></title>
            <link rel="alternate" href="https://alex000kim.com/posts/2026-03-31-claude-code-source-leak/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1694"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Anthropic accidentally shipped a source map in their npm package, exposing the full Claude Code source. Here&amp;#039;s what I found inside.]]>
            </summary>
            <updated>2026-04-01T18:32:37+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1693</id>
            <title type="text"><![CDATA[Claude Code&amp;#039;s source code has been leaked via a map file in their NPM registry]]></title>
            <link rel="alternate" href="https://twitter.com/Fried_rice/status/2038894956459290963" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1693"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-01T18:32:34+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1688</id>
            <title type="text"><![CDATA[axios@1.14.1 and axios@0.30.4 are compromised · Issue #10604 · axios/axios · GitHub]]></title>
            <link rel="alternate" href="https://github.com/axios/axios/issues/10604#issuecomment-4160410930" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1688"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[more details: https://www.stepsecurity.io/blog/axios-compromised-on-npm-malicious-versions-drop-remote-access-trojan Most likely, a maintainer&amp;#039;s GitHub and npm accounts are compromised as these issues are getting deleted. I have also rep...]]>
            </summary>
            <updated>2026-03-31T22:58:13+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1687</id>
            <title type="text"><![CDATA[Claude Code&amp;#039;s Entire Source Code Was Just Leaked via npm Source Maps — Here&amp;#039;s What&amp;#039;s Inside - DEV Community]]></title>
            <link rel="alternate" href="https://dev.to/gabrielanhaia/claude-codes-entire-source-code-was-just-leaked-via-npm-source-maps-heres-whats-inside-cjo" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1687"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A security researcher found Anthropic&amp;#039;s full CLI source code exposed through a source map file. 1,900 files. 512,000+ lines. Everything. Tagged with claudecode, security, typescript, ai.]]>
            </summary>
            <updated>2026-03-31T22:19:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1683</id>
            <title type="text"><![CDATA[Iran-linked hackers deliver ultimatum to Lockheed Martin staff – Australian Aviation]]></title>
            <link rel="alternate" href="https://australianaviation.com.au/2026/03/iran-linked-hackers-deliver-ultimatum-to-lockheed-martin-staff/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1683"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The named Lockheed Martin employees have been given a deadline of 48 hours to “cease cooperation with the Zionist regime and leave the occupied territories immediately”.]]>
            </summary>
            <updated>2026-03-30T07:26:56+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1682</id>
            <title type="text"><![CDATA[FBI confirms hack of Director Patel&amp;#039;s personal email inbox]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/fbi-confirms-hack-of-director-patels-personal-email-inbox/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1682"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Handala hackers associated with Iran have breached the personal email account of FBI Director Kash Patel and published photos and documents.]]>
            </summary>
            <updated>2026-03-30T07:26:05+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1665</id>
            <title type="text"><![CDATA[Trivy under attack again: Widespread GitHub Actions tag compromise secrets]]></title>
            <link rel="alternate" href="https://socket.dev/blog/trivy-under-attack-again-github-actions-compromise" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1665"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-25T00:51:37+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1657</id>
            <title type="text"><![CDATA[Attempts to post the latest Trivy security incident have been marked [dead]]]></title>
            <link rel="alternate" href="https://news.ycombinator.com/from?site=github.com%2Faquasecurity" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1657"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-22T14:12:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1653</id>
            <title type="text"><![CDATA[Trivy ecosystem supply chain briefly compromised]]></title>
            <link rel="alternate" href="https://github.com/aquasecurity/trivy/security/advisories/GHSA-69fq-xp46-6x23" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1653"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[GitHub is where people build software. More than 150 million people use GitHub to discover, fork, and contribute to over 420 million projects.]]>
            </summary>
            <updated>2026-03-22T14:11:56+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1652</id>
            <title type="text"><![CDATA[Trivy Security incident 2026-03-19]]></title>
            <link rel="alternate" href="https://github.com/aquasecurity/trivy/discussions/10425" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1652"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Trivy Security incident 2026-03-19]]>
            </summary>
            <updated>2026-03-22T14:11:54+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1647</id>
            <title type="text"><![CDATA[TeamPCP deploys CanisterWorm on NPM following Trivy compromise]]></title>
            <link rel="alternate" href="https://www.aikido.dev/blog/teampcp-deploys-worm-npm-trivy-compromise" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1647"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-21T10:34:27+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1637</id>
            <title type="text"><![CDATA[Switzerland built an alternative to BGP. Nobody noticed • The Register]]></title>
            <link rel="alternate" href="https://www.theregister.com/2026/03/17/switzerland_bgp_alternative/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1637"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Feature: SCION: Proven in banking and healthcare, slow to spread everywhere else]]>
            </summary>
            <updated>2026-03-19T10:06:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1632</id>
            <title type="text"><![CDATA[VulHunt: Open-source vulnerability detection framework - Help Net Security]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2026/03/16/vulhunt-open-source-vulnerability-detection-framework/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1632"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Binarly has published VulHunt Community Edition, making the core scanning engine from Binarly&amp;#039;s commercial Transparency Platform available to independent]]>
            </summary>
            <updated>2026-03-17T19:12:52+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1614</id>
            <title type="text"><![CDATA[I found 39 Algolia admin keys exposed across open source documentation sites]]></title>
            <link rel="alternate" href="https://benzimmermann.dev/blog/algolia-docsearch-admin-keys" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1614"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A systematic audit of Algolia DocSearch found 39 admin API keys exposed across projects like Home Assistant, KEDA, and vcluster.]]>
            </summary>
            <updated>2026-03-14T15:58:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1605</id>
            <title type="text"><![CDATA[Bucketsquatting is (finally) dead]]></title>
            <link rel="alternate" href="https://onecloudplease.com/blog/bucketsquatting-is-finally-dead" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1605"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[For a decade, I have been working with AWS and third-party security teams to resolve bucketsquatting / bucketsniping issues in AWS S3. Finally, I am happy to say AWS now has a solution to the problem, and it changes the way you should name your buckets.]]>
            </summary>
            <updated>2026-03-13T20:32:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1601</id>
            <title type="text"><![CDATA[Google closes deal to acquire Wiz]]></title>
            <link rel="alternate" href="https://www.wiz.io/blog/google-closes-deal-to-acquire-wiz" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1601"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-12T14:06:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1581</id>
            <title type="text"><![CDATA[Wikipedia was in read-only mode following mass admin account compromise]]></title>
            <link rel="alternate" href="https://www.wikimediastatus.net" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1581"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Welcome to Wikimedia&amp;#039;s home for real-time and historical data on system performance.]]>
            </summary>
            <updated>2026-03-06T14:01:54+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1580</id>
            <title type="text"><![CDATA[A GitHub Issue Title Compromised 4k Developer Machines]]></title>
            <link rel="alternate" href="https://grith.ai/blog/clinejection-when-your-ai-tool-installs-another" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1580"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A prompt injection in a GitHub issue triggered a chain reaction that ended with 4,000 developers getting OpenClaw installed without consent. The attack composes well-understood vulnerabilities into something new: one AI tool bootstrapping another.]]>
            </summary>
            <updated>2026-03-06T14:01:50+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1535</id>
            <title type="text"><![CDATA[Turn Dependabot Off]]></title>
            <link rel="alternate" href="https://words.filippo.io/dependabot/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1535"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[I recommend turning Dependabot off and replacing it with a pair of scheduled GitHub Actions, one running govulncheck, and the other running CI against the latest version of your dependencies.]]>
            </summary>
            <updated>2026-02-21T13:58:58+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1522</id>
            <title type="text"><![CDATA[Ghidra by NSA]]></title>
            <link rel="alternate" href="https://github.com/NationalSecurityAgency/ghidra" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1522"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Ghidra is a software reverse engineering (SRE) framework - NationalSecurityAgency/ghidra]]>
            </summary>
            <updated>2026-02-17T14:10:59+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1510</id>
            <title type="text"><![CDATA[The Israeli Spyware Firm That Accidentally Just Exposed Itself]]></title>
            <link rel="alternate" href="https://ahmedeldin.substack.com/p/the-israeli-spyware-firm-that-accidentally" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1510"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Israeli surveillance company Paragon Solutions briefly exposed its own spyware dashboard on LinkedIn, revealing the hidden architecture of a billion-dollar surveillance empire built on the backs of journalists, activists, and ordinary people.]]>
            </summary>
            <updated>2026-02-15T08:21:26+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1503</id>
            <title type="text"><![CDATA[Sandwich Bill of Materials]]></title>
            <link rel="alternate" href="https://nesbitt.io/2026/02/08/sandwich-bill-of-materials.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1503"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[SBOM 1.0: A specification for sandwich supply chain transparency.]]>
            </summary>
            <updated>2026-02-14T14:02:21+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1491</id>
            <title type="text"><![CDATA[Windows Notepad App Remote Code Execution Vulnerability]]></title>
            <link rel="alternate" href="https://www.cve.org/CVERecord?id=CVE-2026-20841" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1491"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-02-12T00:47:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1489</id>
            <title type="text"><![CDATA[The Day the Telnet Died]]></title>
            <link rel="alternate" href="https://www.labs.greynoise.io/grimoire/2026-02-10-telnet-falls-silent/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1489"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[On January 14, 2026, global telnet traffic observed by GreyNoise sensors fell off a cliff. A 59% sustained reduction, eighteen ASNs going completely silent, five countries vanishing from our data entirely. Six days later, CVE-2026-24061 dropped. Coincidence is one explanation.]]>
            </summary>
            <updated>2026-02-12T00:47:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1477</id>
            <title type="text"><![CDATA[Microsoft open-sources LiteBox, a security-focused library OS]]></title>
            <link rel="alternate" href="https://github.com/microsoft/litebox" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1477"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A security-focused library OS supporting kernel- and user-mode execution - microsoft/litebox]]>
            </summary>
            <updated>2026-02-07T14:01:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1465</id>
            <title type="text"><![CDATA[Opus 4.6 uncovers 500 zero-day flaws in open-source code]]></title>
            <link rel="alternate" href="https://www.axios.com/2026/02/05/anthropic-claude-opus-46-software-hunting" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1465"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-02-06T14:07:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1456</id>
            <title type="text"><![CDATA[Kusari]]></title>
            <link rel="alternate" href="https://us.kusari.cloud/signup" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1456"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-02-04T07:43:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1449</id>
            <title type="text"><![CDATA[NONO - Secure Shell for AI Agents]]></title>
            <link rel="alternate" href="https://nono.sh/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1449"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[OS-enforced capability sandbox for running untrusted AI agents. No escape hatch. Works with Claude, GPT, and any AI agent.]]>
            </summary>
            <updated>2026-02-02T12:10:45+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1425</id>
            <title type="text"><![CDATA[Show HN: Fence – Sandbox CLI commands with network/filesystem restrictions]]></title>
            <link rel="alternate" href="https://github.com/Use-Tusk/fence" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1425"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Lightweight, container-free sandbox for running commands with network and filesystem restrictions - Use-Tusk/fence]]>
            </summary>
            <updated>2026-01-26T13:50:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1394</id>
            <title type="text"><![CDATA[Supply Chain Vuln Compromised Core AWS GitHub Repos &amp;amp; Threatened the AWS Console]]></title>
            <link rel="alternate" href="https://www.wiz.io/blog/wiz-research-codebreach-vulnerability-aws-codebuild" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1394"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-16T06:16:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1385</id>
            <title type="text"><![CDATA[Ansible battle tested hardening for Linux, SSH, Nginx, MySQL]]></title>
            <link rel="alternate" href="https://github.com/dev-sec/ansible-collection-hardening" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1385"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[This Ansible collection provides battle tested hardening for Linux, SSH, nginx, MySQL - dev-sec/ansible-collection-hardening]]>
            </summary>
            <updated>2026-01-13T13:22:12+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1329</id>
            <title type="text"><![CDATA[Gpg.fail]]></title>
            <link rel="alternate" href="https://gpg.fail" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1329"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-28T13:51:29+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1260</id>
            <title type="text"><![CDATA[The Letter — Stop Hacklore!]]></title>
            <link rel="alternate" href="https://www.hacklore.org/letter" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1260"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-25T11:20:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1259</id>
            <title type="text"><![CDATA[Years-old bugs in open source took out major clouds at risk • The Register]]></title>
            <link rel="alternate" href="https://www.theregister.com/2025/11/24/fluent_bit_cves/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1259"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[: Fluent Bit has 15B+ deployments … and 5 newly assigned CVEs]]>
            </summary>
            <updated>2025-11-25T07:23:28+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1258</id>
            <title type="text"><![CDATA[Shai-Hulud Returns: Over 300 NPM Packages Infected]]></title>
            <link rel="alternate" href="https://helixguard.ai/blog/malicious-sha1hulud-2025-11-24" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1258"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[HelixGuard provides open-source research on supply chain malware and vulnerability intelligence. Advanced threat detection tools and datasets for the security community.]]>
            </summary>
            <updated>2025-11-25T00:26:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1246</id>
            <title type="text"><![CDATA[Researchers discover security vulnerability in WhatsApp]]></title>
            <link rel="alternate" href="https://www.univie.ac.at/en/news/detail/forscherinnen-entdecken-grosse-sicherheitsluecke-in-whatsapp" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1246"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Worldwide enumeration of accounts was possible due to a —now closed— privacy vulnerability]]>
            </summary>
            <updated>2025-11-20T13:13:49+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1239</id>
            <title type="text"><![CDATA[Azure hit by 15 Tbps DDoS attack using 500k IP addresses]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/microsoft/microsoft-aisuru-botnet-used-500-000-ips-in-15-tbps-azure-ddos-attack/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1239"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Microsoft said today that the Aisuru botnet hit its Azure network with a 15.72 terabits per second (Tbps) DDoS attack, launched from over 500,000 IP addresses.]]>
            </summary>
            <updated>2025-11-18T13:16:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1236</id>
            <title type="text"><![CDATA[Azure hit by 15 Tbps DDoS attack using 500k IP addresses]]></title>
            <link rel="alternate" href="https://techcommunity.microsoft.com/blog/azureinfrastructureblog/defending-the-cloud-azure-neutralized-a-record-breaking-15-tbps-ddos-attack/4470422" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1236"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-18T06:28:53+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1220</id>
            <title type="text"><![CDATA[sudo-rs Affected By Multiple Security Vulnerabilities - Impacting Ubuntu 25.10 - Phoronix]]></title>
            <link rel="alternate" href="https://www.phoronix.com/news/sudo-rs-security-ubuntu-25.10" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1220"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Ubuntu 25.10 transition to using some Rust system utilities continues proving quite rocky]]>
            </summary>
            <updated>2025-11-13T11:01:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1216</id>
            <title type="text"><![CDATA[FFmpeg to Google: Fund us or stop sending bugs]]></title>
            <link rel="alternate" href="https://thenewstack.io/ffmpeg-to-google-fund-us-or-stop-sending-bugs/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1216"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A lively discussion about open source, security, and who pays the bills has erupted on Twitter.]]>
            </summary>
            <updated>2025-11-17T15:57:50+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1197</id>
            <title type="text"><![CDATA[Google gets the US government&amp;#039;s green light to acquire Wiz for $32B | TechCrunch]]></title>
            <link rel="alternate" href="https://techcrunch.com/2025/11/05/google-gets-the-us-governments-green-light-to-acquire-wiz-for-32b/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1197"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Google announced its intent to acquire cloud security company Wiz in March and the deal is now on track to close in early 2026.]]>
            </summary>
            <updated>2025-11-06T13:32:27+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1196</id>
            <title type="text"><![CDATA[Inside the breach that broke the internet: The untold story of Log4Shell - The GitHub Blog]]></title>
            <link rel="alternate" href="https://github.blog/open-source/inside-the-breach-that-broke-the-internet-the-untold-story-of-log4shell/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1196"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Log4Shell proved that open source security isn&amp;#039;t guaranteed and isn’t just a code problem.]]>
            </summary>
            <updated>2025-11-06T08:41:31+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1195</id>
            <title type="text"><![CDATA[Louvre Heist Fallout Reveals Museum’s Video Security Password Was &amp;#039;Louvre&amp;#039;]]></title>
            <link rel="alternate" href="https://www.vice.com/en/article/louvre-heist-fallout-reveals-museums-video-security-password-was-louvre/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1195"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Louvre heist was an instant joke online — a joke that gets even funnier when you learn the museum&amp;#039;s video surveillance password.]]>
            </summary>
            <updated>2025-11-06T08:29:59+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1184</id>
