<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#" xmlns:media="http://search.yahoo.com/mrss/"
	>

<channel>
	<title>NoTs التكنولوجيا في الأخبار</title>
	<atom:link href="https://hazima.wordpress.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://hazima.wordpress.com</link>
	<description>News of Technology</description>
	<lastBuildDate>Fri, 01 May 2026 05:42:41 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>http://wordpress.com/</generator>
<site xmlns="com-wordpress:feed-additions:1">20564685</site><cloud domain='hazima.wordpress.com' port='80' path='/?rsscloud=notify' registerProcedure='' protocol='http-post' />
<image>
		<url>https://secure.gravatar.com/blavatar/1bdefac6a9311bd626a0e2c0e7bf5134e68cd889343a32d1fd03dd39a1b2d3f1?s=96&#038;d=https%3A%2F%2Fs2.wp.com%2Fi%2Fwebclip.png</url>
		<title>NoTs التكنولوجيا في الأخبار</title>
		<link>https://hazima.wordpress.com</link>
	</image>
	<atom:link rel="search" type="application/opensearchdescription+xml" href="https://hazima.wordpress.com/osd.xml" title="NoTs التكنولوجيا في الأخبار" />
	<atom:link rel='hub' href='https://hazima.wordpress.com/?pushpress=hub'/>
	<item>
		<title>فكرة مشروع مجنونة: كيف تحول الذكاء الاصطناعي إلى مدير تقني (CTO) لمشروعك 🤖</title>
		<link>https://hazima.wordpress.com/2026/05/01/%d9%81%d9%83%d8%b1%d8%a9-%d9%85%d8%b4%d8%b1%d9%88%d8%b9-%d9%85%d8%ac%d9%86%d9%88%d9%86%d8%a9-%d9%83%d9%8a%d9%81-%d8%aa%d8%ad%d9%88%d9%84-%d8%a7%d9%84%d8%b0%d9%83%d8%a7%d8%a1-%d8%a7%d9%84%d8%a7%d8%b5/</link>
					<comments>https://hazima.wordpress.com/2026/05/01/%d9%81%d9%83%d8%b1%d8%a9-%d9%85%d8%b4%d8%b1%d9%88%d8%b9-%d9%85%d8%ac%d9%86%d9%88%d9%86%d8%a9-%d9%83%d9%8a%d9%81-%d8%aa%d8%ad%d9%88%d9%84-%d8%a7%d9%84%d8%b0%d9%83%d8%a7%d8%a1-%d8%a7%d9%84%d8%a7%d8%b5/#respond</comments>
		
		<dc:creator><![CDATA[Hazim Barahmeh]]></dc:creator>
		<pubDate>Fri, 01 May 2026 05:42:41 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">http://hazima.wordpress.com/2026/05/01/%d9%81%d9%83%d8%b1%d8%a9-%d9%85%d8%b4%d8%b1%d9%88%d8%b9-%d9%85%d8%ac%d9%86%d9%88%d9%86%d8%a9-%d9%83%d9%8a%d9%81-%d8%aa%d8%ad%d9%88%d9%84-%d8%a7%d9%84%d8%b0%d9%83%d8%a7%d8%a1-%d8%a7%d9%84%d8%a7%d8%b5/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p class="wp-block-paragraph"><iframe class="youtube-player" width="640" height="360" src="https://www.youtube.com/embed/cmQB0xrSQ0o?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en&#038;autohide=2&#038;wmode=transparent" allowfullscreen="true" style="border:0;" sandbox="allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox"></iframe></p>]]></content:encoded>
					
					<wfw:commentRss>https://hazima.wordpress.com/2026/05/01/%d9%81%d9%83%d8%b1%d8%a9-%d9%85%d8%b4%d8%b1%d9%88%d8%b9-%d9%85%d8%ac%d9%86%d9%88%d9%86%d8%a9-%d9%83%d9%8a%d9%81-%d8%aa%d8%ad%d9%88%d9%84-%d8%a7%d9%84%d8%b0%d9%83%d8%a7%d8%a1-%d8%a7%d9%84%d8%a7%d8%b5/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19378</post-id>
		<media:content url="https://0.gravatar.com/avatar/39633b1da943e412232ead8c00ea3fd915556d5c6e94517e141b8884e1968d6e?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">hazimiai</media:title>
		</media:content>
	</item>
		<item>
		<title>Doxis Supercedes Open-Text OT</title>
		<link>https://hazima.wordpress.com/2026/04/30/doxis-supercedes-open-text-ot/</link>
					<comments>https://hazima.wordpress.com/2026/04/30/doxis-supercedes-open-text-ot/#respond</comments>
		
