<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Simon Roses Femerling &#8211; Blog</title>
	<atom:link href="https://simonroses.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://simonroses.com</link>
	<description>CyberSpace Insecurity 3.X</description>
	<lastBuildDate>Fri, 17 Apr 2026 08:16:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>How to Weaponize AI Agent Skills</title>
		<link>https://simonroses.com/2026/04/how-to-weaponize-ai-agent-skills/</link>
					<comments>https://simonroses.com/2026/04/how-to-weaponize-ai-agent-skills/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 17 Apr 2026 08:16:41 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[agent-security]]></category>
		<category><![CDATA[AgenticAI]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[openclaw]]></category>
		<category><![CDATA[Skills]]></category>
		<category><![CDATA[VibeCoding]]></category>
		<category><![CDATA[VibeCodingSecurity]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2272</guid>

					<description><![CDATA[**Read Time:** 10 minutes ## TL;DR AI agent skills — the modular plugins that let agents search the web, execute commands, send messages, and call APIs — are **the new browser extensions**: useful, powerful, and a massive attack surface nobody &#8230; <a href="https://simonroses.com/2026/04/how-to-weaponize-ai-agent-skills/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/04/how-to-weaponize-ai-agent-skills/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>What Is Vibe Coding Security? A Field Guide for 2026 (Part 1)</title>
		<link>https://simonroses.com/2026/04/what-is-vibe-coding-security-a-field-guide-for-2026-part-1/</link>
					<comments>https://simonroses.com/2026/04/what-is-vibe-coding-security-a-field-guide-for-2026-part-1/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 07:42:37 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Threat Modeling]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[VibeCoding]]></category>
		<category><![CDATA[VibeCodingSecurity]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2267</guid>

					<description><![CDATA[**Read Time:** 13 minutes ## TL;DR Vibe coding — building software by describing what you want and letting AI write the code — went from a viral tweet to a mainstream development practice in about a year. It&#8217;s fast, it&#8217;s &#8230; <a href="https://simonroses.com/2026/04/what-is-vibe-coding-security-a-field-guide-for-2026-part-1/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/04/what-is-vibe-coding-security-a-field-guide-for-2026-part-1/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Must Make Superhumans, Not Unemployed: The Case Against Layoffs and Unaffordable Agents</title>
		<link>https://simonroses.com/2026/04/ai-must-make-superhumans-not-unemployed-the-case-against-layoffs-and-unaffordable-agents/</link>
					<comments>https://simonroses.com/2026/04/ai-must-make-superhumans-not-unemployed-the-case-against-layoffs-and-unaffordable-agents/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Sat, 04 Apr 2026 11:45:17 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Economics]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Tecnologia]]></category>
		<category><![CDATA[AgenticAI]]></category>
		<category><![CDATA[openclaw]]></category>
		<category><![CDATA[OpenSourceModel]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2260</guid>

					<description><![CDATA[**Read Time:** 12 minutes ## TL;DR AI should elevate people, not eliminate them. Every employee with AI becomes a superhuman: faster, smarter, more capable. Yet some companies are choosing mass layoffs instead of empowerment, and AI providers are making the &#8230; <a href="https://simonroses.com/2026/04/ai-must-make-superhumans-not-unemployed-the-case-against-layoffs-and-unaffordable-agents/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/04/ai-must-make-superhumans-not-unemployed-the-case-against-layoffs-and-unaffordable-agents/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Moltbook: When AI Agents Build Their Own Social Network, What Could Go Wrong?</title>
		<link>https://simonroses.com/2026/03/moltbook-when-ai-agents-build-their-own-social-network-what-could-go-wrong/</link>
					<comments>https://simonroses.com/2026/03/moltbook-when-ai-agents-build-their-own-social-network-what-could-go-wrong/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 27 Mar 2026 10:14:51 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[AgenticAI]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[openclaw]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Software Security]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2254</guid>

					<description><![CDATA[**Read Time:** 14 minutes ## TL;DR [Moltbook](https://www.moltbook.com/) bills itself as &#8220;A Social Network for AI Agents&#8221;—a platform where autonomous agents post content, share skills, upvote, comment, and interact with each other. Think Reddit, but every user is an AI agent. &#8230; <a href="https://simonroses.com/2026/03/moltbook-when-ai-agents-build-their-own-social-network-what-could-go-wrong/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/03/moltbook-when-ai-agents-build-their-own-social-network-what-could-go-wrong/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Professional Vibe Coding vs. Vibe Coding: Why Developers Should Embrace It (On Their Own Terms)</title>
		<link>https://simonroses.com/2026/03/professional-vibe-coding-vs-vibe-coding-why-developers-should-embrace-it-on-their-own-terms/</link>
					<comments>https://simonroses.com/2026/03/professional-vibe-coding-vs-vibe-coding-why-developers-should-embrace-it-on-their-own-terms/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Thu, 05 Mar 2026 07:36:34 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Threat Modeling]]></category>
		<category><![CDATA[ai-security]]></category>
		<category><![CDATA[AppSec]]></category>
		<category><![CDATA[DevSecOps]]></category>
		<category><![CDATA[ProfessionalVibeCoding]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[VibeCoding]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2248</guid>