            <title type="text"><![CDATA[MCP-Scanner – Scan MCP Servers for vulnerabilities]]></title>
            <link rel="alternate" href="https://github.com/cisco-ai-defense/mcp-scanner" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1184"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Scan MCP Servers for vulnerabilities. Contribute to cisco-ai-defense/mcp-scanner development by creating an account on GitHub.]]>
            </summary>
            <updated>2025-10-28T13:10:49+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1149</id>
            <title type="text"><![CDATA[Secure AI/ML-Driven Software Development (LFEL1012): Learn to Build Safer Software with AI]]></title>
            <link rel="alternate" href="https://openssf.org/blog/2025/10/16/a-new-course-on-secure-ai-ml-driven-software-development/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1149"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Learn how to use AI code assistants securely with OpenSSF’s new free course, Secure AI/ML-Driven Software Development (LFEL1012) by David A. Wheeler. Build safer software with practical AI security guidance.]]>
            </summary>
            <updated>2025-10-17T07:16:15+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1135</id>
            <title type="text"><![CDATA[OpenSSH Vulnerability Exploited Via ProxyCommand to Execute Remote Code]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/openssh-vulnerability-proxycommand/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1135"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A new command injection vulnerability in OpenSSH, tracked as CVE-2025-61984, has been disclosed, which could allow an attacker to achieve remote code execution on a victim&amp;#039;s machine.]]>
            </summary>
            <updated>2025-10-07T20:51:14+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1133</id>
            <title type="text"><![CDATA[Introducing CodeMender: an AI agent for code security - Google DeepMind]]></title>
            <link rel="alternate" href="https://deepmind.google/discover/blog/introducing-codemender-an-ai-agent-for-code-security/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1133"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[CodeMender is a new AI-powered agent that improves code security automatically. It instantly patches new software vulnerabilities, and rewrites and secures existing code, eliminating entire...]]>
            </summary>
            <updated>2025-10-07T09:45:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1132</id>
            <title type="text"><![CDATA[Red Hat data breach escalates as ShinyHunters joins extortion]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/red-hat-data-breach-escalates-as-shinyhunters-joins-extortion/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1132"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Enterprise software giant Red Hat is now being extorted by the ShinyHunters gang, with samples of stolen customer engagement reports (CERs) leaked on their data leak site.]]>
            </summary>
            <updated>2025-10-07T07:40:50+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1124</id>
            <title type="text"><![CDATA[Almost 1 billion Salesforce records stolen, hacker group claims]]></title>
            <link rel="alternate" href="https://www.reuters.com/sustainability/boards-policy-regulation/almost-1-billion-salesforce-records-stolen-hacker-group-claims-2025-10-03/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1124"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Cybercriminals connected to a recent string of ransomware attacks on major British retailers said on Friday they had stolen almost 1 billion records from cloud technology giant Salesforce, opens new tab by focusing on companies that use its software]]>
            </summary>
            <updated>2025-10-05T12:50:44+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1123</id>
            <title type="text"><![CDATA[Discord customer service data breach leaks user info and scanned photo IDs | The Verge]]></title>
            <link rel="alternate" href="https://www.theverge.com/news/792032/discord-customer-service-data-breach-hack" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1123"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[One of Discord’s third-party customer service providers was compromised by an “unauthorized party” that may have accessed things like names, usernames, and emails.]]>
            </summary>
            <updated>2025-10-04T20:44:56+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1119</id>
            <title type="text"><![CDATA[From MCP to shell: MCP auth flaws enable RCE in Claude Code, Gemini CLI and more]]></title>
            <link rel="alternate" href="https://verialabs.com/blog/from-mcp-to-shell/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1119"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[How MCP Authentication Flaws Enable RCE in Claude Code, Gemini CLI, and More]]>
            </summary>
            <updated>2025-10-06T18:14:49+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1110</id>
            <title type="text"><![CDATA[Red Hat confirms security incident after hackers claim GitHub breach]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/red-hat-confirms-security-incident-after-hackers-claim-github-breach/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1110"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[An extortion group calling itself the Crimson Collective claims to have breached Red Hat&amp;#039;s private GitHub repositories, stealing nearly 570GB of compressed data across 28,000 internal projects.]]>
            </summary>
            <updated>2025-10-02T21:57:01+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1109</id>
            <title type="text"><![CDATA[GitHub - francoismichel/ssh3: SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: https://datatracker.ietf.org/doc/draft-michel-ssh3/]]></title>
            <link rel="alternate" href="https://github.com/francoismichel/ssh3" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1109"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[SSH3: faster and rich secure shell using HTTP/3, checkout our article here: https://arxiv.org/abs/2312.08396 and our Internet-Draft: https://datatracker.ietf.org/doc/draft-michel-ssh3/ - francoismichel/ssh3]]>
            </summary>
            <updated>2025-09-28T08:26:14+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1107</id>
            <title type="text"><![CDATA[OpenSSF to freeloaders: Open source infra isn&amp;#039;t free • The Register]]></title>
            <link rel="alternate" href="https://www.theregister.com/2025/09/23/openssf_open_source_infrastructure/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1107"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[: Foundations say billions of downloads rely on registries running on fumes – and someone&amp;#039;s gotta pay the bills]]>
            </summary>
            <updated>2025-09-24T15:01:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1103</id>
            <title type="text"><![CDATA[One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens - dirkjanm.io]]></title>
            <link rel="alternate" href="https://dirkjanm.io/obtaining-global-admin-in-every-entra-id-tenant-with-actor-tokens/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1103"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise every Entra ID tenant in the world (except probably those in national cloud deployments). If you are an Entra ID admin reading this, yes that means complete access to your tenant. The vulnerability consisted of two components: undocumented impersonation tokens that Microsoft uses in their backend for service-to-service (S2S) communication, called “Actor tokens”, and a critical vulnerability in the (legacy) Azure AD Graph API that did not properly validate the originating tenant, allowing these tokens to be used for cross-tenant access.]]>
            </summary>
            <updated>2025-09-18T15:25:51+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1099</id>
            <title type="text"><![CDATA[We all dodged a bullet - Xe Iaso]]></title>
            <link rel="alternate" href="https://xeiaso.net/notes/2025/we-dodged-a-bullet/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1099"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[That NPM attack could have been so much worse.]]>
            </summary>
            <updated>2025-09-10T10:56:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1094</id>
            <title type="text"><![CDATA[Addressing the unauthorized issuance of multiple TLS certificates for 1.1.1.1]]></title>
            <link rel="alternate" href="https://blog.cloudflare.com/unauthorized-issuance-of-certificates-for-1-1-1-1/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1094"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Unauthorized TLS certificates were issued for 1.1.1.1 by a Certification Authority without permission from Cloudflare. These rogue certificates have now been revoked. Read our blog to see how this could affect you.]]>
            </summary>
            <updated>2025-09-05T06:16:26+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1069</id>
            <title type="text"><![CDATA[OpenSSH: Post-Quantum Cryptography]]></title>
            <link rel="alternate" href="https://www.openssh.com/pq.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1069"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[OpenSSH post quantum cryptography]]>
            </summary>
            <updated>2025-08-12T07:11:15+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1066</id>
            <title type="text"><![CDATA[The Critical Flaw in CVE Scoring]]></title>
            <link rel="alternate" href="https://www.darkreading.com/vulnerabilities-threats/critical-flaw-cve-scoring" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1066"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[With informed decision-making, organizations can strengthen their overall resilience and maintain the agility needed to adapt to emerging threats, without sacrificing innovation or productivity.]]>
            </summary>
            <updated>2025-10-05T12:50:35+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1059</id>
            <title type="text"><![CDATA[Cracking the Vault: how we found zero-day flaws in authentication, identity, and authorization in HashiCorp Vault - Cyata | The Control Plane for Agentic Identity]]></title>
            <link rel="alternate" href="https://cyata.ai/blog/cracking-the-vault-how-we-found-zero-day-flaws-in-authentication-identity-and-authorization-in-hashicorp-vault/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1059"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Introduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust model, they are the trust model. In other words, if your vault is compromised, your […]]]>
            </summary>
            <updated>2025-08-07T18:54:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1037</id>
            <title type="text"><![CDATA[Fully Homomorphic Encryption and the Dawn of A Truly Private Internet]]></title>
            <link rel="alternate" href="https://bozmen.io/fhe" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1037"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Barış Özmen Blog]]>
            </summary>
            <updated>2025-07-18T18:59:21+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1036</id>
            <title type="text"><![CDATA[Poor Passwords Tattle on AI Hiring Bot Maker Paradox.ai – Krebs on Security]]></title>
            <link rel="alternate" href="https://krebsonsecurity.com/2025/07/poor-passwords-tattle-on-ai-hiring-bot-maker-paradox-ai/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1036"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[People gonna people]]>
            </summary>
            <updated>2025-07-18T12:45:58+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1030</id>
            <title type="text"><![CDATA[GitHub - Forceu/Gokapi: Lightweight selfhosted Firefox Send alternative without public upload. AWS S3 supported.]]></title>
            <link rel="alternate" href="https://github.com/Forceu/Gokapi" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1030"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Lightweight selfhosted Firefox Send alternative without public upload. AWS S3 supported. - Forceu/Gokapi]]>
            </summary>
            <updated>2025-07-13T12:07:37+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1027</id>
            <title type="text"><![CDATA[@bagder.mastodon.social.ap.brid.gy on Bluesky]]></title>
            <link rel="alternate" href="https://bsky.app/profile/bagder.mastodon.social.ap.brid.gy/post/3ltodxecunfy2" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1027"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[It has officially begun. The CRA info request counter is no longer at zero.]]>
            </summary>
            <updated>2025-07-11T20:45:03+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/1010</id>
            <title type="text"><![CDATA[China breaks RSA encryption with a quantum computer - Earth.com]]></title>
            <link rel="alternate" href="https://www.earth.com/news/china-breaks-rsa-encryption-with-a-quantum-computer-threatening-global-data-security/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/1010"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Researchers in Shanghai break record by factoring 22-bit RSA key using quantum computing, threatening future cryptographic keys.]]>
            </summary>
            <updated>2025-06-25T20:47:33+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/998</id>
            <title type="text"><![CDATA[Defending the Internet: how Cloudflare blocked a monumental 7.3 Tbps DDoS attack]]></title>
            <link rel="alternate" href="https://blog.cloudflare.com/defending-the-internet-how-cloudflare-blocked-a-monumental-7-3-tbps-ddos/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/998"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[In mid-May 2025, blocked the largest DDoS attack ever recorded: a staggering 7.3 terabits per second (Tbps).]]>
            </summary>
            <updated>2025-06-19T23:22:26+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/997</id>
            <title type="text"><![CDATA[Dangerous by default: Insecure GitHub Actions found in MITRE, Splunk, and other open source repositories | Sysdig]]></title>
            <link rel="alternate" href="https://sysdig.com/blog/insecure-github-actions-found-in-mitre-splunk-and-other-open-source-repositories/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/997"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Since its founding, the Sysdig Threat Research Team (TRT) has been committed to making the world a safer, more informed place. Upholding this commitment]]>
            </summary>
            <updated>2025-06-19T21:49:27+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/978</id>
            <title type="text"><![CDATA[Google Online Security Blog: On Fire Drills and Phishing Tests]]></title>
            <link rel="alternate" href="https://security.googleblog.com/2024/05/on-fire-drills-and-phishing-tests.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/978"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-06-13T11:32:53+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/975</id>
            <title type="text"><![CDATA[Frequent reauth doesn&amp;#039;t make you more secure]]></title>
            <link rel="alternate" href="https://tailscale.com/blog/frequent-reath-security" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/975"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Securely connect to anything on the internet with Tailscale. Built on WireGuard®️, Tailscale enables you to make finely configurable connections, secured end-to-end according to zero trust principles, between any resources on any infrastructure.]]>
            </summary>
            <updated>2025-06-13T09:45:10+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/974</id>
            <title type="text"><![CDATA[Scammers impersonating the ASD&amp;#039;s ACSC | Cyber.gov.au]]></title>
            <link rel="alternate" href="https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/email-scammers-impersonating-asds-acsc" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/974"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Scammers are impersonating the ASD&amp;#039;s ACSC sending out phishing emails to the public with the email content suggesting to download a malicious antivirus program.]]>
            </summary>
            <updated>2025-06-13T08:33:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/972</id>
            <title type="text"><![CDATA[Ubuntu 25.10 Replaces sudo With a Rust-Based Equivalent - The New Stack]]></title>
            <link rel="alternate" href="https://thenewstack.io/ubuntu-25-10-replaces-sudo-with-a-rust-based-equivalent/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/972"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The new sudo-rs is meant to be a near drop-in replacement for sudo, but some of the less secure aspects of sudo will not be supported.]]>
            </summary>
            <updated>2025-06-12T18:33:33+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/957</id>
            <title type="text"><![CDATA[Designing Blue Team playbooks with Wazuh for proactive incident response]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/designing-blue-team-playbooks-with-wazuh-for-proactive-incident-response/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/957"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Blue Team playbooks are essential—but tools like Wazuh take them to the next level. From credential dumping to web shells and brute-force attacks, see how Wazuh strengthens real-time detection and automated response.]]>
            </summary>
            <updated>2025-06-10T05:13:42+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/954</id>
            <title type="text"><![CDATA[Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/kali-gpt/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/954"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Kali GPT, a specialized AI model built on GPT-4 architecture, has been specifically developed to integrate seamlessly with Kali Linux, offering unprecedented support for offensive security professionals and students alike.]]>
            </summary>
            <updated>2025-06-08T08:29:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/950</id>
            <title type="text"><![CDATA[Covert Web-to-App Tracking via Localhost on Android]]></title>
            <link rel="alternate" href="https://localmess.github.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/950"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Facebook and Yandex link Web and App usage via a localhost network connection]]>
            </summary>
            <updated>2025-06-10T08:50:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/911</id>
            <title type="text"><![CDATA[This no-code, security-focused n8n alternative works with everything, and it&amp;#039;s free]]></title>
            <link rel="alternate" href="https://www.xda-developers.com/cloud-based-n8n-alternative/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/911"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tines is worth trying out for a fully cloud-based, secure solution to automation.]]>
            </summary>
            <updated>2025-06-03T22:52:05+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/907</id>
            <title type="text"><![CDATA[Using artifact attestations to establish provenance for builds - GitHub Docs]]></title>
            <link rel="alternate" href="https://docs.github.com/en/actions/security-for-github-actions/using-artifact-attestations/using-artifact-attestations-to-establish-provenance-for-builds#verifying-artifact-attestations-with-the-github-cli" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/907"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-31T15:31:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/904</id>
            <title type="text"><![CDATA[GitHub - OperantAI/woodpecker: Red Teaming for AI and Cloud]]></title>
            <link rel="alternate" href="https://github.com/OperantAI/woodpecker" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/904"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Red Teaming for AI and Cloud. Contribute to OperantAI/woodpecker development by creating an account on GitHub.]]>
            </summary>
            <updated>2025-05-29T09:21:24+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/903</id>
            <title type="text"><![CDATA[Securing CI/CD workflows with Wazuh]]></title>
            <link rel="alternate" href="https://thehackernews.com/2025/05/securing-cicd-workflows-with-wazuh.html?m=1" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/903"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:12:10+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/902</id>
            <title type="text"><![CDATA[ASD releases joint advice on AI data security – ARN]]></title>
            <link rel="alternate" href="https://www.arnnet.com.au/article/3993677/asd-releases-joint-advice-on-ai-data-security.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/902"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Australian Securities Directorate (ASD), in collaboration with international partners, has come with new advice on best practices for securing data throughout the artificial intelligence (AI) and machine learning (ML) system lifecycle.]]>
            </summary>
            <updated>2025-05-28T01:12:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/900</id>
            <title type="text"><![CDATA[KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS]]></title>
            <link rel="alternate" href="https://krebsonsecurity.com/2025/05/krebsonsecurity-hit-with-near-record-6-3-tbps-ddos/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/900"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[KrebsOnSecurity last week was hit by a near record distributed denial-of-service (DDoS) attack that clocked in at more than 6.3 terabits of data per second (a terabit is one trillion bits of data). The brief attack appears to have been…]]>
            </summary>
            <updated>2025-05-28T01:12:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/899</id>
            <title type="text"><![CDATA[Have I Been Pwned 2.0 is Now Live!]]></title>
            <link rel="alternate" href="https://www.troyhunt.com/have-i-been-pwned-2-0-is-now-live/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/899"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[This has been a very long time coming, but finally, after a marathon effort, the brand new Have I Been Pwned website is now live!