		<dc:creator><![CDATA[Hazim Barahmeh]]></dc:creator>
		<pubDate>Thu, 30 Apr 2026 17:02:38 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">http://hazima.wordpress.com/2026/04/30/doxis-supercedes-open-text-ot/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><img width="636" height="703" data-attachment-id="19376" data-permalink="https://hazima.wordpress.com/2026/04/30/doxis-supercedes-open-text-ot/img-20260430-wa00232872024584973187899/" data-orig-file="https://hazima.wordpress.com/wp-content/uploads/2026/04/img-20260430-wa00232872024584973187899.jpg" data-orig-size="636,703" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;,&quot;alt&quot;:&quot;&quot;}" data-image-title="img-20260430-wa00232872024584973187899" data-image-description="" data-image-caption="" data-large-file="https://hazima.wordpress.com/wp-content/uploads/2026/04/img-20260430-wa00232872024584973187899.jpg?w=636" src="https://hazima.wordpress.com/wp-content/uploads/2026/04/img-20260430-wa00232872024584973187899.jpg?w=636" alt="" class="wp-image-19376" srcset="https://hazima.wordpress.com/wp-content/uploads/2026/04/img-20260430-wa00232872024584973187899.jpg 636w, https://hazima.wordpress.com/wp-content/uploads/2026/04/img-20260430-wa00232872024584973187899.jpg?w=136 136w, https://hazima.wordpress.com/wp-content/uploads/2026/04/img-20260430-wa00232872024584973187899.jpg?w=271 271w" sizes="(max-width: 636px) 100vw, 636px" /></figure>
]]></content:encoded>
					
					<wfw:commentRss>https://hazima.wordpress.com/2026/04/30/doxis-supercedes-open-text-ot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19377</post-id>
		<media:content url="https://0.gravatar.com/avatar/39633b1da943e412232ead8c00ea3fd915556d5c6e94517e141b8884e1968d6e?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">hazimiai</media:title>
		</media:content>

		<media:content url="https://hazima.wordpress.com/wp-content/uploads/2026/04/img-20260430-wa00232872024584973187899.jpg?w=636" medium="image" />
	</item>
		<item>
		<title>ازاي تبني تطبيق وتكسب منه في 2026 🤯 &#124; Build &#038; Monetize a SaaS</title>
		<link>https://hazima.wordpress.com/2026/04/25/%d8%a7%d8%b2%d8%a7%d9%8a-%d8%aa%d8%a8%d9%86%d9%8a-%d8%aa%d8%b7%d8%a8%d9%8a%d9%82-%d9%88%d8%aa%d9%83%d8%b3%d8%a8-%d9%85%d9%86%d9%87-%d9%81%d9%8a-2026-%f0%9f%a4%af-build-monetize-a-saas/</link>
					<comments>https://hazima.wordpress.com/2026/04/25/%d8%a7%d8%b2%d8%a7%d9%8a-%d8%aa%d8%a8%d9%86%d9%8a-%d8%aa%d8%b7%d8%a8%d9%8a%d9%82-%d9%88%d8%aa%d9%83%d8%b3%d8%a8-%d9%85%d9%86%d9%87-%d9%81%d9%8a-2026-%f0%9f%a4%af-build-monetize-a-saas/#respond</comments>
		
		<dc:creator><![CDATA[Hazim Barahmeh]]></dc:creator>
		<pubDate>Sat, 25 Apr 2026 03:24:46 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">http://hazima.wordpress.com/2026/04/25/%d8%a7%d8%b2%d8%a7%d9%8a-%d8%aa%d8%a8%d9%86%d9%8a-%d8%aa%d8%b7%d8%a8%d9%8a%d9%82-%d9%88%d8%aa%d9%83%d8%b3%d8%a8-%d9%85%d9%86%d9%87-%d9%81%d9%8a-2026-%f0%9f%a4%af-build-monetize-a-saas/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p class="wp-block-paragraph"><iframe class="youtube-player" width="640" height="360" src="https://www.youtube.com/embed/j7XXtYAGsZ0?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en&#038;autohide=2&#038;wmode=transparent" allowfullscreen="true" style="border:0;" sandbox="allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox"></iframe></p>]]></content:encoded>
					
