<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Simon Roses Femerling &#8211; Blog</title>
	<atom:link href="https://simonroses.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://simonroses.com</link>
	<description>CyberSpace Insecurity 3.X</description>
	<lastBuildDate>Fri, 08 May 2026 10:33:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
<site xmlns="com-wordpress:feed-additions:1">13601991</site>	<item>
		<title>The Dependency Trap: Supply Chain Risks in AI-Generated Code (Part 4)</title>
		<link>https://simonroses.com/2026/05/the-dependency-trap-supply-chain-risks-in-ai-generated-code-part-4/</link>
					<comments>https://simonroses.com/2026/05/the-dependency-trap-supply-chain-risks-in-ai-generated-code-part-4/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 08 May 2026 09:59:43 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[VibeCoding]]></category>
		<category><![CDATA[VibeCodingSecurity]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2307</guid>

					<description><![CDATA[> **Vibe Coding Security Series** > 1. [What Is Vibe Coding Security? A Field Guide for 2026](https://simonroses.com/2026/04/what-is-vibe-coding-security-a-field-guide-for-2026-part-1/) > 2. [The OWASP Top 10 for Vibe-Coded Applications](https://simonroses.com/2026/04/the-owasp-top-10-for-vibe-coded-applications-part-2/) > 3. [Anatomy of a Vibe Coding Breach: Lessons from 2026&#8217;s Worst Incidents](https://simonroses.com/2026/04/anatomy-of-a-vibe-coding-breach-lessons-from-2026s-worst-incidents-part-3/) > &#8230; <a href="https://simonroses.com/2026/05/the-dependency-trap-supply-chain-risks-in-ai-generated-code-part-4/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/05/the-dependency-trap-supply-chain-risks-in-ai-generated-code-part-4/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2307</post-id>	</item>
		<item>
		<title>Anatomy of a Vibe Coding Breach: Lessons from 2026&#8217;s Worst Incidents (Part 3)</title>
		<link>https://simonroses.com/2026/04/anatomy-of-a-vibe-coding-breach-lessons-from-2026s-worst-incidents-part-3/</link>
					<comments>https://simonroses.com/2026/04/anatomy-of-a-vibe-coding-breach-lessons-from-2026s-worst-incidents-part-3/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 14:05:29 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[VibeCoding]]></category>
		<category><![CDATA[VibeCodingSecurity]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2286</guid>

					<description><![CDATA[> **Vibe Coding Security Series** > 1. [What Is Vibe Coding Security? A Field Guide for 2026](https://simonroses.com/2026/04/what-is-vibe-coding-security-a-field-guide-for-2026-part-1/) > 2. [The OWASP Top 10 for Vibe-Coded Applications](https://simonroses.com/2026/04/the-owasp-top-10-for-vibe-coded-applications-part-2/) > 3. **Anatomy of a Vibe Coding Breach: Lessons from 2026&#8217;s Worst Incidents** *(you &#8230; <a href="https://simonroses.com/2026/04/anatomy-of-a-vibe-coding-breach-lessons-from-2026s-worst-incidents-part-3/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/04/anatomy-of-a-vibe-coding-breach-lessons-from-2026s-worst-incidents-part-3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2286</post-id>	</item>
		<item>
		<title>The OWASP Top 10 for Vibe-Coded Applications (Part 2)</title>
		<link>https://simonroses.com/2026/04/the-owasp-top-10-for-vibe-coded-applications-part-2/</link>
					<comments>https://simonroses.com/2026/04/the-owasp-top-10-for-vibe-coded-applications-part-2/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Thu, 23 Apr 2026 17:33:14 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[OWASP]]></category>
		<category><![CDATA[VibeCoding]]></category>
		<category><![CDATA[VibeCodingSecurity]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2278</guid>

					<description><![CDATA[> **Vibe Coding Security Series** > 1. [What Is Vibe Coding Security? A Field Guide for 2026](https://simonroses.com/2026/04/what-is-vibe-coding-security-a-field-guide-for-2026-part-1/) > 2. **The OWASP Top 10 for Vibe-Coded Applications** *(you are here)* > 3. [Anatomy of a Vibe Coding Breach: Lessons from 2026&#8217;s &#8230; <a href="https://simonroses.com/2026/04/the-owasp-top-10-for-vibe-coded-applications-part-2/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/04/the-owasp-top-10-for-vibe-coded-applications-part-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2278</post-id>	</item>
		<item>
		<title>How to Weaponize AI Agent Skills</title>
		<link>https://simonroses.com/2026/04/how-to-weaponize-ai-agent-skills/</link>
					<comments>https://simonroses.com/2026/04/how-to-weaponize-ai-agent-skills/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 08:16:41 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[agent-security]]></category>
		<category><![CDATA[AgenticAI]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[openclaw]]></category>
		<category><![CDATA[Skills]]></category>
		<category><![CDATA[VibeCoding]]></category>
		<category><![CDATA[VibeCodingSecurity]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2272</guid>