Feb last year is when I made the first commit to the public repo for the rebranded service, and we soft-launched the new brand in]]>
            </summary>
            <updated>2025-05-28T01:12:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/893</id>
            <title type="text"><![CDATA[A First Glimpse of the Starlink User Ternimal]]></title>
            <link rel="alternate" href="https://www.darknavy.org/blog/a_first_glimpse_of_the_starlink_user_ternimal/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/893"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:11:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/890</id>
            <title type="text"><![CDATA[Hardening GitHub Actions: Lessons from Recent Attacks | Wiz Blog]]></title>
            <link rel="alternate" href="https://www.wiz.io/blog/github-actions-security-guide" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/890"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:10:08+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/862</id>
            <title type="text"><![CDATA[CISA extends funding to ensure &amp;#039;no lapse in critical CVE services&amp;#039;]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/cisa-extends-funding-to-ensure-no-lapse-in-critical-cve-services/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/862"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[CISA says the U.S. government has extended MITRE&amp;#039;s funding to ensure no continuity issues with the critical Common Vulnerabilities and Exposures (CVE) program.]]>
            </summary>
            <updated>2025-05-28T01:06:03+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/861</id>
            <title type="text"><![CDATA[CVE Foundation]]></title>
            <link rel="alternate" href="https://www.thecvefoundation.org/home" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/861"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Common Vulnerabilities and Exposures (CVE) Program has become the cornerstone of vulnerability management. Nearly all technology vendors and service providers identify vulnerabilities with CVEs when they publish security advisories. Most security products and services related to vulnerabilities]]>
            </summary>
            <updated>2025-05-28T01:05:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/860</id>
            <title type="text"><![CDATA[CVE program faces swift end after DHS fails to renew contract. Leaving security flaw tracking in limbo]]></title>
            <link rel="alternate" href="https://www.csoonline.com/article/3963190/cve-program-faces-swift-end-after-dhs-fails-to-renew-contract-leaving-security-flaw-tracking-in-limbo.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/860"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[After DHS did not renew its funding contract for reasons unspecified, MITRE’s 25-year-old Common Vulnerabilities and Exposures (CVE) program was slated for an abrupt shutdown on April 16, which would have left security flaw tracking in limbo. CISA stepped in to provide a bridge.]]>
            </summary>
            <updated>2025-05-28T01:05:10+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/857</id>
            <title type="text"><![CDATA[The CVE program for tracking security flaws is about to lose federal funding]]></title>
            <link rel="alternate" href="https://www.theverge.com/news/649314/cve-mitre-funding-vulnerabilities-exposures-funding" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/857"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The federally funded organization behind the Common Vulnerabilities and Exposures (CVE) program confirmed that its contract to support the system will expire on April 16th.]]>
            </summary>
            <updated>2025-05-28T01:05:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/854</id>
            <title type="text"><![CDATA[Enhancing your DevSecOps with Wazuh. The open source XDR platform]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/enhancing-your-devsecops-with-wazuh-the-open-source-xdr-platform/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/854"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Security shouldn&amp;#039;t wait until the end of development. Wazuh brings real-time threat detection, compliance, and vulnerability scanning into your DevOps pipeline—powering a stronger DevSecOps strategy from day one. Learn more about how Wazuh can help secure your development cycle.]]>
            </summary>
            <updated>2025-05-28T01:04:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/846</id>
            <title type="text"><![CDATA[Frida Penetration Testing Tool Kit Released With New APIs for Threat Monitoring]]></title>
            <link rel="alternate" href="https://search.app/1yiQn4N9PWiF9ZtL8" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/846"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Frida 16.7.0, the latest version of the popular dynamic instrumentation toolkit, has been released with powerful new APIs specifically.]]>
            </summary>
            <updated>2025-05-28T01:03:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/844</id>
            <title type="text"><![CDATA[The “S” in MCP Stands for Security]]></title>
            <link rel="alternate" href="https://elenacross7.medium.com/%EF%B8%8F-the-s-in-mcp-stands-for-security-91407b33ed6b" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/844"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:03:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/843</id>
            <title type="text"><![CDATA[Google launches Sec-Gemini v1. A new experimental cybersecurity model]]></title>
            <link rel="alternate" href="https://security.googleblog.com/2025/04/google-launches-sec-gemini-v1-new.html?m=1" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/843"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:02:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/833</id>
            <title type="text"><![CDATA[CodeQLEAKED – Public Secrets Exposure Leads to Supply Chain Attack on GitHub CodeQL]]></title>
            <link rel="alternate" href="https://www.praetorian.com/blog/codeqleaked-public-secrets-exposure-leads-to-supply-chain-attack-on-github-codeql/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/833"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[An exposed GitHub token could have been used to launch a supply chain attack on GitHub CodeQL, resulting in source code exposure and repository tampering of CodeQL users.]]>
            </summary>
            <updated>2025-05-28T01:01:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/831</id>
            <title type="text"><![CDATA[Remote Code Execution Vulnerabilities in Ingress NGINX | Wiz Blog]]></title>
            <link rel="alternate" href="https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/831"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:00:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/830</id>
            <title type="text"><![CDATA[https://cybernews.com/security/troy-hunt-falls-victim-to-phishing-attack/]]></title>
            <link rel="alternate" href="https://cybernews.com/security/troy-hunt-falls-victim-to-phishing-attack/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/830"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:00:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/826</id>
            <title type="text"><![CDATA[reviewdog/action-setup]]></title>
            <link rel="alternate" href="https://www.wiz.io/blog/new-github-action-supply-chain-attack-reviewdog-action-setup" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/826"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T01:00:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/824</id>
            <title type="text"><![CDATA[GitHub Actions now supports a digest for validating your artifacts at runtime - GitHub Changelog]]></title>
            <link rel="alternate" href="https://github.blog/changelog/2025-03-18-github-actions-now-supports-a-digest-for-validating-your-artifacts-at-runtime/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/824"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Developers using upload-artifact and download-artifact in their Actions workflows can now ensure the integrity of their artifacts with the new SHA256 digest. This feature automatically verifies that the artifact uploaded…]]>
            </summary>
            <updated>2025-05-28T00:59:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/818</id>
            <title type="text"><![CDATA[Harden-Runner detection: tj-actions/changed-files action is compromised - StepSecurity]]></title>
            <link rel="alternate" href="https://search.app/nz29ggeNi26oEF8q9" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/818"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T00:58:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/817</id>
            <title type="text"><![CDATA[Sign in as anyone: Bypassing SAML SSO authentication with parser differentials - The GitHub Blog]]></title>
            <link rel="alternate" href="https://github.blog/security/sign-in-as-anyone-bypassing-saml-sso-authentication-with-parser-differentials/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/817"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Critical authentication bypass vulnerabilities were discovered in ruby-saml up to version 1.17.0. See how they were uncovered.]]>
            </summary>
            <updated>2025-05-28T00:58:08+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/806</id>
            <title type="text"><![CDATA[OpenSSF Announces Initial Release of the Open Source Project Security Baseline – Open Source Securit]]></title>
            <link rel="alternate" href="https://openssf.org/press-release/2025/02/25/openssf-announces-initial-release-of-the-open-source-project-security-baseline/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/806"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The OpenSSF announces the Open Source Project Security Baseline (OSPS Baseline), a new framework to help open source projects enhance security through tiered best practices. Learn more about this initiative and how it aligns with global cybersecurity regulations.]]>
            </summary>
            <updated>2025-05-28T00:56:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/799</id>
            <title type="text"><![CDATA[Recent improvements to Artifact Attestations - GitHub Changelog]]></title>
            <link rel="alternate" href="https://github.blog/changelog/2025-02-18-recent-improvements-to-artifact-attestations/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/799"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[We released a collection of improvements to Artifact Attestations to make the verification of attestations easier and more consistent. Artifact Attestations let you create provenance signatures, which provide an unforgeable…]]>
            </summary>
            <updated>2025-05-28T00:55:08+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/784</id>
            <title type="text"><![CDATA[Paul Butler – Smuggling arbitrary data through an emoji]]></title>
            <link rel="alternate" href="https://paulbutler.org/2025/smuggling-arbitrary-data-through-an-emoji/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/784"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T00:52:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/781</id>
            <title type="text"><![CDATA[splunk/DECEIVE]]></title>
            <link rel="alternate" href="https://github.com/splunk/DECEIVE" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/781"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work! - splunk/DECEIVE]]>
            </summary>
            <updated>2025-05-28T00:52:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/755</id>
            <title type="text"><![CDATA[https://iterm2.com/downloads/stable/iTerm2-3_5_11.changelog]]></title>
            <link rel="alternate" href="https://iterm2.com/downloads/stable/iTerm2-3_5_11.changelog" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/755"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-05-28T00:48:04+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/745</id>
            <title type="text"><![CDATA[operational pgp - draft]]></title>
            <link rel="alternate" href="https://gist.github.com/grugq/03167bed45e774551155#file-gistfile1-md" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/745"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[operational pgp - draft. GitHub Gist: instantly share code, notes, and snippets.]]>
            </summary>
            <updated>2025-05-28T00:46:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/732</id>
            <title type="text"><![CDATA[GitHub - drduh/YubiKey-Guide: Guide to using YubiKey for GnuPG and SSH]]></title>
            <link rel="alternate" href="https://github.com/drduh/YubiKey-Guide" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/732"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Community guide to using YubiKey for GnuPG and SSH - protect secrets with hardware crypto. - drduh/YubiKey-Guide]]>
            </summary>
            <updated>2025-05-28T00:44:06+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/730</id>
            <title type="text"><![CDATA[Compromising OpenWrt Supply Chain via Truncated SHA-256 Collision and Command Injection - Flatt Secu]]></title>
            <link rel="alternate" href="https://flatt.tech/research/posts/compromising-openwrt-supply-chain-sha256-collision/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/730"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Introduction
Hello, I’m RyotaK (@ryotkak
), a security engineer at Flatt Security Inc.
A few days ago, I was upgrading my home lab network, and I decided to upgrade the OpenWrt
 on my router.1 After accessing the LuCI, which is the web interface of OpenWrt, I noticed that there is a section called Attended Sysupgrade, so I tried to upgrade the firmware using it.