					<wfw:commentRss>https://hazima.wordpress.com/2026/04/25/%d8%a7%d8%b2%d8%a7%d9%8a-%d8%aa%d8%a8%d9%86%d9%8a-%d8%aa%d8%b7%d8%a8%d9%8a%d9%82-%d9%88%d8%aa%d9%83%d8%b3%d8%a8-%d9%85%d9%86%d9%87-%d9%81%d9%8a-2026-%f0%9f%a4%af-build-monetize-a-saas/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19375</post-id>
		<media:content url="https://0.gravatar.com/avatar/39633b1da943e412232ead8c00ea3fd915556d5c6e94517e141b8884e1968d6e?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">hazimiai</media:title>
		</media:content>
	</item>
		<item>
		<title>Three Microsoft Defender Zero-Day Vulnerabilities Being Actively Exploited (BlueHammer, RedSun, UnDefend)</title>
		<link>https://hazima.wordpress.com/2026/04/20/three-microsoft-defender-zero-day-vulnerabilities-being-actively-exploited-bluehammer-redsun-undefend/</link>
					<comments>https://hazima.wordpress.com/2026/04/20/three-microsoft-defender-zero-day-vulnerabilities-being-actively-exploited-bluehammer-redsun-undefend/#respond</comments>
		
		<dc:creator><![CDATA[Hazim Barahmeh]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 03:06:17 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">http://hazima.wordpress.com/?p=19369</guid>

					<description><![CDATA[Three actively exploited zero-day vulnerabilities have been identified in Microsoft Defender: BlueHammer (CVE-2026-33825), RedSun, and UnDefend. BlueHammer has been patched; RedSun and UnDefend remain unpatched. BlueHammer and RedSun are Local Privilege Escalation (LPE) flaws; UnDefend is a Denial-of-Service (DoS) flaw that blocks Defender updates.&#160; Exploitation began around April 10, 2026, with all three observed in [&#8230;]]]></description>
										<content:encoded><![CDATA[
<p class="wp-block-paragraph"></p>



<figure class="wp-block-image size-large"><a href="https://hazima.wordpress.com/wp-content/uploads/2026/04/redsun-et-preview-apr16-1.png"><img loading="lazy" width="835" height="525" data-attachment-id="19372" data-permalink="https://hazima.wordpress.com/2026/04/20/three-microsoft-defender-zero-day-vulnerabilities-being-actively-exploited-bluehammer-redsun-undefend/redsun-et-preview-apr16-1/" data-orig-file="https://hazima.wordpress.com/wp-content/uploads/2026/04/redsun-et-preview-apr16-1.png" data-orig-size="835,525" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;,&quot;alt&quot;:&quot;&quot;}" data-image-title="RedSun-ET-preview-apr16 (1)" data-image-description="" data-image-caption="" data-large-file="https://hazima.wordpress.com/wp-content/uploads/2026/04/redsun-et-preview-apr16-1.png?w=835" src="https://hazima.wordpress.com/wp-content/uploads/2026/04/redsun-et-preview-apr16-1.png?w=835" alt="" class="wp-image-19372" srcset="https://hazima.wordpress.com/wp-content/uploads/2026/04/redsun-et-preview-apr16-1.png 835w, https://hazima.wordpress.com/wp-content/uploads/2026/04/redsun-et-preview-apr16-1.png?w=150 150w, https://hazima.wordpress.com/wp-content/uploads/2026/04/redsun-et-preview-apr16-1.png?w=300 300w, https://hazima.wordpress.com/wp-content/uploads/2026/04/redsun-et-preview-apr16-1.png?w=768 768w" sizes="(max-width: 835px) 100vw, 835px" /></a></figure>