					<description><![CDATA[**Read Time:** 10 minutes ## TL;DR Vibe coding (letting AI generate entire applications from natural language prompts) has exploded in popularity. For non-coders, it is a revolution: suddenly anyone can build software. But the conversation usually stops there, as if &#8230; <a href="https://simonroses.com/2026/03/professional-vibe-coding-vs-vibe-coding-why-developers-should-embrace-it-on-their-own-terms/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/03/professional-vibe-coding-vs-vibe-coding-why-developers-should-embrace-it-on-their-own-terms/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>AI Agent Skill Poisoning: The Supply Chain Attack You Haven&#8217;t Heard Of</title>
		<link>https://simonroses.com/2026/02/ai-agent-skill-poisoning-the-supply-chain-attack-you-havent-heard-of/</link>
					<comments>https://simonroses.com/2026/02/ai-agent-skill-poisoning-the-supply-chain-attack-you-havent-heard-of/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Thu, 26 Feb 2026 06:59:44 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[agent-security]]></category>
		<category><![CDATA[ai-security]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[openclaw]]></category>
		<category><![CDATA[pentesting]]></category>
		<category><![CDATA[Skill]]></category>
		<category><![CDATA[supply-chain]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2237</guid>

					<description><![CDATA[**Read Time:** 15 minutes ## TL;DR Security professionals are well acquainted with npm supply chain attacks, PyPI package poisoning, and the infamous [xz backdoor](https://en.wikipedia.org/wiki/XZ_Utils_backdoor). But a new attack vector is emerging that flies under the radar—one that is arguably more &#8230; <a href="https://simonroses.com/2026/02/ai-agent-skill-poisoning-the-supply-chain-attack-you-havent-heard-of/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/02/ai-agent-skill-poisoning-the-supply-chain-attack-you-havent-heard-of/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Shadow Twin Threats: When AI and Vibe Coding Go Rogue in Your Network</title>
		<link>https://simonroses.com/2026/02/the-shadow-twin-threats-when-ai-and-vibe-coding-go-rogue-in-your-network/</link>
					<comments>https://simonroses.com/2026/02/the-shadow-twin-threats-when-ai-and-vibe-coding-go-rogue-in-your-network/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Thu, 19 Feb 2026 09:24:56 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Application Security]]></category>
		<category><![CDATA[Software Security]]></category>
		<category><![CDATA[Vibe Coding]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2216</guid>

					<description><![CDATA[**Read Time:** 15 minutes ## TL;DR Your IT department doesn&#8217;t know it yet, but someone in marketing just spun up an Ollama server to run a local LLM. Finance is building a custom payroll app with Cursor. And that NVIDIA &#8230; <a href="https://simonroses.com/2026/02/the-shadow-twin-threats-when-ai-and-vibe-coding-go-rogue-in-your-network/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/02/the-shadow-twin-threats-when-ai-and-vibe-coding-go-rogue-in-your-network/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>My Experience Using OpenClaw: A Security Professional&#8217;s Journey</title>
		<link>https://simonroses.com/2026/02/my-experience-using-openclaw-a-security-professionals-journey/</link>
					<comments>https://simonroses.com/2026/02/my-experience-using-openclaw-a-security-professionals-journey/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 13 Feb 2026 10:11:30 +0000</pubDate>
				<category><![CDATA[AI]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Agents]]></category>
		<category><![CDATA[OpemClaw]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2210</guid>

					<description><![CDATA[**Read Time:** 12 minutes ## TL;DR OpenClaw has transformed how I work as a cybersecurity consultant and developer. After two weeks of daily use, I&#8217;ve automated email management, built custom security tools overnight, and integrated AI into my pentesting workflow—all &#8230; <a href="https://simonroses.com/2026/02/my-experience-using-openclaw-a-security-professionals-journey/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/02/my-experience-using-openclaw-a-security-professionals-journey/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Information Warfare Strategies (SRF-IWS): Offensive Operations at the Davos Forum 2026 (Part 3)</title>
		<link>https://simonroses.com/2026/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-2026-part-3/</link>
					<comments>https://simonroses.com/2026/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-2026-part-3/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 17:12:36 +0000</pubDate>
				<category><![CDATA[Hacking Etico]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[RADIO]]></category>
		<category><![CDATA[RF]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[attack vector]]></category>
		<category><![CDATA[Computer Network Operations (CNO)]]></category>
		<category><![CDATA[Cyber Wars]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Davos]]></category>
		<category><![CDATA[Information Warfare]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2179</guid>