After reading the description, I found that it states it builds new firmware using an online service.]]>
            </summary>
            <updated>2026-01-26T04:00:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/718</id>
            <title type="text"><![CDATA[New AWS Security Incident Response helps organizations respond to and recover from security events |]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/aws/new-aws-security-incident-response-helps-organizations-respond-to-and-recover-from-security-events/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/718"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[AWS introduces a new service to streamline security event response, providing automated triage, coordinated communication, and expert guidance to recover from cybersecurity threats.]]>
            </summary>
            <updated>2026-01-26T04:00:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/694</id>
            <title type="text"><![CDATA[Are we PEP 740 yet? 🔏]]></title>
            <link rel="alternate" href="https://trailofbits.github.io/are-we-pep740-yet/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/694"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-24T04:00:26+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/692</id>
            <title type="text"><![CDATA[Google Online Security Blog: Safer with Google: New intelligent real-time protections on Android to]]></title>
            <link rel="alternate" href="https://security.googleblog.com/2024/11/new-real-time-protections-on-Android.html?m=1" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/692"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-24T04:00:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/685</id>
            <title type="text"><![CDATA[FBI says hackers are sending fraudulent police data requests to tech giants to steal people&amp;#039;s privat]]></title>
            <link rel="alternate" href="https://techcrunch.com/2024/11/08/fbi-says-hackers-are-sending-fraudulent-police-data-requests-to-tech-giants-to-steal-peoples-private-information/?guccounter=1" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/685"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The warning is a rare admission from the FBI about the threat from fake emergency data requests submitted by hackers with access to police email accounts.]]>
            </summary>
            <updated>2026-01-21T04:00:52+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/681</id>
            <title type="text"><![CDATA[Google Claims World First As AI Finds 0-Day Security Vulnerability]]></title>
            <link rel="alternate" href="https://www.forbes.com/sites/daveywinder/2024/11/04/google-claims-world-first-as-ai-finds-0-day-security-vulnerability/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/681"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Google’s Project Zero hackers and DeepMind boffins have collaborated to uncover a zero-day security vulnerability in real-world code for the first time using AI.]]>
            </summary>
            <updated>2026-01-21T02:00:44+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/679</id>
            <title type="text"><![CDATA[Why Wiz really turned down Google’s $23B offer | TechCrunch]]></title>
            <link rel="alternate" href="https://techcrunch.com/2024/11/02/why-wiz-really-turned-down-googles-23b-offer/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/679"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Welcome back to Week in Review. This week, we&amp;#039;re coming at you right off the heels of TechCrunch Disrupt! If you missed it, we’re highlighting]]>
            </summary>
            <updated>2026-01-21T04:00:48+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/674</id>
            <title type="text"><![CDATA[OpenSSF Adds Minder as a Sandbox Project to Simplify the Integration and Use of Open Source Security]]></title>
            <link rel="alternate" href="https://openssf.org/blog/2024/10/28/openssf-adds-minder-as-a-sandbox-project-to-simplify-the-integration-and-use-of-open-source-security-tools/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/674"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-21T04:00:33+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/672</id>
            <title type="text"><![CDATA[dns recon &amp;amp; research -find &amp;amp; lookup dns records]]></title>
            <link rel="alternate" href="https://dnsdumpster.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/672"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Free domain research tool to discover hosts related to a domain. Find visible hosts from the attackers perspective for Red and Blue Teams.]]>
            </summary>
            <updated>2026-01-21T04:00:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/671</id>
            <title type="text"><![CDATA[&amp;#039;Shift Left&amp;#039; Triggers Security Soul Searching]]></title>
            <link rel="alternate" href="https://www.darkreading.com/application-security/shift-left-pushback-triggers-security-soul-searching" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/671"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-19T08:00:15+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/629</id>
            <title type="text"><![CDATA[Internet Archive hacked data breach impacts 31 million users]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/internet-archive-hacked-data-breach-impacts-31-million-users/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/629"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Internet Archive&amp;#039;s &amp;quot;The Wayback Machine&amp;quot; has suffered a data breach after a threat actor compromised the website and stole a user authentication database containing 31 million unique records.]]>
            </summary>
            <updated>2026-01-10T04:00:49+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/626</id>
            <title type="text"><![CDATA[Palo Alto Networks warns of firewall hijack bugs with public exploit]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/palo-alto-networks-warns-of-firewall-hijack-bugs-with-public-exploit/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/626"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Palo Alto Networks warned customers today to patch security vulnerabilities (with public exploit code) that can be chained to let attackers hijack PAN-OS firewalls.]]>
            </summary>
            <updated>2026-01-07T20:00:39+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/627</id>
            <title type="text"><![CDATA[The Australian government has introduced new cyber security laws. Here’s what you need to know]]></title>
            <link rel="alternate" href="https://theconversation.com/the-australian-government-has-introduced-new-cyber-security-laws-heres-what-you-need-to-know-240889" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/627"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The long-awaited law, if passed, will be Australia’s first standalone cyber security act.]]>
            </summary>
            <updated>2026-01-07T20:00:40+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/625</id>
            <title type="text"><![CDATA[How open source SIEM and XDR tackle evolving threats]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/how-open-source-siem-and-xdr-tackle-evolving-threats/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/625"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Evolving threats require security solutions that match the sophistication of modern threats. Learn more about how Wazuh, the open-source XDR and SIEM, tackles these threats.]]>
            </summary>
            <updated>2026-01-14T04:00:13+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/594</id>
            <title type="text"><![CDATA[NIST Drops Password Complexity Mandatory Reset Rules]]></title>
            <link rel="alternate" href="https://www.darkreading.com/identity-access-management-security/nist-drops-password-complexity-mandatory-reset-rules" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/594"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-26T14:00:38+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/593</id>
            <title type="text"><![CDATA[Critical doomsday Linux bug is CUPS-based vulnerability • The Register]]></title>
            <link rel="alternate" href="https://www.theregister.com/2024/09/26/unauthenticated_rce_bug_linux/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/593"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[No patches yet, can be mitigated, requires user interaction]]>
            </summary>
            <updated>2025-12-26T12:00:45+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/591</id>
            <title type="text"><![CDATA[Critical Unauthenticated RCE Flaw Impacts all GNU/Linux systems]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/critical-unauthenticated-rce-flaw/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/591"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Critical Unauthenticated RCE Flaw, no Common CVE identifiers have been assigned yet, although experts suggest there should be at least three to six.]]>
            </summary>
            <updated>2026-01-01T04:00:30+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/588</id>
            <title type="text"><![CDATA[Secure your software by design]]></title>
            <link rel="alternate" href="https://www.iriusrisk.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/588"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-01T04:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/587</id>
            <title type="text"><![CDATA[OWASP Threat Dragon]]></title>
            <link rel="alternate" href="https://owasp.org/www-project-threat-dragon/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/587"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[OWASP Threat Dragon is a threat modeling tool; great for both developers and defenders alike. Use on your desktop or as a web application.]]>
            </summary>
            <updated>2025-12-30T04:00:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/586</id>
            <title type="text"><![CDATA[Threagile — Agile Threat Modeling Toolkit]]></title>
            <link rel="alternate" href="https://threagile.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/586"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Threagile enables teams to execute Agile Threat Modeling as seamless as possible, even highly-integrated into DevSecOps environments.]]>
            </summary>
            <updated>2025-12-30T04:00:21+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/584</id>
            <title type="text"><![CDATA[This Windows PowerShell Phish Has Scary Potential]]></title>
            <link rel="alternate" href="https://krebsonsecurity.com/2024/09/this-windows-powershell-phish-has-scary-potential/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/584"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Many GitHub users this week received a novel phishing email warning of critical security holes in their code. Those who clicked the link for details were asked to distinguish themselves from bots by pressing a combination of keyboard keys that…]]>
            </summary>
            <updated>2025-12-30T04:00:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/578</id>
            <title type="text"><![CDATA[https://www.reuters.com/world/middle-east/dozens-hezbollah-members-wounded-lebanon-when-pagers-exploded-sources-witnesses-2024-09-17/]]></title>
            <link rel="alternate" href="https://www.reuters.com/world/middle-east/dozens-hezbollah-members-wounded-lebanon-when-pagers-exploded-sources-witnesses-2024-09-17/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/578"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-24T06:00:29+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/574</id>
            <title type="text"><![CDATA[Platform Engineering Is Security Engineering]]></title>
            <link rel="alternate" href="https://www.darkreading.com/application-security/platform-engineering-is-security-engineering" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/574"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-24T06:00:25+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/570</id>
            <title type="text"><![CDATA[Addon: Trivy - General Discussions / microk8s - Discuss Kubernetes]]></title>
            <link rel="alternate" href="https://discuss.kubernetes.io/t/addon-trivy/23797" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/570"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Compatibility:     
Source: See Trivy website for details. 
Trivy is an all-in-one open source security scanner that can help you identify vulnerabilities and IaC misconfigurations, discover SBOMs, perform cloud scanni…]]>
            </summary>
            <updated>2026-01-01T04:00:10+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/566</id>
            <title type="text"><![CDATA[We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI]]></title>
            <link rel="alternate" href="https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/566"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Welcome back to another watchTowr Labs blog. Brace yourselves, this is one of our most astounding discoveries.


Summary

What started out as a bit of fun between colleagues while avoiding the Vegas heat and $20 bottles of water in our Black Hat hotel rooms - has now seemingly become a]]>
            </summary>
            <updated>2025-12-26T04:00:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/564</id>
            <title type="text"><![CDATA[https://www.helpnetsecurity.com/2024/09/10/open-source-cybersec-tools/]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2024/09/10/open-source-cybersec-tools/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/564"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Here, you&amp;#039;ll find a list of free, open-source cybersec tools that are ready to be added to your organization&amp;#039;s arsenal.]]>
            </summary>
            <updated>2025-12-26T04:00:13+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/562</id>
            <title type="text"><![CDATA[pushsecurity/saas-attacks]]></title>
            <link rel="alternate" href="https://github.com/pushsecurity/saas-attacks?tab=readme-ov-file" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/562"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Offensive security drives defensive security. We&amp;#039;re sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown - pushsecurity/saas-attacks]]>
            </summary>
            <updated>2025-12-25T04:00:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/559</id>
            <title type="text"><![CDATA[Exploiting CI / CD Pipelines for fun and profit – Razz Security Blog]]></title>
            <link rel="alternate" href="https://blog.razzsecurity.com/2024/09/08/exploitation-research/exploiting-ci-cd-pipelines-for-fun-and-profit/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/559"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-21T06:00:33+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/554</id>
            <title type="text"><![CDATA[EUCLEAK - NinjaLab]]></title>
            <link rel="alternate" href="https://ninjalab.io/eucleak/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/554"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Download the Writeup Illustration Romain Flamand – Flamingo Studio – flamandromain@gmail.com Abstract Secure elements are small microcontrollers whose main purpose is to generate/store secrets and then execute cryptographic operations. They undergo the highest level of security evaluations that exists (Common Criteria) and are often considered inviolable, even in the worst-case attack scenarios. Hence, complex secure […]]]>
            </summary>
            <updated>2025-12-24T04:00:37+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/549</id>
            <title type="text"><![CDATA[Bypassing airport security via SQL injection]]></title>
            <link rel="alternate" href="https://ian.sh/tsa" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/549"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[We discovered a serious vulnerability in the Known Crewmember (KCM) and Cockpit Access Security System (CASS) programs used by the Transportation Security Administration.]]>
            </summary>
            <updated>2025-12-24T04:00:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/543</id>
            <title type="text"><![CDATA[Nuclei: Open-source vulnerability scanner - Help Net Security]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2024/08/26/nuclei-open-source-vulnerability-scanner/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/543"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Nuclei is a fast and customizable open-source vulnerability scanner powered by YAML-based templates. With its flexible templating system, Nuclei can be]]>
            </summary>
            <updated>2025-12-24T04:00:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/537</id>
            <title type="text"><![CDATA[Local Networks Go Global When Domain Names Collide – Krebs on Security]]></title>
            <link rel="alternate" href="https://krebsonsecurity.com/2024/08/local-networks-go-global-when-domain-names-collide/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/537"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The proliferation of new top-level domains (TLDs) has exacerbated a well-known security weakness: Many organizations set up their internal Microsoft authentication systems years ago using domain names in TLDs that didn&amp;#039;t exist at the time. Meaning, they are continuously sending…]]>
            </summary>
            <updated>2025-12-21T04:00:24+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/531</id>
            <title type="text"><![CDATA[OpenCTI: Open-source cyber threat intelligence platform - Help Net Security]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2024/08/21/opencti-open-source-cyber-threat-intelligence-platform/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/531"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[OpenCTI is an open-source platform designed to help organizations manage their cyber threat intelligence (CTI) data and observables.]]>
            </summary>
            <updated>2025-12-20T04:00:15+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/522</id>
            <title type="text"><![CDATA[https://auscert.org.au/resources/events/?s=09]]></title>
            <link rel="alternate" href="https://auscert.org.au/resources/events/?s=09" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/522"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-19T04:00:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/518</id>
            <title type="text"><![CDATA[Open Source Firewall pfsense Vulnerable to Remote Code Execution Attacks]]></title>
            <link rel="alternate" href="https://cybersecuritynews.com/open-source-firewall-pfsense-vulnerable/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/518"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A vulnerability in the popular open-source firewall software pfSense has been identified, allowing for remote code execution (RCE) attacks.]]>
            </summary>
            <updated>2025-12-19T04:00:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/517</id>
            <title type="text"><![CDATA[New Flaws in Sonos Smart Speakers Allow Hackers to Eavesdrop on Users]]></title>
            <link rel="alternate" href="https://thehackernews.com/2024/08/new-flaws-in-sonos-smart-speakers-allow.html?m=1" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/517"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-18T04:00:55+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/515</id>
            <title type="text"><![CDATA[How a cybersecurity researcher befriended then doxed the leader of LockBit]]></title>
            <link rel="alternate" href="https://techcrunch.com/2024/08/09/how-a-cybersecurity-researcher-befriended-then-doxed-the-leader-of-lockbit-ransomware-gang/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/515"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Jon DiMaggio used sockpuppet accounts, then his own identity, to infiltrate LockBit and gain the trust of its alleged admin, Dmitry Khoroshev.]]>
            </summary>
            <updated>2025-12-14T12:00:47+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/511</id>
            <title type="text"><![CDATA[Critical AWS Vulnerabilities Allow S3 Attack Bonanza]]></title>
            <link rel="alternate" href="https://www.darkreading.com/remote-workforce/critical-aws-vulnerabilities-allow-s3-attack-bonanza" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/511"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-13T08:00:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/510</id>
            <title type="text"><![CDATA[https://www.scmagazine.com/news/critical-vulnerabilities-in-6-aws-services-disclosed-at-black-hat-usa]]></title>
            <link rel="alternate" href="https://www.scmagazine.com/news/critical-vulnerabilities-in-6-aws-services-disclosed-at-black-hat-usa" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/510"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-18T04:00:50+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/508</id>
            <title type="text"><![CDATA[https://www.helpnetsecurity.com/2024/08/08/sshamble-test-ssh-services/]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2024/08/08/sshamble-test-ssh-services/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/508"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[SSHamble helps security teams validate SSH implementations and test for uncommon but dangerous misconfigurations and software bugs.]]>
            </summary>
            <updated>2025-12-18T04:00:48+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/506</id>
            <title type="text"><![CDATA[Traceeshark: Open-source plugin for Wireshark - Help Net Security]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2024/08/08/traceeshark-open-source-plugin-wireshark/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/506"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Traceeshark is a plugin for Wireshark that enables security practitioners to quickly investigate security incidents.]]>
            </summary>
            <updated>2025-12-18T04:00:46+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/505</id>
            <title type="text"><![CDATA[https://www.crowdstrike.com/wp-content/uploads/2024/08/Channel-File-291-Incident-Root-Cause-Analysis-08.06.2024.pdf]]></title>
            <link rel="alternate" href="https://www.crowdstrike.com/wp-content/uploads/2024/08/Channel-File-291-Incident-Root-Cause-Analysis-08.06.2024.pdf" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/505"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-18T04:00:44+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/499</id>