<p class="wp-block-paragraph"></p>



<p class="wp-block-paragraph">Three actively exploited zero-day vulnerabilities have been identified in Microsoft Defender: BlueHammer (CVE-2026-33825), RedSun, and UnDefend. BlueHammer has been patched; RedSun and UnDefend remain unpatched. BlueHammer and RedSun are Local Privilege Escalation (LPE) flaws; UnDefend is a Denial-of-Service (DoS) flaw that blocks Defender updates.&nbsp;</p>



<p class="wp-block-paragraph">Exploitation began around April 10, 2026, with all three observed in active post-compromise campaigns. Attackers are executing reconnaissance commands (whoami /priv, cmdkey /list, net group), indicating hands-on-keyboard activity following initial access.&nbsp;</p>



<p class="wp-block-paragraph">CVE-2026-33825 is confirmed publicly exploited. The combination of LPE and defense evasion capabilities makes this critical: attackers can gain full administrative control, disable protections, and achieve persistent, undetected access. The patch gap for RedSun and UnDefend means organizations remain exposed even after applying the latest update cycle.</p>



<p class="wp-block-paragraph">PTTs:</p>



<p class="wp-block-paragraph">T1068 — Exploitation for Privilege Escalation</p>



<p class="wp-block-paragraph">T1562.001 — Impair Defenses: Disable or Modify Tools</p>



<p class="wp-block-paragraph">T1033 — System Owner/User Discovery</p>



<p class="wp-block-paragraph">T1069 — Permission Groups Discovery</p>



<p class="wp-block-paragraph">T1087 — Account Discovery</p>



<p class="wp-block-paragraph">T1078 — Valid Accounts</p>



<p class="wp-block-paragraph">Recommendations:</p>



<ul class="wp-block-list">
<li>Immediately apply the patch for CVE-2026-33825 (BlueHammer) across all managed endpoints.</li>
</ul>



<ul class="wp-block-list">
<li>Implement detection rules for post-exploitation reconnaissance commands: whoami /priv, cmdkey /list, and net group.</li>
</ul>



<ul class="wp-block-list">
<li>Alert on Defender update failures or abnormal Defender service behavior as a potential indicator of UnDefend exploitation.</li>
</ul>



<ul class="wp-block-list">
<li>Restrict local administrative privileges using the principle of least privilege to limit the impact of LPE vulnerabilities.</li>
</ul>



<p class="wp-block-paragraph">Until patches are available for RedSun and UnDefend, apply compensating controls: enhanced logging, privileged access workstations (PAWs), and network segmentation.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://hazima.wordpress.com/2026/04/20/three-microsoft-defender-zero-day-vulnerabilities-being-actively-exploited-bluehammer-redsun-undefend/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19369</post-id>
		<media:content url="https://0.gravatar.com/avatar/39633b1da943e412232ead8c00ea3fd915556d5c6e94517e141b8884e1968d6e?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">hazimiai</media:title>
		</media:content>

		<media:content url="https://hazima.wordpress.com/wp-content/uploads/2026/04/redsun-et-preview-apr16-1.png?w=835" medium="image" />
	</item>
		<item>
		<title>Critical RCE in Fortinet FortiSandbox &#8211; CVE-2026-39808</title>
		<link>https://hazima.wordpress.com/2026/04/20/critical-rce-in-fortinet-fortisandbox-cve-2026-39808/</link>
					<comments>https://hazima.wordpress.com/2026/04/20/critical-rce-in-fortinet-fortisandbox-cve-2026-39808/#respond</comments>
		
		<dc:creator><![CDATA[Hazim Barahmeh]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 02:58:48 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[ai]]></category>
		<category><![CDATA[cyber-security]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[technology]]></category>
		<guid isPermaLink="false">http://hazima.wordpress.com/?p=19365</guid>