					<description><![CDATA[**Disclaimer:** Everything described here is pure imagination and any resemblance to reality is coincidental. This document is intended for security professionals to develop defensive countermeasures. The author is not responsible for the consequences of any action taken based on the &#8230; <a href="https://simonroses.com/2026/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-2026-part-3/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2026/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-2026-part-3/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Information Warfare Strategies (SRF-IWS): Offensive Operations at the Davos Forum (Part 2)</title>
		<link>https://simonroses.com/2025/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-part-2/</link>
					<comments>https://simonroses.com/2025/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-part-2/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Tue, 21 Jan 2025 19:46:37 +0000</pubDate>
				<category><![CDATA[Books]]></category>
		<category><![CDATA[Business]]></category>
		<category><![CDATA[Economics]]></category>
		<category><![CDATA[Hacking Etico]]></category>
		<category><![CDATA[Pentest]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[RADIO]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Computer Network Operations (CNO)]]></category>
		<category><![CDATA[CyberSecurity]]></category>
		<category><![CDATA[Information Warfare]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[RF]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2162</guid>

					<description><![CDATA[Disclaimer: Everything described here is pure imagination and any resemblance to reality is coincidental. The author is not responsible for the consequences of any action taken based on the information provided in the article. Please read Part 1 (Davos 2024) &#8230; <a href="https://simonroses.com/2025/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-part-2/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2025/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum-part-2/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Evolution of Software Development: From Manual Coding to AI-Generated Code and the Security Implications</title>
		<link>https://simonroses.com/2024/08/the-evolution-of-software-development-from-manual-coding-to-ai-generated-code-and-the-security-implications/</link>
					<comments>https://simonroses.com/2024/08/the-evolution-of-software-development-from-manual-coding-to-ai-generated-code-and-the-security-implications/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 02 Aug 2024 11:33:07 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://simonroses.com/?p=2147</guid>

					<description><![CDATA[The journey of software development is a fascinating tale of innovation, creativity, and technological advancement. I started learning how to code in the late 80s as a kid with languages such as Pascal and Clipper, later came C and assembly. &#8230; <a href="https://simonroses.com/2024/08/the-evolution-of-software-development-from-manual-coding-to-ai-generated-code-and-the-security-implications/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2024/08/the-evolution-of-software-development-from-manual-coding-to-ai-generated-code-and-the-security-implications/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Information Warfare Strategies (SRF-IWS): Offensive Operations at the Davos Forum</title>
		<link>https://simonroses.com/2024/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum/</link>
					<comments>https://simonroses.com/2024/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum/#respond</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 19 Jan 2024 08:07:47 +0000</pubDate>
				<category><![CDATA[Hacking Etico]]></category>
		<category><![CDATA[RF]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[attack vector]]></category>
		<category><![CDATA[Computer Network Operations (CNO)]]></category>
		<category><![CDATA[Information Warfare]]></category>
		<category><![CDATA[Intelligence]]></category>
		<guid isPermaLink="false">https://www.simonroses.com/?p=2123</guid>

					<description><![CDATA[Disclaimer: Everything described here is pure imagination and any resemblance to reality is coincidental. The author is not responsible for the consequences of any action taken based on the information provided in the article. The Davos Forum organized by the &#8230; <a href="https://simonroses.com/2024/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2024/01/information-warfare-strategies-srf-iws-offensive-operations-at-the-davos-forum/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Modern Wardriving</title>
		<link>https://simonroses.com/2023/12/modern-wardriving/</link>
					<comments>https://simonroses.com/2023/12/modern-wardriving/#comments</comments>
		
		<dc:creator><![CDATA[Simon Roses]]></dc:creator>
		<pubDate>Fri, 22 Dec 2023 17:05:11 +0000</pubDate>
				<category><![CDATA[Hacking Etico]]></category>
		<category><![CDATA[RADIO]]></category>
		<category><![CDATA[RF]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Wireless]]></category>
		<category><![CDATA[Bluetooth]]></category>
		<category><![CDATA[GSM]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Wardriving]]></category>
		<category><![CDATA[WIFI]]></category>
		<category><![CDATA[wireless]]></category>
		<guid isPermaLink="false">https://www.simonroses.com/?p=2110</guid>

					<description><![CDATA[Let&#8217;s start by defining the word Wardriving: it is the search for WIFI wireless networks from a vehicle equipped with a computer. This would be the classic definition. I define modern wardriving as the search for WIFI networks, Bluetooth devices &#8230; <a href="https://simonroses.com/2023/12/modern-wardriving/">Continue reading <span class="meta-nav">&#8594;</span></a>]]></description>
		
					<wfw:commentRss>https://simonroses.com/2023/12/modern-wardriving/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
	</channel>
</rss>