            <title type="text"><![CDATA[https://www.darkreading.com/cybersecurity-operations/implementing-identity-continuity-with-nist-cybersecurity-framework]]></title>
            <link rel="alternate" href="https://www.darkreading.com/cybersecurity-operations/implementing-identity-continuity-with-nist-cybersecurity-framework" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/499"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-11T18:00:21+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/495</id>
            <title type="text"><![CDATA[Free Shadow IT Scanner]]></title>
            <link rel="alternate" href="https://www.accessowl.io/scan" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/495"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Discover all apps and their users using our free Shadow IT Scanner for Google Workspace and Microsoft 365.]]>
            </summary>
            <updated>2025-12-18T04:00:40+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/494</id>
            <title type="text"><![CDATA[Introducing Artifact Attestations–now in public beta - The GitHub Blog]]></title>
            <link rel="alternate" href="https://github.blog/news-insights/product-news/introducing-artifact-attestations-now-in-public-beta/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/494"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Generate and verify signed attestations for anything you make with GitHub Actions.]]>
            </summary>
            <updated>2025-12-18T04:00:36+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/493</id>
            <title type="text"><![CDATA[Our audit of Homebrew | Trail of Bits Blog]]></title>
            <link rel="alternate" href="https://blog.trailofbits.com/2024/07/30/our-audit-of-homebrew/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/493"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[This is a joint post with the Homebrew maintainers; read their announcement here! Last summer, we performed an audit of Homebrew. Our audit’s scope included Homebrew/brew itself (home of the brew CLI), and three adjacent repositories responsible for various security-relevant aspects of Homebrew’s operation: Homebrew/actions: a repository of custom GitHub Actions used […]]]>
            </summary>
            <updated>2025-12-12T08:00:14+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/492</id>
            <title type="text"><![CDATA[NIST releases open-source platform for AI safety testing | SC Media]]></title>
            <link rel="alternate" href="https://www.scmagazine.com/news/nist-releases-open-source-platform-for-ai-safety-testing" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/492"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-18T04:00:34+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/489</id>
            <title type="text"><![CDATA[Cyber ransom payments will need to be disclosed by businesses under new law]]></title>
            <link rel="alternate" href="https://www.abc.net.au/news/2024-07-30/cyber-ransom-payments-new-laws-before-parliament/104113038" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/489"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Australian businesses are paying untold amounts in ransom to hackers but the government hopes to regain some control with a landmark cybersecurity law.]]>
            </summary>
            <updated>2025-12-13T04:00:13+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/487</id>
            <title type="text"><![CDATA[All I Know About Certificates -- Certificate Authority | PixelsTech]]></title>
            <link rel="alternate" href="https://www.pixelstech.net/article/1722045726-All-I-Know-About-Certificates----Certificate-Authority" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/487"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[CLIENTS,WEBSITE,CERTIFICATE,SSL CERTIFICATE.One of the crucial steps in the TLS handshake is for the server to prove its identity to the client. While there is plenty of content explaining the principles of the handshake, there&amp;#039;s less informati]]>
            </summary>
            <updated>2025-12-13T04:00:10+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/484</id>
            <title type="text"><![CDATA[Security overview dashboards secret scanning metrics and enablement trends]]></title>
            <link rel="alternate" href="https://github.blog/changelog/2024-07-19-security-overview-dashboards-secret-scanning-metrics-and-enablement-trends-reports-are-now-generally-available/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/484"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Today, we’re excited to announce the general availability of our new organization and enterprise-level security overview dashboards, alongside enhanced secret scanning metrics and the enablement trends reports. These features are…]]>
            </summary>
            <updated>2025-12-13T00:00:12+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/480</id>
            <title type="text"><![CDATA[Artifact Attestations is generally available]]></title>
            <link rel="alternate" href="https://github.blog/changelog/2024-06-25-artifact-attestations-is-generally-available/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/480"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[GitHub Artifact Attestations is generally available We’re thrilled to announce the general availability of GitHub Artifact Attestations! Artifact Attestations allow you to guarantee the integrity of artifacts built inside GitHub…]]>
            </summary>
            <updated>2025-12-13T00:00:08+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/479</id>
            <title type="text"><![CDATA[https://github.com/nicanorflavier/spf-dkim-dmarc-simplified]]></title>
            <link rel="alternate" href="https://github.com/nicanorflavier/spf-dkim-dmarc-simplified" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/479"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Email security is a key part of internet communication. But what are SPF, DKIM, and DMARC, and how do they work? This guide will explain it all in simple terms to make these concepts clearer. - nicanorflavier/spf-dkim-dmarc-simplified]]>
            </summary>
            <updated>2025-12-12T04:00:40+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/476</id>
            <title type="text"><![CDATA[https://training.opensecurity.com/landing?s=09]]></title>
            <link rel="alternate" href="https://training.opensecurity.com/landing?s=09" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/476"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Enhance your cybersecurity skills]]>
            </summary>
            <updated>2025-12-07T04:01:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/474</id>
            <title type="text"><![CDATA[Hosts Search - Censys]]></title>
            <link rel="alternate" href="https://search.censys.io/search?resource=hosts&amp;sort=RELEVANCE&amp;per_page=25&amp;virtual_hosts=INCLUDE&amp;q=fipo.co" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/474"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Censys helps organizations, individuals, and researchers find and monitor every server on the Internet to reduce exposure and improve security.]]>
            </summary>
            <updated>2025-11-29T06:00:25+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/472</id>
            <title type="text"><![CDATA[https://www.virtualizationhowto.com/2024/01/proxmox-kubernetes-install-with-talos-linux/]]></title>
            <link rel="alternate" href="https://www.virtualizationhowto.com/2024/01/proxmox-kubernetes-install-with-talos-linux/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/472"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Build a Proxmox Kubernetes cluster with Talos Linux. Uncover how to provision Talos Linux on Proxmox and discover the power of a tiny Linux OS with Kubernetes.]]>
            </summary>
            <updated>2025-12-02T10:00:45+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/469</id>
            <title type="text"><![CDATA[15 open-source cybersecurity tools you&amp;#039;ll wish you&amp;#039;d known earlier - Help N]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2024/01/04/open-source-cybersecurity-tools/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/469"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[In this article, you will find a list of open source cybersecurity tools that you&amp;#039;ll wish you&amp;#039;d known earlier.]]>
            </summary>
            <updated>2025-12-04T04:00:56+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/468</id>
            <title type="text"><![CDATA[Security best practices for authors of GitHub Actions - The GitHub Blog]]></title>
            <link rel="alternate" href="https://github.blog/2023-11-16-security-best-practices-for-authors-of-github-actions/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/468"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Improve your GitHub Action’s security posture by securing your source repository, protecting your maintainers, and making it easy to report security incidents.]]>
            </summary>
            <updated>2025-12-04T04:00:46+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/467</id>
            <title type="text"><![CDATA[Raven: Open-source CI/CD pipeline security scanner - Help Net Security]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2023/10/27/raven-open-source-security-scanner/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/467"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Raven is an open-source CI/CD pipeline security scanner that makes hidden risks visible by connecting the dots across vulnerabilities.]]>
            </summary>
            <updated>2025-12-04T04:00:44+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/465</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/2023-h1-irap-report-is-now-available-on-aws-artifact-for-australian-customers/?sc_channel=sm&amp;amp;sc_campaign=AWSSecurity_Services&amp;amp;sc_publisher=TWITTER&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=AWSSecurity_Services&amp;amp;linkId=237421989&amp;amp;s=09]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/2023-h1-irap-report-is-now-available-on-aws-artifact-for-australian-customers/?sc_channel=sm&amp;sc_campaign=AWSSecurity_Services&amp;sc_publisher=TWITTER&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=AWSSecurity_Services&amp;linkId=237421989&amp;s=09" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/465"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Amazon Web Services (AWS) is excited to announce that a new Information Security Registered Assessors Program (IRAP) report (2023 H1) is now available through AWS Artifact. An independent Australian Signals Directorate (ASD) certified IRAP assessor completed the IRAP assessment of AWS in August 2023. The new IRAP report includes an additional six AWS services, as well as the new AWS […]]]>
            </summary>
            <updated>2025-12-07T04:00:36+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/464</id>
            <title type="text"><![CDATA[17 free AWS cybersecurity courses you can take right now - Help Net Securit]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2023/09/12/free-aws-cybersecurity-courses/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/464"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Here’s a collection of free AWS cybersecurity courses you can use to elevate your knowledge about the popular cloud platform.]]>
            </summary>
            <updated>2025-12-04T04:00:30+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/461</id>
            <title type="text"><![CDATA[8 open-source OSINT tools you should try - Help Net Security]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2023/08/22/open-source-osint-tools/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/461"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[OSINT means gathering and interpreting public information to address specific intelligence queries, and the tools here are free.]]>
            </summary>
            <updated>2025-12-04T04:00:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/458</id>
            <title type="text"><![CDATA[Best practices for organizations and teams using GitHub Enterprise Cloud -]]></title>
            <link rel="alternate" href="https://github.blog/2023-08-02-best-practices-for-organizations-and-teams-using-github-enterprise-cloud/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/458"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Learn how you can structure your enterprise to get the most value out of GitHub and provide the best experience for your developers!]]>
            </summary>
            <updated>2025-11-28T04:00:52+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/456</id>
            <title type="text"><![CDATA[Free Tools for Cloud Environments | CISA]]></title>
            <link rel="alternate" href="https://www.cisa.gov/resources-tools/resources/free-tools-cloud-environments" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/456"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-28T04:00:49+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/455</id>
            <title type="text"><![CDATA[Understanding Cybersecurity Frameworks: NIST ISO and More]]></title>
            <link rel="alternate" href="https://www.thefinalhop.com/understanding-cybersecurity-frameworks-nist-iso-and-more/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/455"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-27T06:00:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/454</id>
            <title type="text"><![CDATA[Deceptive defense: best practices for identity based honeytokens in Microso]]></title>
            <link rel="alternate" href="https://techcommunity.microsoft.com/t5/microsoft-365-defender-blog/deceptive-defense-best-practices-for-identity-based-honeytokens/ba-p/3851641" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/454"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-27T06:00:31+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/452</id>
            <title type="text"><![CDATA[20 cybersecurity projects on GitHub you should check out - Help Net Securit]]></title>
            <link rel="alternate" href="https://www.helpnetsecurity.com/2023/06/08/github-cybersecurity-projects/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/452"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The open-source GitHub cybersecurity projects provide valuable tools, frameworks, and resources to enhance security practices.]]>
            </summary>
            <updated>2025-11-28T04:00:46+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/451</id>
            <title type="text"><![CDATA[https://docs.dissect.tools/en/latest/overview/index.html?s=09]]></title>
            <link rel="alternate" href="https://docs.dissect.tools/en/latest/overview/index.html?s=09" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/451"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-29T04:00:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/447</id>
            <title type="text"><![CDATA[Pixies keep switching off my morning alarm says Google Pixel owner]]></title>
            <link rel="alternate" href="https://www.theregister.com/2023/05/04/pixies_google_pixel_alarm/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/447"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[That&amp;#039;s certainly one of the stranger headlines we&amp;#039;ve written]]>
            </summary>
            <updated>2025-11-27T06:00:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/445</id>
            <title type="text"><![CDATA[New CISA tool detects hacking activity in Microsoft cloud services]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/new-cisa-tool-detects-hacking-activity-in-microsoft-cloud-services/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/445"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The U.S. Cybersecurity &amp;amp; Infrastructure Security Agency (CISA) has released a new open-source incident response tool that helps detect signs of malicious activity in Microsoft cloud environments.]]>
            </summary>
            <updated>2025-12-03T06:00:33+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/443</id>
            <title type="text"><![CDATA[How to Yubikey: a configuration cheatsheet]]></title>
            <link rel="alternate" href="https://debugging.works/blog/yubikey-cheatsheet/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/443"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[How to use and configure a Yubikey]]>
            </summary>
            <updated>2025-11-28T04:00:13+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/442</id>
            <title type="text"><![CDATA[Securing cloud workloads with Wazuh - an open source SIEM and XDR platform]]></title>
            <link rel="alternate" href="https://www.bleepingcomputer.com/news/security/securing-cloud-workloads-with-wazuh-an-open-source-siem-and-xdr-platform/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/442"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Wazuh is a free, open source security platform that offers Unified XDR and SIEM capabilities. Learn how Wazuh detect and defend against security threats targeting cloud environments.]]>
            </summary>
            <updated>2026-01-26T14:00:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/441</id>
            <title type="text"><![CDATA[Index of /stuff/NLP]]></title>
            <link rel="alternate" href="https://rmccurdy.com/stuff/NLP/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/441"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-27T04:00:48+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/437</id>
            <title type="text"><![CDATA[Google Online Security Blog: Announcing OSV-Scanner: Vulnerability Scanner]]></title>
            <link rel="alternate" href="https://security.googleblog.com/2022/12/announcing-osv-scanner-vulnerability.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/437"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-27T04:00:43+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/438</id>
            <title type="text"><![CDATA[How To Set Up SSH Keys With YubiKey as 2FA - nixCraft]]></title>
            <link rel="alternate" href="https://www.cyberciti.biz/security/how-to-set-up-ssh-keys-with-yubikey-as-two-factor-authentication-u2f-fido2/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/438"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-26T08:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/436</id>
            <title type="text"><![CDATA[Five lessons from building cybersecurity for high-growth companies]]></title>
            <link rel="alternate" href="https://www.smartcompany.com.au/opinion/five-lessons-building-cybersecurity-high-growth-companies/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/436"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[SafeStack founder Laura Bell Main shares the cybersecurity lessons she&amp;#039;s learned after many years deep inside high-growth companies.]]>
            </summary>
            <updated>2025-11-27T04:00:42+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/431</id>
            <title type="text"><![CDATA[Spotify Introduces Kitsune Vulnerability Management Platform]]></title>
            <link rel="alternate" href="https://www.infoq.com/news/2022/11/spotify-kitsune-platform/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/431"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Spotify recently introduced its security vulnerability management platform, Kitsune. Right from vulnerability detection to providing insights based on metrics, Kitsune manages the overall security vul]]>
            </summary>
            <updated>2025-11-27T04:00:35+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/430</id>
            <title type="text"><![CDATA[Spotify’s Vulnerability Management Platform - Spotify Engineering : Spotify]]></title>
            <link rel="alternate" href="https://engineering.atspotify.com/2022/11/spotifys-vulnerability-management-platform/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/430"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[We started developing our vulnerability management platform (VMP) at Spotify in Q2, 2020, and now that we’ve implemented it and use the system in our day-to-day work, we wanted to take a moment to share our journey to help reduce security risks in an efficient and scalable manner.]]>
            </summary>
            <updated>2025-11-27T04:00:34+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/429</id>
            <title type="text"><![CDATA[How to mitigate OWASP vulnerabilities while staying in the flow | The GitHu]]></title>
            <link rel="alternate" href="https://github.blog/2022-11-04-how-to-mitigate-owasp-vulnerabilities-while-staying-in-the-flow/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/429"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Explore how GitHub Advanced Security can help address several of the OWASP Top 10 vulnerabilities]]>
            </summary>
            <updated>2025-11-27T04:00:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/427</id>
            <title type="text"><![CDATA[Free: Dastardly from Burp Suite | Blog - PortSwigger]]></title>
            <link rel="alternate" href="https://portswigger.net/blog/free-dastardly-from-burp-suite" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/427"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Introducing Dastardly - a free, lightweight web application security scanner for your CI/CD pipeline, from the makers of Burp Suite. Secure web development ain&amp;#039;t easy Ensuring your code is written sec]]>
            </summary>
            <updated>2026-01-26T08:00:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/426</id>
            <title type="text"><![CDATA[Launch HN: Idemeum (YC S21) – Passwordless access to apps and infrastructur]]></title>
            <link rel="alternate" href="https://news.ycombinator.com/item?id=33346183" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/426"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-26T08:00:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/425</id>
            <title type="text"><![CDATA[Libre Tools from the National Cybersecurity Competence Center of Luxembourg]]></title>
            <link rel="alternate" href="https://opensource.nc3.lu" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/425"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-26T08:00:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/421</id>
            <title type="text"><![CDATA[Vulhub: Pre-Built Vulnerable Environments Based on Docker-Compose]]></title>
            <link rel="alternate" href="https://news.ycombinator.com/item?id=32963636" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/421"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-24T20:00:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/420</id>
            <title type="text"><![CDATA[aurae-runtime/aurae: Distributed systems runtime daemon written in Rust.]]></title>