					<description><![CDATA[CVE-2026-39808 is a critical OS command injection vulnerability affecting Fortinet FortiSandbox versions 4.4.0 through 4.4.8. The flaw resides in the /fortisandbox/job-detail/tracer-behavior endpoint, where unsanitized user input in the jid GET parameter allows an unauthenticated attacker to inject arbitrary OS commands using the pipe symbol (&#124;), resulting in root-level remote code execution (RCE). The vulnerability was [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><a href="https://hazima.wordpress.com/wp-content/uploads/2026/04/image.png"><img loading="lazy" width="1024" height="557" data-attachment-id="19366" data-permalink="https://hazima.wordpress.com/2026/04/20/critical-rce-in-fortinet-fortisandbox-cve-2026-39808/image-29/" data-orig-file="https://hazima.wordpress.com/wp-content/uploads/2026/04/image.png" data-orig-size="2797,1523" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;,&quot;alt&quot;:&quot;&quot;}" data-image-title="image" data-image-description="" data-image-caption="" data-large-file="https://hazima.wordpress.com/wp-content/uploads/2026/04/image.png?w=1024" src="https://hazima.wordpress.com/wp-content/uploads/2026/04/image.png?w=1024" alt="" class="wp-image-19366" srcset="https://hazima.wordpress.com/wp-content/uploads/2026/04/image.png?w=1024 1024w, https://hazima.wordpress.com/wp-content/uploads/2026/04/image.png?w=2048 2048w, https://hazima.wordpress.com/wp-content/uploads/2026/04/image.png?w=150 150w, https://hazima.wordpress.com/wp-content/uploads/2026/04/image.png?w=300 300w, https://hazima.wordpress.com/wp-content/uploads/2026/04/image.png?w=768 768w, https://hazima.wordpress.com/wp-content/uploads/2026/04/image.png?w=1440 1440w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p class="wp-block-paragraph">CVE-2026-39808 is a critical OS command injection vulnerability affecting Fortinet FortiSandbox versions 4.4.0 through 4.4.8. The flaw resides in the /fortisandbox/job-detail/tracer-behavior endpoint, where unsanitized user input in the jid GET parameter allows an unauthenticated attacker to inject arbitrary OS commands using the pipe symbol (|), resulting in root-level remote code execution (RCE).</p>



<p class="wp-block-paragraph">The vulnerability was discovered in November 2025 and patched and publicly disclosed by Fortinet in April 2026 under advisory FG-IR-26-100. A working proof-of-concept (PoC) exploit has since been published on GitHub by researcher samu-delucas, reducing the barrier to exploitation to a single curl command — requiring no authentication, no special tooling, and no prior knowledge of the target environment.</p>



<p class="wp-block-paragraph">Public exploitation: The PoC is freely available. Active exploitation in the wild should be assumed and treated as imminent.</p>



<p class="wp-block-paragraph">Potential impact: Full host compromise, sensitive file exfiltration, malware deployment, lateral movement from within sandbox infrastructure — a high-value target given FortiSandbox&#8217;s role in threat analysis pipelines.</p>



<p class="wp-block-paragraph">TTPs:</p>



<p class="wp-block-paragraph">T1190 &#8211; Exploit Public-Facing Application</p>



<p class="wp-block-paragraph">T1059 &#8211; Command and Scripting Interpreter</p>



<p class="wp-block-paragraph">T1068 &#8211; Exploitation for Privilege Escalation</p>



<p class="wp-block-paragraph">T1105 &#8211; Ingress Tool Transfer</p>



<p class="wp-block-paragraph">T1505 &#8211; Server Software Component</p>



<p class="wp-block-paragraph">T1083 &#8211; File and Directory Discovery</p>



<p class="wp-block-paragraph">Recommendations:</p>



<p class="wp-block-paragraph">Immediately upgrade FortiSandbox to a version beyond 4.4.8 as per Fortinet advisory FG-IR-26-100; do not defer — a weaponized PoC is publicly available</p>



<p class="wp-block-paragraph">Verify all deployed FortiSandbox instances and confirm version; prioritise internet-facing or management-accessible deployments</p>



<p class="wp-block-paragraph">Apply network segmentation to restrict access to FortiSandbox administrative and management interfaces to trusted IP ranges only; these interfaces should never be exposed to untrusted networks or the public internet</p>



<p class="wp-block-paragraph">Audit firewall rules and WAF policies to block or alert on GET requests containing pipe symbols (|) targeting the /fortisandbox/job-detail/tracer-behavior endpoint</p>



<p class="wp-block-paragraph">Review access logs for suspicious GET requests to /fortisandbox/job-detail/tracer-behavior as indicators of active exploitation attempts</p>