					<description><![CDATA[**Read Time:** 10 minutes ## TL;DR AI agent skills — the modular plugins that let agents search the web, execute commands, send messages, and call APIs — are **the new browser extensions**: useful, powerful, and a massive attack surface nobody &#8230; <a href="https://simonroses.com/2026/04/how-to-weaponize-ai-agent-skills/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/04/how-to-weaponize-ai-agent-skills/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2272</post-id>	</item>
		<item>
		<title>What Is Vibe Coding Security? A Field Guide for 2026 (Part 1)</title>
		<link>https://simonroses.com/2026/04/what-is-vibe-coding-security-a-field-guide-for-2026-part-1/</link>
					<comments>https://simonroses.com/2026/04/what-is-vibe-coding-security-a-field-guide-for-2026-part-1/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 07:42:37 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Threat Modeling]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[VibeCoding]]></category>
		<category><![CDATA[VibeCodingSecurity]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2267</guid>

					<description><![CDATA[> **Vibe Coding Security Series** > 1. **What Is Vibe Coding Security? A Field Guide for 2026** *(you are here)* > 2. [The OWASP Top 10 for Vibe-Coded Applications](https://simonroses.com/2026/04/the-owasp-top-10-for-vibe-coded-applications-part-2/) > 3. [Anatomy of a Vibe Coding Breach: Lessons from 2026&#8217;s &#8230; <a href="https://simonroses.com/2026/04/what-is-vibe-coding-security-a-field-guide-for-2026-part-1/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/04/what-is-vibe-coding-security-a-field-guide-for-2026-part-1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2267</post-id>	</item>
		<item>
		<title>AI Must Make Superhumans, Not Unemployed: The Case Against Layoffs and Unaffordable Agents</title>
		<link>https://simonroses.com/2026/04/ai-must-make-superhumans-not-unemployed-the-case-against-layoffs-and-unaffordable-agents/</link>
					<comments>https://simonroses.com/2026/04/ai-must-make-superhumans-not-unemployed-the-case-against-layoffs-and-unaffordable-agents/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Sat, 04 Apr 2026 11:45:17 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Economics]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tecnologia]]></category>
		<category><![CDATA[AgenticAI]]></category>
		<category><![CDATA[openclaw]]></category>
		<category><![CDATA[OpenSourceModel]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2260</guid>

					<description><![CDATA[**Read Time:** 12 minutes ## TL;DR AI should elevate people, not eliminate them. Every employee with AI becomes a superhuman: faster, smarter, more capable. Yet some companies are choosing mass layoffs instead of empowerment, and AI providers are making the &#8230; <a href="https://simonroses.com/2026/04/ai-must-make-superhumans-not-unemployed-the-case-against-layoffs-and-unaffordable-agents/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/04/ai-must-make-superhumans-not-unemployed-the-case-against-layoffs-and-unaffordable-agents/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2260</post-id>	</item>
		<item>
		<title>Moltbook: When AI Agents Build Their Own Social Network, What Could Go Wrong?</title>
		<link>https://simonroses.com/2026/03/moltbook-when-ai-agents-build-their-own-social-network-what-could-go-wrong/</link>
					<comments>https://simonroses.com/2026/03/moltbook-when-ai-agents-build-their-own-social-network-what-could-go-wrong/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 10:14:51 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[AgenticAI]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[openclaw]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Software Security]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2254</guid>

					<description><![CDATA[**Read Time:** 14 minutes ## TL;DR [Moltbook](https://www.moltbook.com/) bills itself as &#8220;A Social Network for AI Agents&#8221;—a platform where autonomous agents post content, share skills, upvote, comment, and interact with each other. Think Reddit, but every user is an AI agent. &#8230; <a href="https://simonroses.com/2026/03/moltbook-when-ai-agents-build-their-own-social-network-what-could-go-wrong/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/03/moltbook-when-ai-agents-build-their-own-social-network-what-could-go-wrong/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2254</post-id>	</item>
		<item>
		<title>Professional Vibe Coding vs. Vibe Coding: Why Developers Should Embrace It (On Their Own Terms)</title>
		<link>https://simonroses.com/2026/03/professional-vibe-coding-vs-vibe-coding-why-developers-should-embrace-it-on-their-own-terms/</link>
					<comments>https://simonroses.com/2026/03/professional-vibe-coding-vs-vibe-coding-why-developers-should-embrace-it-on-their-own-terms/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 07:36:34 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Threat Modeling]]></category>
		<category><![CDATA[ai-security]]></category>
		<category><![CDATA[AppSec]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[ProfessionalVibeCoding]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[VibeCoding]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2248</guid>

					<description><![CDATA[**Read Time:** 10 minutes ## TL;DR Vibe coding (letting AI generate entire applications from natural language prompts) has exploded in popularity. For non-coders, it is a revolution: suddenly anyone can build software. But the conversation usually stops there, as if &#8230; <a href="https://simonroses.com/2026/03/professional-vibe-coding-vs-vibe-coding-why-developers-should-embrace-it-on-their-own-terms/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/03/professional-vibe-coding-vs-vibe-coding-why-developers-should-embrace-it-on-their-own-terms/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2248</post-id>	</item>
		<item>
		<title>AI Agent Skill Poisoning: The Supply Chain Attack You Haven&#8217;t Heard Of</title>
		<link>https://simonroses.com/2026/02/ai-agent-skill-poisoning-the-supply-chain-attack-you-havent-heard-of/</link>
					<comments>https://simonroses.com/2026/02/ai-agent-skill-poisoning-the-supply-chain-attack-you-havent-heard-of/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 06:59:44 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[agent-security]]></category>
		<category><![CDATA[ai-security]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[openclaw]]></category>
		<category><![CDATA[pentesting]]></category>
		<category><![CDATA[Skill]]></category>
		<category><![CDATA[supply-chain]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2237</guid>