            <link rel="alternate" href="https://github.com/aurae-runtime/aurae" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/420"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Distributed systems runtime daemon written in Rust. - aurae-runtime/aurae]]>
            </summary>
            <updated>2026-01-26T06:00:41+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/419</id>
            <title type="text"><![CDATA[IPv4 Turf War]]></title>
            <link rel="alternate" href="http://ipv4.games/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/419"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-26T06:00:41+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/417</id>
            <title type="text"><![CDATA[NetMaker: Connect Everything with a WireGuard VPN]]></title>
            <link rel="alternate" href="https://www.netmaker.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/417"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-24T18:00:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/412</id>
            <title type="text"><![CDATA[GitHub Actions Security Best Practices [cheat sheet included]]]></title>
            <link rel="alternate" href="https://blog.gitguardian.com/github-actions-security-cheat-sheet/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/412"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Learn how to secure your GitHub Actions with these best practices! From controlling credentials to using specific action version tags, this cheat sheet will help you protect against supply-chain attacks. Don&amp;#039;t let a malicious actor inject code into your repository - read now!]]>
            </summary>
            <updated>2026-01-24T18:00:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/408</id>
            <title type="text"><![CDATA[Thread by @bettersafetynet on Thread Reader App – Thread Reader App]]></title>
            <link rel="alternate" href="https://threadreaderapp.com/thread/1496496087741480960.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/408"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[@bettersafetynet: I&amp;#039;ve had 3 calls so far today (it&amp;#039;s not even 10) about defending against Russian cyber ops I&amp;#039;m tired of having the same call... so... here&amp;#039;s what I&amp;#039;ve told everyone. This is the playbook you...…]]>
            </summary>
            <updated>2026-01-26T06:00:31+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/407</id>
            <title type="text"><![CDATA[https://github.com/awslabs/aws-cloudsaga]]></title>
            <link rel="alternate" href="https://github.com/awslabs/aws-cloudsaga" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/407"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[AWS CloudSaga - Simulate security events in AWS. Contribute to awslabs/aws-cloudsaga development by creating an account on GitHub.]]>
            </summary>
            <updated>2025-12-06T12:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/403</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/how-to-build-a-multi-region-aws-security-hub-analytic-pipeline/?sc_channel=sm&amp;amp;sc_campaign=AWSSecurity_Blog&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=AWSSecurity_Blog_TWITTER&amp;amp;s=09]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-build-a-multi-region-aws-security-hub-analytic-pipeline/?sc_channel=sm&amp;sc_campaign=AWSSecurity_Blog&amp;sc_publisher=TWITTER&amp;sc_country=Security&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=AWSSecurity_Blog_TWITTER&amp;s=09" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/403"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[AWS Security Hub is a service that gives you aggregated visibility into your security and compliance posture across multiple Amazon Web Services (AWS) accounts. By joining Security Hub with Amazon QuickSight—a scalable, serverless, embeddable, machine learning-powered business intelligence (BI) service built for the cloud—your senior leaders and decision-makers can use dashboards to empower data-driven decisions […]]]>
            </summary>
            <updated>2026-01-26T06:00:26+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/400</id>
            <title type="text"><![CDATA[Continuous Security: The Next Evolution of CI/CD - DevOps.com]]></title>
            <link rel="alternate" href="https://devops.com/continuous-security-the-next-evolution-of-ci-cd/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/400"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[With end-to-end integration into the SDLC, continuous security supports CI/CD to improve productivity, speed time-to-market and reduce risks.]]>
            </summary>
            <updated>2026-01-23T00:00:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/397</id>
            <title type="text"><![CDATA[prowler-cloud/prowler]]></title>
            <link rel="alternate" href="https://github.com/prowler-cloud/prowler" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/397"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Prowler is the Open Cloud Security platform for AWS, Azure, GCP, Kubernetes, M365 and more. It helps for continuos monitoring, security assessments and audits, incident response, compliance, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, ENS and more - prowler-cloud/prowler]]>
            </summary>
            <updated>2026-01-26T06:00:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/396</id>
            <title type="text"><![CDATA[SSH Bastion Host Best Practices]]></title>
            <link rel="alternate" href="https://goteleport.com/blog/security-hardening-ssh-bastion-best-practices/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/396"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-23T00:00:21+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/392</id>
            <title type="text"><![CDATA[Federate Kubernetes with AWS IAM using OIDC · reecetech]]></title>
            <link rel="alternate" href="https://reece.tech/posts/oidc-k8s-to-aws/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/392"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-23T06:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/389</id>
            <title type="text"><![CDATA[Container security best practices: Ultimate guide - Sysdig]]></title>
            <link rel="alternate" href="https://sysdig.com/blog/container-security-best-practices/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/389"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Sticking to container security best practices is critical for successfully delivering secure software.]]>
            </summary>
            <updated>2026-01-23T06:00:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/384</id>
            <title type="text"><![CDATA[Headscale: Open-source implementation of the Tailscale control server]]></title>
            <link rel="alternate" href="https://news.ycombinator.com/item?id=28572013" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/384"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-22T16:00:55+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/382</id>
            <title type="text"><![CDATA[https://www.ncsc.gov.uk/blog-post/zero-trust-1-0?s=09]]></title>
            <link rel="alternate" href="https://www.ncsc.gov.uk/blog-post/zero-trust-1-0?s=09" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/382"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Zero trust architecture design principles 1.0 launched.]]>
            </summary>
            <updated>2026-01-22T16:00:54+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/381</id>
            <title type="text"><![CDATA[Minimum Viable Secure Product]]></title>
            <link rel="alternate" href="https://mvsp.dev/mvsp.en/index.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/381"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Minimum Viable Secure Product (MVSP) is a minimum security baseline for enterprise-ready products and services.]]>
            </summary>
            <updated>2026-01-24T06:00:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/380</id>
            <title type="text"><![CDATA[Test Ad Block - Toolz]]></title>
            <link rel="alternate" href="https://d3ward.github.io/toolz/adblock.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/380"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Project Archived]]>
            </summary>
            <updated>2026-01-23T06:00:13+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/374</id>
            <title type="text"><![CDATA[GPG-Tui a Terminal User Interface for GnuPG]]></title>
            <link rel="alternate" href="https://orhun.dev/blog/introducing-gpg-tui/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/374"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-22T16:00:49+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/373</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/how-to-use-aws-secrets-configuration-provider-with-kubernetes-secrets-store-csi-driver/?sc_channel=sm&amp;amp;sc_campaign=AWSSecurity_Encryption&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=AWSSecurity_Blog_TWITTER&amp;amp;linkId=119175714&amp;amp;s=09]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-use-aws-secrets-configuration-provider-with-kubernetes-secrets-store-csi-driver/?sc_channel=sm&amp;sc_campaign=AWSSecurity_Encryption&amp;sc_publisher=TWITTER&amp;sc_country=Security&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=AWSSecurity_Blog_TWITTER&amp;linkId=119175714&amp;s=09" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/373"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[January 2, 2024: We’ve updated this post to include the new failover Region feature. April 29, 2021: We’ve updated the order of the commands in Step 1. April 23, 2021: We’ve updated the commands in Steps 1 and 5 and in the “Additional Features” section. Using AWS Secrets Manager, you can more securely retrieve secrets […]]]>
            </summary>
            <updated>2026-01-26T06:00:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/368</id>
            <title type="text"><![CDATA[https://isc.sans.edu/forums/diary/Quick+and+dirty+Python+masscan/27384/?s=09]]></title>
            <link rel="alternate" href="https://isc.sans.edu/forums/diary/Quick+and+dirty+Python+masscan/27384/?s=09" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/368"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-22T16:00:36+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/359</id>
            <title type="text"><![CDATA[4 Open Source Tools to Add to Your Security Arsenal]]></title>
            <link rel="alternate" href="https://www.darkreading.com/application-security/4-open-source-tools-to-add-to-your-security-arsenal/a/d-id/1340487" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/359"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-21T08:00:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/357</id>
            <title type="text"><![CDATA[Purple Knight Active Directory Security Assessment]]></title>
            <link rel="alternate" href="https://www.purple-knight.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/357"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Purple Knight, built by Semperis, is the top Active Directory security assessment tool today. Identify threats and get prioritized guidance.]]>
            </summary>
            <updated>2026-01-22T16:00:27+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/336</id>
            <title type="text"><![CDATA[The worst of the two worlds: Excel meets Outlook]]></title>
            <link rel="alternate" href="https://adepts.of0x.cc/vba-outlook/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/336"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Turning Outlook into a keylogger via VBA macros]]>
            </summary>
            <updated>2026-01-21T06:00:10+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/334</id>
            <title type="text"><![CDATA[https://docs.bridgecrew.io/docs/what-is-bridgecrew]]></title>
            <link rel="alternate" href="https://docs.bridgecrew.io/docs/what-is-bridgecrew" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/334"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-19T08:00:06+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/330</id>
            <title type="text"><![CDATA[Boundary by HashiCorp]]></title>
            <link rel="alternate" href="https://www.boundaryproject.io" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/330"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Explore Boundary product documentation, tutorials, and examples.]]>
            </summary>
            <updated>2026-01-20T06:00:25+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/324</id>
            <title type="text"><![CDATA[Open Source Security Foundation]]></title>
            <link rel="alternate" href="https://openssf.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/324"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-20T06:00:08+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/323</id>
            <title type="text"><![CDATA[https://github.com/supertokens/supertokens-core]]></title>
            <link rel="alternate" href="https://github.com/supertokens/supertokens-core" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/323"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Open source alternative to Auth0 / Firebase Auth / AWS Cognito  - GitHub - supertokens/supertokens-core: Open source alternative to Auth0 / Firebase Auth / AWS Cognito]]>
            </summary>
            <updated>2026-01-19T06:00:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/317</id>
            <title type="text"><![CDATA[How to build a CI/CD pipeline for container vulnerability scanning with Tri]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-build-ci-cd-pipeline-container-vulnerability-scanning-trivy-and-aws-security-hub/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/317"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[In this post, I’ll show you how to build a continuous integration and continuous delivery (CI/CD) pipeline using AWS Developer Tools, as well as Aqua Security‘s open source container vulnerability scanner, Trivy. You’ll build two Docker images, one with vulnerabilities and one without, to learn the capabilities of Trivy and how to send all vulnerability […]]]>
            </summary>
            <updated>2026-01-19T06:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/316</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/26288]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/26288" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/316"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-19T00:00:41+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/308</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/26104]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/26104" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/308"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-19T00:00:39+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/301</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/how-to-verify-aws-kms-asymmetric-key-signatures-locally-with-openssl/?sc_channel=sm&amp;amp;sc_campaign=AWSSecurity_Services&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=adoption&amp;amp;trk=AWSSecurity_Services_TWITTER&amp;amp;linkId=86699220]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-verify-aws-kms-asymmetric-key-signatures-locally-with-openssl/?sc_channel=sm&amp;sc_campaign=AWSSecurity_Services&amp;sc_publisher=TWITTER&amp;sc_country=Security&amp;sc_geo=GLOBAL&amp;sc_outcome=adoption&amp;trk=AWSSecurity_Services_TWITTER&amp;linkId=86699220" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/301"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[August 31, 2021: AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info. In this post, I demonstrate a sample workflow for generating a digital signature within AWS […]]]>
            </summary>
            <updated>2026-01-19T06:00:13+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/292</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/how-to-use-kms-and-iam-to-enable-independent-security-controls-for-encrypted-data-in-s3/?sc_channel=sm&amp;amp;sc_campaign=AWSSecurity_Services&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security&amp;amp;sc_outcome=adoption&amp;amp;trk=AWSSecurity_Services_TWITTER&amp;amp;linkId=82078481]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-use-kms-and-iam-to-enable-independent-security-controls-for-encrypted-data-in-s3/?sc_channel=sm&amp;sc_campaign=AWSSecurity_Services&amp;sc_publisher=TWITTER&amp;sc_country=Security&amp;sc_outcome=adoption&amp;trk=AWSSecurity_Services_TWITTER&amp;linkId=82078481" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/292"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[August 31, 2021:AWS KMS is replacing the term customer master key (CMK) with AWS KMS key and KMS key. The concept has not changed. To prevent breaking changes, AWS KMS is keeping some variations of this term. More info. Typically, when you protect data in Amazon Simple Storage Service (Amazon S3), you use a combination […]]]>
            </summary>
            <updated>2026-01-19T06:00:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/286</id>
            <title type="text"><![CDATA[checkov]]></title>
            <link rel="alternate" href="https://www.checkov.io/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/286"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Prevent cloud misconfigurations and find vulnerabilities during build-time in infrastructure as code, container images and open source packages with Checkov by Bridgecrew.]]>
            </summary>
            <updated>2026-01-16T08:00:14+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/280</id>
            <title type="text"><![CDATA[Authelia is an open-source authentication/authorization server with 2FA/SSO]]></title>
            <link rel="alternate" href="https://github.com/authelia/authelia" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/280"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The Single Sign-On Multi-Factor portal for web apps, now OpenID Certified™ - authelia/authelia]]>
            </summary>
            <updated>2026-01-15T06:00:26+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/278</id>
            <title type="text"><![CDATA[Introducing Nebula - the open source global overlay network from Slack]]></title>
            <link rel="alternate" href="https://slack.engineering/introducing-nebula-the-open-source-global-overlay-network-from-slack-884110a5579" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/278"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[“What is the easiest way to securely connect tens of thousands of computers, hosted at multiple cloud service providers in dozens of locations around the globe?” If you want our answer, it’s Nebula, but I recommend that you read the rest of this short post before clicking that shiny link. At Slack, we asked ourselves this…]]>
            </summary>
            <updated>2026-01-15T06:00:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/276</id>
            <title type="text"><![CDATA[https://developer.okta.com/blog/2019/10/21/illustrated-guide-to-oauth-and-oidc]]></title>
            <link rel="alternate" href="https://developer.okta.com/blog/2019/10/21/illustrated-guide-to-oauth-and-oidc" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/276"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[An illustrated guide to explain OAuth and OpenID Connect!]]>
            </summary>
            <updated>2026-01-15T06:00:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/274</id>
            <title type="text"><![CDATA[https://cloud.vmware.com/vmware-essential-pks/resources#documents-papers]]></title>
            <link rel="alternate" href="https://cloud.vmware.com/vmware-essential-pks/resources#documents-papers" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/274"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-07T20:00:15+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/272</id>
            <title type="text"><![CDATA[https://duo.com/labs/research/how-to-monitor-github-for-secrets]]></title>
            <link rel="alternate" href="https://duo.com/labs/research/how-to-monitor-github-for-secrets" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/272"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Learn about the problem of sensitive info getting published on version control systems and discover multiple ways to monitor GitHub for secrets.]]>
            </summary>
            <updated>2026-01-15T06:00:14+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/260</id>
            <title type="text"><![CDATA[HTTP Security Headers – A Complete Guide]]></title>
            <link rel="alternate" href="https://nullsweep.com/http-security-headers-a-complete-guide/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/260"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A description of each security header, why it is important, and how to configure your website in a secure way.]]>
            </summary>
            <updated>2026-01-14T06:00:15+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/255</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/aws/new-vpc-traffic-mirroring/?sc_channel=sm&amp;amp;sc_campaign=launch_&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Global&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=Launches_06-25-2019_VPCTrafficMonitoring_TWITTER&amp;amp;sc_content=Launches_06-25-2019_VPCTrafficMonitoring&amp;amp;linkId=69508334]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/aws/new-vpc-traffic-mirroring/?sc_channel=sm&amp;sc_campaign=launch_&amp;sc_publisher=TWITTER&amp;sc_country=Global&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=Launches_06-25-2019_VPCTrafficMonitoring_TWITTER&amp;sc_content=Launches_06-25-2019_VPCTrafficMonitoring&amp;linkId=69508334" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/255"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Running a complex network is not an easy job. In addition to simply keeping it up and running, you need to keep an ever-watchful eye out for unusual traffic patterns or content that could signify a network intrusion, a compromised instance, or some other anomaly. VPC Traffic Mirroring Today we are launching VPC Traffic Mirroring. […]]]>
            </summary>
            <updated>2026-01-19T06:00:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/254</id>
            <title type="text"><![CDATA[https://aws.amazon.com/about-aws/whats-new/2019/06/aws-security-hub-now-generally-available/?sc_channel=sm&amp;amp;sc_campaign=launch_&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Global&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=Launches_06-25-2019_SecurityHub_TWITTER&amp;amp;sc_content=Launches_06-25-2019_SecurityHub&amp;amp;linkId=69505869]]></title>
            <link rel="alternate" href="https://aws.amazon.com/about-aws/whats-new/2019/06/aws-security-hub-now-generally-available/?sc_channel=sm&amp;sc_campaign=launch_&amp;sc_publisher=TWITTER&amp;sc_country=Global&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=Launches_06-25-2019_SecurityHub_TWITTER&amp;sc_content=Launches_06-25-2019_SecurityHub&amp;linkId=69505869" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/254"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-01-16T06:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/253</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/introducing-the-aws-security-incident-response-whitepaper/?sc_channel=sm&amp;amp;sc_campaign=AWSSecurity_Blog&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security+%26+Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=security_blog_incident_response_whitepaper_TWITTER&amp;amp;sc_content=security_blog_incident_response_whitepaper&amp;amp;linkId=69462957]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/introducing-the-aws-security-incident-response-whitepaper/?sc_channel=sm&amp;sc_campaign=AWSSecurity_Blog&amp;sc_publisher=TWITTER&amp;sc_country=Security+%26+Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=security_blog_incident_response_whitepaper_TWITTER&amp;sc_content=security_blog_incident_response_whitepaper&amp;linkId=69462957" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/253"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[April 25, 2023: We’ve updated this blog post to include more security learning resources. AWS recently released the AWS Security Incident Response whitepaper, to help you understand the fundamentals of responding to security incidents within your cloud environment. The whitepaper reviews how to prepare your organization for detecting and responding to security incidents, explores the […]]]>
            </summary>
            <updated>2026-01-07T16:00:28+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/247</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/create-fine-grained-session-permissions-using-iam-managed-policies/?sc_channel=sm&amp;amp;sc_campaign=AWSSecurity_Blog&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security+%26+Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=security_blog_fine_grained_IAM_TWITTER&amp;amp;sc_content=security_blog_fine_grained_IAM&amp;amp;linkId=67337463]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/create-fine-grained-session-permissions-using-iam-managed-policies/?sc_channel=sm&amp;sc_campaign=AWSSecurity_Blog&amp;sc_publisher=TWITTER&amp;sc_country=Security+%26+Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=security_blog_fine_grained_IAM_TWITTER&amp;sc_content=security_blog_fine_grained_IAM&amp;linkId=67337463" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/247"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[As a security best practice, AWS Identity and Access Management (IAM) recommends that you use temporary security credentials from AWS Security Token Service (STS) when you access your AWS resources. Temporary credentials are short-term credentials generated dynamically and provided to the user upon request. Today, one of the most widely used mechanisms for requesting temporary […]]]>
            </summary>
            <updated>2025-12-27T02:00:16+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/243</id>
            <title type="text"><![CDATA[https://twitter.com/AWSSecurityInfo/status/1111371889333551104?s=19]]></title>
            <link rel="alternate" href="https://twitter.com/AWSSecurityInfo/status/1111371889333551104?s=19" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/243"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-24T18:00:06+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/239</id>
            <title type="text"><![CDATA[https://www.cyberciti.biz/faq/configure-ubuntu-pi-hole-for-cloudflare-dns-over-https/amp/?__twitter_impression=true]]></title>
            <link rel="alternate" href="https://www.cyberciti.biz/faq/configure-ubuntu-pi-hole-for-cloudflare-dns-over-https/amp/?__twitter_impression=true" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/239"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-24T16:00:08+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/237</id>
            <title type="text"><![CDATA[https://isc.sans.edu/slack/index.html]]></title>
            <link rel="alternate" href="https://isc.sans.edu/slack/index.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/237"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Join the Internet Storm Center&amp;amp;apos;s Slack channel for real-time updates on internet security events&amp;amp;period;]]>
            </summary>
            <updated>2025-12-28T16:00:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/236</id>
            <title type="text"><![CDATA[PKI for busy people]]></title>
            <link rel="alternate" href="https://rehn.me/posts/pki-for-busy-people.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/236"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-12-24T16:00:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/232</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/how-to-automate-saml-federation-to-multiple-aws-accounts-from-microsoft-azure-active-directory/?sc_channel=sm&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security+%26+Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=security_blog_automate_SAML_federation&amp;amp;linkId=62627605]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-automate-saml-federation-to-multiple-aws-accounts-from-microsoft-azure-active-directory/?sc_channel=sm&amp;sc_publisher=TWITTER&amp;sc_country=Security+%26+Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=security_blog_automate_SAML_federation&amp;linkId=62627605" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/232"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. December 2, 2019: Since the author wrote this post, AWS Single Sign On (AWS IAM Identity Center) has launched native features that simplify using […]]]>
            </summary>
            <updated>2025-12-27T02:00:09+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/229</id>
            <title type="text"><![CDATA[The Evil-Twin Framework: A tool for improving WiFi security | Opensource.co]]></title>
            <link rel="alternate" href="https://opensource.com/article/19/1/evil-twin-framework" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/229"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Pen-testing tool aims to protect network access points against a host of threats.]]>
            </summary>
            <updated>2026-01-07T16:00:26+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/227</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/how-to-centralize-and-automate-iam-policy-creation-in-sandbox-development-and-test-environments/?sc_channel=sm&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security+%26+Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=security_blog_centralize_automate_IAM&amp;amp;linkId=62045363]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-centralize-and-automate-iam-policy-creation-in-sandbox-development-and-test-environments/?sc_channel=sm&amp;sc_publisher=TWITTER&amp;sc_country=Security+%26+Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=security_blog_centralize_automate_IAM&amp;linkId=62045363" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/227"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[To keep pace with AWS innovation, many customers allow their application teams to experiment with AWS services in sandbox environments as they move toward production-ready architecture. These teams need timely access to various sets of AWS services and resources, which means they also need a mechanism to help ensure least privilege is granted. In other […]]]>
            </summary>
            <updated>2025-12-27T02:00:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/224</id>
            <title type="text"><![CDATA[Getting started with chaos engineering | Opensource.com]]></title>
            <link rel="alternate" href="https://opensource.com/article/18/12/getting-started-chaos-engineering" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/224"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Learn how to build more performant, safe, and secure systems with chaos engineering.]]>
            </summary>
            <updated>2026-01-07T16:00:24+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/220</id>
            <title type="text"><![CDATA[nullsweep.com]]></title>
            <link rel="alternate" href="https://nullsweep.com/security-patching-docker-containers/amp/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/220"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[In the final section of my series on creating a comprehensive security program
around Docker [https://nullsweep.com/building-a-docker-security-program], I&amp;#039;ll be
looking at some ideas and best practices around patching running containers.

In the previous articles, I talked about running static analysis on containers
[https://nullsweep.com/docker-static-analysis-with-clair] and rolling]]>
            </summary>
            <updated>2025-12-23T04:00:07+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/217</id>
            <title type="text"><![CDATA[Tigera raises $30M Series B for its Kubernetes security and compliance plat]]></title>
            <link rel="alternate" href="https://techcrunch.com/2018/12/12/tigera-raises-30m-series-b-for-its-kubernetes-security-and-compliance-platform/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/217"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Tigera, a startup that offers security and compliance solutions for Kubernetes container deployments, today announced that it has raised a $30 million]]>
            </summary>
            <updated>2025-12-24T14:00:14+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/213</id>
            <title type="text"><![CDATA[https://github.com/nccgroup/ScoutSuite]]></title>
            <link rel="alternate" href="https://github.com/nccgroup/ScoutSuite" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/213"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Multi-Cloud Security Auditing Tool. Contribute to nccgroup/ScoutSuite development by creating an account on GitHub.]]>
            </summary>
            <updated>2025-12-24T14:00:12+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/211</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/24322]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/24322" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/211"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-31T16:00:33+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/210</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/24320]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/24320" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/210"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-30T20:00:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/201</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/visualizing-amazon-guardduty-findings/?sc_channel=sm&amp;amp;sc_campaign=AWS_Security&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security%20&amp;amp;%20Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=security_blog_visualize_GuardDuty&amp;amp;linkId=56505852]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/visualizing-amazon-guardduty-findings/?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=security_blog_visualize_GuardDuty&amp;linkId=56505852" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/201"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[September 9, 2021: Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. See details. Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help protect your AWS accounts and workloads. Enable GuardDuty and it begins monitoring for: Anomalous API activity Potentially unauthorized deployments and compromised instances […]]]>
            </summary>
            <updated>2025-12-21T14:00:13+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/199</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/24056]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/24056" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/199"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-30T14:00:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/192</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/delegate-permission-management-to-developers-using-iam-permissions-boundaries/?sc_channel=sm&amp;amp;sc_campaign=AWS_Security&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security%20&amp;amp;%20Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=security_blog_delegate_permission&amp;amp;linkId=54227051]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/delegate-permission-management-to-developers-using-iam-permissions-boundaries/?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=security_blog_delegate_permission&amp;linkId=54227051" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/192"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Today, AWS released a new IAM feature that makes it easier for you to delegate permissions management to trusted employees. As your organization grows, you might want to allow trusted employees to configure and manage IAM permissions to help your organization scale permission management and move workloads to AWS faster. For example, you might want […]]]>
            </summary>
            <updated>2025-11-27T06:00:12+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/189</id>
            <title type="text"><![CDATA[Sandfly Security | Agentless Linux Security]]></title>
            <link rel="alternate" href="https://sandflysecurity.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/189"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Sandfly is an agentless Linux EDR and incident response platform. Sandfly finds Linux threats without endpoint agents.]]>
            </summary>
            <updated>2026-03-20T18:00:43+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/187</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/23772]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/23772" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/187"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2025-11-27T08:00:24+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/183</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/how-to-create-custom-alerts-with-amazon-macie/?sc_channel=sm&amp;amp;sc_campaign=AWS_Security&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security%20&amp;amp;%20Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=security_blog_macie_custom_alerts&amp;amp;linkId=52705999]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-create-custom-alerts-with-amazon-macie/?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=security_blog_macie_custom_alerts&amp;linkId=52705999" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/183"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[June 15, 2020: This blog is out of date. Please refer here for the updated info: https://aws.amazon.com/blogs/aws/new-enhanced-amazon-macie-now-available/ Amazon Macie is a security service that makes it easy for you to discover, classify, and protect sensitive data in Amazon Simple Storage Service (Amazon S3). Macie collects AWS CloudTrail events and Amazon S3 metadata such as permissions […]]]>
            </summary>
            <updated>2026-04-21T06:00:30+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/182</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/23739]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/23739" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/182"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-21T06:00:29+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/178</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/how-to-use-aws-config-to-monitor-for-and-respond-to-amazon-s3-buckets-allowing-public-access/?sc_channel=sm&amp;amp;sc_campaign=AWS_Security&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security%20&amp;amp;%20Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=security_blog_AWS-Config-monitoring-tweet-2&amp;amp;linkId=51888090]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-use-aws-config-to-monitor-for-and-respond-to-amazon-s3-buckets-allowing-public-access/?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=security_blog_AWS-Config-monitoring-tweet-2&amp;linkId=51888090" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/178"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[AWS Config enables continuous monitoring of your AWS resources, making it simple to assess, audit, and record resource configurations and changes. AWS Config does this through the use of rules that define the desired configuration state of your AWS resources. AWS Config provides a number of AWS managed rules that address a wide range of […]]]>
            </summary>
            <updated>2026-04-21T04:00:28+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/176</id>
            <title type="text"><![CDATA[https://t.co/DS1hmO5kvi?amp=1]]></title>
            <link rel="alternate" href="https://t.co/DS1hmO5kvi?amp=1" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/176"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-20T10:01:15+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/175</id>
            <title type="text"><![CDATA[Spoofing Cell Networks with a USB to VGA Adapter | Hackaday]]></title>
            <link rel="alternate" href="https://hackaday.com/2018/04/23/spoofing-cell-networks-with-a-usb-to-vga-adapter/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/175"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[RTL-SDR brought cheap and ubiquitous Software Defined Radio (SDR) to the masses, opening up whole swaths of the RF spectrum which were simply unavailable to the average hacker previously. Because t…]]>
            </summary>
            <updated>2026-03-25T08:00:15+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/172</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/aws/aws-config-update-aggregate-compliance-data-across-accounts-regions/?sc_channel=sm&amp;amp;sc_campaign=AWS_Security&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security%20&amp;amp;%20Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=security_blog_aws_config&amp;amp;linkId=50736326]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/aws/aws-config-update-aggregate-compliance-data-across-accounts-regions/?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=security_blog_aws_config&amp;linkId=50736326" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/172"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[As I have discussed in the past, sophisticated AWS customers invariably control multiple AWS accounts. Some of these are the results of acquisitions or a holdover from bottom-up, departmental adoption of cloud computing. Others create multiple accounts in order to isolate developers, projects, or departments from each other. We strongly endorse this as a best […]]]>
            </summary>
            <updated>2026-04-21T00:00:27+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/169</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/understanding-aws-cloudhsm-cluster-synchronization/?sc_channel=sm&amp;amp;sc_campaign=AWS_Security&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security%20&amp;amp;%20Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=security_blog_cloudhsm&amp;amp;linkId=50579720]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/understanding-aws-cloudhsm-cluster-synchronization/?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=security_blog_cloudhsm&amp;linkId=50579720" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/169"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Feb 17, 2025: This blog post references AWS CloudHSM Client SDK 3, which is no longer the recommended version. AWS recommends that you use the latest version, AWS CloudHSM Client SDK 5, which provides updated functionality and commands. We are currently working on an updated blog post for CloudHSM Client SDK 5. See the AWS […]]]>
            </summary>
            <updated>2026-04-20T22:00:27+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/168</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/how-to-manage-amazon-guardduty-security-findings-across-multiple-accounts/?sc_channel=sm&amp;amp;sc_campaign=AWS_Security&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security%20&amp;amp;%20Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=security_blog_guard_duty_multiple_accounts&amp;amp;linkId=50540054]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-manage-amazon-guardduty-security-findings-across-multiple-accounts/?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=security_blog_guard_duty_multiple_accounts&amp;linkId=50540054" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/168"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[September 9, 2021: Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. See details. Introduced at AWS re:Invent 2017, Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. In an AWS Blog post, Jeff Barr shows you how to […]]]>
            </summary>
            <updated>2026-04-20T22:00:27+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/166</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/23553]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/23553" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/166"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-19T10:00:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/165</id>
            <title type="text"><![CDATA[https://aws.amazon.com/compliance/gdpr-center/?sc_channel=sm&amp;amp;sc_campaign=AWS_Security&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security%20&amp;amp;%20Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=security_blog_gdpr_center&amp;amp;linkId=50238985]]></title>
            <link rel="alternate" href="https://aws.amazon.com/compliance/gdpr-center/?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=security_blog_gdpr_center&amp;linkId=50238985" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/165"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-20T22:00:26+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/164</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/how-to-use-service-control-policies-in-aws-organizations/]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/how-to-use-service-control-policies-in-aws-organizations/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/164"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[January 20, 2020: Based on customer feedback, we rephrased the fourth goal in the “An example structure with nested OUs and SCPs” section to try to improve clarity. With AWS Organizations, you can centrally manage policies across multiple AWS accounts without having to use custom scripts and manual processes. For example, you can apply service […]]]>
            </summary>
            <updated>2026-04-20T20:00:49+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/163</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/23477]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/23477" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/163"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-19T08:00:35+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/162</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/23473]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/23473" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/162"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-19T08:00:32+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/161</id>