					<description><![CDATA[**Read Time:** 15 minutes ## TL;DR Security professionals are well acquainted with npm supply chain attacks, PyPI package poisoning, and the infamous [xz backdoor](https://en.wikipedia.org/wiki/XZ_Utils_backdoor). But a new attack vector is emerging that flies under the radar—one that is arguably more &#8230; <a href="https://simonroses.com/2026/02/ai-agent-skill-poisoning-the-supply-chain-attack-you-havent-heard-of/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/02/ai-agent-skill-poisoning-the-supply-chain-attack-you-havent-heard-of/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2237</post-id>	</item>
		<item>
		<title>The Shadow Twin Threats: When AI and Vibe Coding Go Rogue in Your Network</title>
		<link>https://simonroses.com/2026/02/the-shadow-twin-threats-when-ai-and-vibe-coding-go-rogue-in-your-network/</link>
					<comments>https://simonroses.com/2026/02/the-shadow-twin-threats-when-ai-and-vibe-coding-go-rogue-in-your-network/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Thu, 19 Feb 2026 09:24:56 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[Vibe Coding]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2216</guid>

					<description><![CDATA[**Read Time:** 15 minutes ## TL;DR Your IT department doesn&#8217;t know it yet, but someone in marketing just spun up an Ollama server to run a local LLM. Finance is building a custom payroll app with Cursor. And that NVIDIA &#8230; <a href="https://simonroses.com/2026/02/the-shadow-twin-threats-when-ai-and-vibe-coding-go-rogue-in-your-network/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/02/the-shadow-twin-threats-when-ai-and-vibe-coding-go-rogue-in-your-network/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2216</post-id>	</item>
		<item>
		<title>My Experience Using OpenClaw: A Security Professional&#8217;s Journey</title>
		<link>https://simonroses.com/2026/02/my-experience-using-openclaw-a-security-professionals-journey/</link>
					<comments>https://simonroses.com/2026/02/my-experience-using-openclaw-a-security-professionals-journey/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 10:11:30 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Agents]]></category>
		<category><![CDATA[OpemClaw]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2210</guid>

					<description><![CDATA[**Read Time:** 12 minutes ## TL;DR OpenClaw has transformed how I work as a cybersecurity consultant and developer. After two weeks of daily use, I&#8217;ve automated email management, built custom security tools overnight, and integrated AI into my pentesting workflow—all &#8230; <a href="https://simonroses.com/2026/02/my-experience-using-openclaw-a-security-professionals-journey/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/02/my-experience-using-openclaw-a-security-professionals-journey/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2210</post-id>	</item>
		<item>
		<title>Information Warfare Strategies (SRF-IWS): Offensive Operations at the Davos Forum 2026 (Part 3)</title>
		<link>https://simonroses.com/2026/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-2026-part-3/</link>
					<comments>https://simonroses.com/2026/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-2026-part-3/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 17:12:36 +0000</pubDate>
				<category><![CDATA[Hacking Etico]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[RADIO]]></category>
		<category><![CDATA[RF]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[attack vector]]></category>
		<category><![CDATA[Computer Network Operations (CNO)]]></category>
		<category><![CDATA[Cyber Wars]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Davos]]></category>
		<category><![CDATA[Information Warfare]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2179</guid>

					<description><![CDATA[**Disclaimer:** Everything described here is pure imagination and any resemblance to reality is coincidental. This document is intended for security professionals to develop defensive countermeasures. The author is not responsible for the consequences of any action taken based on the &#8230; <a href="https://simonroses.com/2026/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-2026-part-3/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-2026-part-3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2179</post-id>	</item>
		<item>
		<title>Information Warfare Strategies (SRF-IWS): Offensive Operations at the Davos Forum (Part 2)</title>
		<link>https://simonroses.com/2025/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-part-2/</link>
					<comments>https://simonroses.com/2025/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-part-2/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Tue, 21 Jan 2025 19:46:37 +0000</pubDate>
				<category><![CDATA[Books]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Economics]]></category>
		<category><![CDATA[Hacking Etico]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[RADIO]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Computer Network Operations (CNO)]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Information Warfare]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[RF]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2162</guid>

					<description><![CDATA[Disclaimer: Everything described here is pure imagination and any resemblance to reality is coincidental. The author is not responsible for the consequences of any action taken based on the information provided in the article. Please read Part 1 (Davos 2024) &#8230; <a href="https://simonroses.com/2025/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-part-2/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2025/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-part-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">2162</post-id>	</item>
	</channel>
</rss>