            <title type="text"><![CDATA[For Everyone - PagerDuty Security Training]]></title>
            <link rel="alternate" href="https://sudo.pagerduty.com/for_everyone/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/161"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[This is an open-source version of &amp;#039;Security Training for Everyone&amp;#039;, PagerDuty&amp;#039;s internal employee security training, given to all PagerDuty employees as part of our annual security training program.]]>
            </summary>
            <updated>2026-04-20T20:00:48+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/160</id>
            <title type="text"><![CDATA[https://www.sqreen.io/checklists/saas-cto-security-checklist]]></title>
            <link rel="alternate" href="https://www.sqreen.io/checklists/saas-cto-security-checklist" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/160"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Production visibility and security for your web applications and APIs]]>
            </summary>
            <updated>2026-04-20T20:00:47+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/156</id>
            <title type="text"><![CDATA[AWS Federated Authentication with Active Directory Federation Services (AD]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/aws-federated-authentication-with-active-directory-federation-services-ad-fs/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/156"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Today we’d like to walk you through AWS Identity and Access Management (IAM), federated sign-in through Active Directory (AD) and Active Directory Federation Services (ADFS). With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which resources users can access. Customers have the option of creating users and […]]]>
            </summary>
            <updated>2026-03-19T08:00:25+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/155</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/23383]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/23383" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/155"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-19T08:00:24+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/153</id>
            <title type="text"><![CDATA[https://www.auscert.org.au/blog/2018-02-22-mandatory-data-breach-notification]]></title>
            <link rel="alternate" href="https://www.auscert.org.au/blog/2018-02-22-mandatory-data-breach-notification" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/153"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-20T18:00:29+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/152</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/23361]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/23361" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/152"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-18T08:00:26+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/150</id>
            <title type="text"><![CDATA[https://isc.sans.edu/diary/23349]]></title>
            <link rel="alternate" href="https://isc.sans.edu/diary/23349" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/150"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-16T06:00:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/148</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/introducing-aws-single-sign-on/?sc_channel=sm&amp;amp;sc_campaign=AWS_Security&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security%20&amp;amp;%20Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=awssso&amp;amp;sc_category=AWS_Identity_and_Access_Management&amp;amp;linkId=46975058]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/introducing-aws-single-sign-on/?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=awssso&amp;sc_category=AWS_Identity_and_Access_Management&amp;linkId=46975058" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/148"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. Today, AWS introduced AWS IAM Identity Center (AWS IAM Identity Center), a service that makes it easy for you to centrally manage IAM Identity […]]]>
            </summary>
            <updated>2026-03-18T08:00:21+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/147</id>
            <title type="text"><![CDATA[https://isc.sans.edu/api/threatcategory/research]]></title>
            <link rel="alternate" href="https://isc.sans.edu/api/threatcategory/research" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/147"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-16T06:00:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/146</id>
            <title type="text"><![CDATA[https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_compare-resource-policies.html?sc_channel=sm&amp;amp;sc_campaign=AWS_Security&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security%20&amp;amp;%20Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=iamresourcebasedpolicies&amp;amp;sc_category=AWS_Identity_and_Access_Management&amp;amp;linkId=46974513]]></title>
            <link rel="alternate" href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_compare-resource-policies.html?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=iamresourcebasedpolicies&amp;sc_category=AWS_Identity_and_Access_Management&amp;linkId=46974513" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/146"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Define permissions on a resource in order to grant IAM users access to resources in other AWS accounts.]]>
            </summary>
            <updated>2026-03-18T08:00:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/145</id>
            <title type="text"><![CDATA[https://aws.amazon.com/blogs/security/addressing-data-residency-with-aws/?sc_channel=sm&amp;amp;sc_campaign=AWS_Security&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security%20&amp;amp;%20Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=dataresidencywhitepaper&amp;amp;sc_category=AWS_Identity_and_Access_Management&amp;amp;linkId=47676704]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/addressing-data-residency-with-aws/?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=dataresidencywhitepaper&amp;sc_category=AWS_Identity_and_Access_Management&amp;linkId=47676704" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/145"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[AWS has released a new whitepaper that has been requested by many AWS customers: AWS Policy Perspectives: Data Residency. Data residency is the requirement that all customer content processed and stored in an IT system must remain within a specific country’s borders, and it is one of the foremost concerns of governments that want to […]]]>
            </summary>
            <updated>2026-03-18T08:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/144</id>
            <title type="text"><![CDATA[https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_common-scenarios_federated-users.html?sc_channel=sm&amp;amp;sc_campaign=AWS_Security&amp;amp;sc_publisher=TWITTER&amp;amp;sc_country=Security%20&amp;amp;%20Identity&amp;amp;sc_geo=GLOBAL&amp;amp;sc_outcome=awareness&amp;amp;trk=_TWITTER&amp;amp;sc_content=externallyauthenticatedusersidentityfederation&amp;amp;sc_category=AWS_Identity_and_Access_Management&amp;amp;linkId=46974375]]></title>
            <link rel="alternate" href="https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_common-scenarios_federated-users.html?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=externallyauthenticatedusersidentityfederation&amp;sc_category=AWS_Identity_and_Access_Management&amp;linkId=46974375" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/144"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Use roles to grant an IAM user access through identity federation (authorization by an external service).]]>
            </summary>
            <updated>2026-03-18T08:00:19+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/141</id>
            <title type="text"><![CDATA[IAM Best Practices - AWS Identity and Access Management]]></title>
            <link rel="alternate" href="https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=awsiambestpractices&amp;sc_category=AWS_Identity_and_Access_Management&amp;linkId=46957150" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/141"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Follow these best practices for using AWS Identity and Access Management (IAM) to help secure your AWS account and resources.]]>
            </summary>
            <updated>2026-03-18T08:00:18+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/137</id>
            <title type="text"><![CDATA[Two New Documents to Help You Navigate Australian Prudential Regulation Aut]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/two-new-documents-to-help-you-navigate-australian-prudential-regulation-authority-apra-requirements/?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=APRAdocuments&amp;sc_category=AWS_Identity_and_Access_Management&amp;linkId=46752971" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/137"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-18T06:00:28+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/134</id>
            <title type="text"><![CDATA[Analyze Database Audit Logs for Security and Compliance Using Amazon Redshi]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/big-data/analyze-database-audit-logs-for-security-and-compliance-using-amazon-redshift-spectrum/?sc_channel=sm&amp;sc_campaign=Big_Data_Blog&amp;sc_publisher=TWITTER&amp;sc_country=Global&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=redshift-spectrum-blog-db-audit-logs-03&amp;sc_category=Amazon_Redshift&amp;linkId=46689077" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/134"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[In this post, we&amp;#039;ll demonstrate querying the Amazon Redshift audit data logged in S3 to provide answers to common use cases described preceding.]]>
            </summary>
            <updated>2026-03-19T06:00:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/133</id>
            <title type="text"><![CDATA[The Top 20 Most Viewed AWS IAM Documentation Pages in 2017 | AWS Security B]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/the-top-20-most-viewed-aws-iam-documentation-pages-in-2017/?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=top20awsiamdocpagesin2017&amp;sc_category=AWS_Identity_and_Access_Management&amp;linkId=46619339" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/133"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[The following 20 pages were the most viewed AWS Identity and Access Management (IAM) documentation pages in 2017. I have included a brief description with each link to explain what each page covers. Use this list to see what other AWS customers have been viewing and perhaps to pique your own interest in a topic you’ve […]]]>
            </summary>
            <updated>2026-03-19T06:00:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/132</id>
            <title type="text"><![CDATA[The Top 10 Most Downloaded AWS Security and Compliance Documents in 2017 |]]></title>
            <link rel="alternate" href="https://aws.amazon.com/blogs/security/the-top-10-most-downloaded-aws-security-and-compliance-documents-in-2017/?sc_channel=sm&amp;sc_campaign=AWS_Security&amp;sc_publisher=TWITTER&amp;sc_country=Security%20&amp;%20Identity&amp;sc_geo=GLOBAL&amp;sc_outcome=awareness&amp;trk=_TWITTER&amp;sc_content=top10downloadeds&amp;cdocuments2017&amp;sc_category=AWS_Identity_and_Access_Management&amp;linkId=46616500" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/132"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[July 24, 2020: The number 9 item in this list, the Auditing Security Checklist, has been replaced by a Cloud Audit Academy course. The following list includes the ten most downloaded AWS security and compliance documents in 2017. Using this list, you can learn about what other AWS customers found most interesting about security and […]]]>
            </summary>
            <updated>2026-03-19T06:00:22+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/126</id>
            <title type="text"><![CDATA[Massive Satori botnet emerges - Security - CRN Australia]]></title>
            <link rel="alternate" href="https://www.crn.com.au/news/massive-satori-botnet-emerges-479522" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/126"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-20T06:00:37+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/121</id>
            <title type="text"><![CDATA[https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/]]></title>
            <link rel="alternate" href="https://blog.cryptoaustralia.org.au/2017/11/15/favourite-block-lists-cryptoaustralia/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/121"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-20T06:00:37+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/119</id>
            <title type="text"><![CDATA[https://dzone.com/articles/3-steps-to-becoming-an-aws-security-specialist]]></title>
            <link rel="alternate" href="https://dzone.com/articles/3-steps-to-becoming-an-aws-security-specialist" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/119"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-20T06:00:36+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/118</id>
            <title type="text"><![CDATA[How to Get Rid of Ransomware at No Cost - Spiceworks]]></title>
            <link rel="alternate" href="https://community.spiceworks.com/topic/2080067-how-to-get-rid-of-ransomware-at-no-cost" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/118"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Ransomware is one of the biggest scourges we face as Internet citizens today. What happens when you have been struck by it? The most obvious option would be to pay the ransom. You would not be alone if you did – even lar…]]>
            </summary>
            <updated>2026-03-18T06:00:24+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/117</id>
            <title type="text"><![CDATA[Pretzel: email encryption and provider-supplied functions are compatible –]]></title>
            <link rel="alternate" href="https://blog.acolyer.org/2017/10/10/pretzel-email-encryption-and-provider-supplied-functions-are-compatible/amp/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/117"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-04T06:00:27+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/116</id>
            <title type="text"><![CDATA[Security.txt]]></title>
            <link rel="alternate" href="https://securitytxt.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/116"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A proposed standard that allows websites to define security policies.]]>
            </summary>
            <updated>2026-03-04T06:00:25+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/112</id>
            <title type="text"><![CDATA[2FAS - the Internet&amp;#039;s favorite open-source authenticator]]></title>
            <link rel="alternate" href="https://2fas.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/112"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Meet your favorite 2FA app. We are an open-source, community-driven, private and simple solution for Internet&amp;#039;s biggest threat - security breaches.]]>
            </summary>
            <updated>2026-03-03T16:00:21+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/107</id>
            <title type="text"><![CDATA[Home - PingCastle]]></title>
            <link rel="alternate" href="https://www.pingcastle.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/107"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Because the Active Directory security lies in the process and not in expensive tools, our solution is simple: download PingCastle and apply its methodology.]]>
            </summary>
            <updated>2026-03-04T06:00:21+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/102</id>
            <title type="text"><![CDATA[OWASP ZAP]]></title>
            <link rel="alternate" href="https://www.zaproxy.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/102"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Welcome to ZAP!]]>
            </summary>
            <updated>2026-03-06T20:00:28+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/99</id>
            <title type="text"><![CDATA[Open Policy Agent]]></title>
            <link rel="alternate" href="https://www.openpolicyagent.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/99"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-02-06T16:00:21+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/96</id>
            <title type="text"><![CDATA[https://jigsaw.google.com/]]></title>
            <link rel="alternate" href="https://jigsaw.google.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/96"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Jigsaw is an interdisciplinary unit within Google that builds technology that inspires scalable solutions.]]>
            </summary>
            <updated>2026-02-18T10:00:36+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/95</id>
            <title type="text"><![CDATA[https://github.com/pi-hole/pi-hole]]></title>
            <link rel="alternate" href="https://github.com/pi-hole/pi-hole" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/95"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[A black hole for Internet advertisements. Contribute to pi-hole/pi-hole development by creating an account on GitHub.]]>
            </summary>
            <updated>2026-02-02T10:00:25+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/94</id>
            <title type="text"><![CDATA[The Open Source Security Platform | Wazuh]]></title>
            <link rel="alternate" href="https://wazuh.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/94"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Wazuh is a free and open source security platform that unifies XDR and SIEM protection for endpoints and cloud workloads.]]>
            </summary>
            <updated>2026-02-18T10:00:33+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/92</id>
            <title type="text"><![CDATA[Canarytokens]]></title>
            <link rel="alternate" href="https://canarytokens.org/generate#" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/92"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Canarytokens is a free tool that helps you discover you’ve been breached by having attackers announce themselves.
    The tokens allow you to implant traps around your network and notifies you as soon as they are triggered.]]>
            </summary>
            <updated>2026-04-20T04:00:27+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/88</id>
            <title type="text"><![CDATA[https://nicerc.org/]]></title>
            <link rel="alternate" href="https://nicerc.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/88"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-20T04:00:25+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/84</id>
            <title type="text"><![CDATA[https://www.passwordstore.org/]]></title>
            <link rel="alternate" href="https://www.passwordstore.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/84"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-01T00:00:23+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/77</id>
            <title type="text"><![CDATA[https://pritunl.com/]]></title>
            <link rel="alternate" href="https://pritunl.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/77"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[Free open source enterprise distributed VPN server. Virtualize your private networks across datacenters and provide simple remote access in minutes.]]>
            </summary>
            <updated>2026-03-19T06:00:20+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/73</id>
            <title type="text"><![CDATA[GAUNTLT - Go Ahead Be Mean To Your Code - Security and Rugged Testing]]></title>
            <link rel="alternate" href="http://gauntlt.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/73"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-02-21T06:00:17+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/72</id>
            <title type="text"><![CDATA[Home - SpiderFoot]]></title>
            <link rel="alternate" href="https://www.spiderfoot.net/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/72"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-07T22:00:15+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/64</id>
            <title type="text"><![CDATA[(2) New Messages!]]></title>
            <link rel="alternate" href="https://www.whitesourcesoftware.com/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/64"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-20T02:00:39+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/42</id>
            <title type="text"><![CDATA[https://isc.sans.edu/api/]]></title>
            <link rel="alternate" href="https://isc.sans.edu/api/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/42"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[SANS Internet Storm Center - A global cooperative cyber threat &amp;amp;sol; internet security monitor and alert system&amp;amp;period; Featuring daily handler diaries with summarizing and analyzing new threats to networks and internet security events&amp;amp;period;]]>
            </summary>
            <updated>2026-04-20T00:00:31+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/27</id>
            <title type="text"><![CDATA[AWS Policy Generator]]></title>
            <link rel="alternate" href="https://awspolicygen.s3.amazonaws.com/policygen.html" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/27"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[AWS Policy Generator]]>
            </summary>
            <updated>2026-04-04T06:00:11+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/7</id>
            <title type="text"><![CDATA[OpenVAS - OpenVAS - Open Vulnerability Assessment System]]></title>
            <link rel="alternate" href="http://www.openvas.org/" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/7"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-03-31T08:00:10+10:00</updated>
        </entry>
            <entry>
            <id>https://links.pgmac.net.au/links/3</id>
            <title type="text"><![CDATA[FreeIPA]]></title>
            <link rel="alternate" href="https://www.freeipa.org/page/Main_Page" />
            <link rel="via" type="application/atom+xml" href="https://links.pgmac.net.au/links/3"/>
            <author>
                <name><![CDATA[Paul Macdonnell]]></name>
            </author>
            <summary type="text">
                <![CDATA[]]>
            </summary>
            <updated>2026-04-19T22:00:12+10:00</updated>
        </entry>
    </feed>