<p class="wp-block-paragraph">Implement monitoring and alerting for anomalous outbound connections or new file creation in the web root of FortiSandbox hosts</p>



<p class="wp-block-paragraph">If patching is not immediately possible, consider taking vulnerable FortiSandbox instances offline or placing them behind strict access controls as a temporary mitigation</p>



<p class="wp-block-paragraph"></p>
]]></content:encoded>
					
					<wfw:commentRss>https://hazima.wordpress.com/2026/04/20/critical-rce-in-fortinet-fortisandbox-cve-2026-39808/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19365</post-id>
		<media:content url="https://0.gravatar.com/avatar/39633b1da943e412232ead8c00ea3fd915556d5c6e94517e141b8884e1968d6e?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">hazimiai</media:title>
		</media:content>

		<media:content url="https://hazima.wordpress.com/wp-content/uploads/2026/04/image.png?w=1024" medium="image" />
	</item>
		<item>
		<title>Iran War &#8211; Cyber Threat Outlook</title>
		<link>https://hazima.wordpress.com/2026/04/20/iran-war-cyber-threat-outlook/</link>
					<comments>https://hazima.wordpress.com/2026/04/20/iran-war-cyber-threat-outlook/#respond</comments>
		
		<dc:creator><![CDATA[Hazim Barahmeh]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 02:52:17 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<category><![CDATA[threat-intelligence]]></category>
		<guid isPermaLink="false">http://hazima.wordpress.com/?p=19361</guid>

					<description><![CDATA[A SOCRadar threat intelligence assessment covering the month of the Iran-Israel/US war (Feb 28 – Mar 31, 2026) documents 1,357 verified cyber incidents across 25+ countries, 15+ sectors, and 40+ distinct threat actor groups. The campaign is structured across five phases with distinct threat profiles at each stage. Phase 1 (Feb 28 – Mar 6): [&#8230;]]]></description>
										<content:encoded><![CDATA[
<figure class="wp-block-image size-large"><a href="https://hazima.wordpress.com/wp-content/uploads/2026/04/government-sector-most-targeted.png"><img loading="lazy" width="1024" height="615" data-attachment-id="19362" data-permalink="https://hazima.wordpress.com/2026/04/20/iran-war-cyber-threat-outlook/government-sector-most-targeted/" data-orig-file="https://hazima.wordpress.com/wp-content/uploads/2026/04/government-sector-most-targeted.png" data-orig-size="1262,758" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;,&quot;alt&quot;:&quot;&quot;}" data-image-title="government-sector-most-targeted" data-image-description="" data-image-caption="" data-large-file="https://hazima.wordpress.com/wp-content/uploads/2026/04/government-sector-most-targeted.png?w=1024" src="https://hazima.wordpress.com/wp-content/uploads/2026/04/government-sector-most-targeted.png?w=1024" alt="" class="wp-image-19362" srcset="https://hazima.wordpress.com/wp-content/uploads/2026/04/government-sector-most-targeted.png?w=1024 1024w, https://hazima.wordpress.com/wp-content/uploads/2026/04/government-sector-most-targeted.png?w=150 150w, https://hazima.wordpress.com/wp-content/uploads/2026/04/government-sector-most-targeted.png?w=300 300w, https://hazima.wordpress.com/wp-content/uploads/2026/04/government-sector-most-targeted.png?w=768 768w, https://hazima.wordpress.com/wp-content/uploads/2026/04/government-sector-most-targeted.png 1262w" sizes="(max-width: 1024px) 100vw, 1024px" /></a></figure>



<p class="wp-block-paragraph">A SOCRadar threat intelligence assessment covering the month of the Iran-Israel/US war (Feb 28 – Mar 31, 2026) documents 1,357 verified cyber incidents across 25+ countries, 15+ sectors, and 40+ distinct threat actor groups. The campaign is structured across five phases with distinct threat profiles at each stage.</p>



<p class="wp-block-paragraph">Phase 1 (Feb 28 – Mar 6): Kinetic strikes were immediately accompanied by cyber operations. Iranian government sites, IRNA, and IRGC-affiliated media were taken offline or defaced. Iran-aligned hacktivist coalitions formally organized on Telegram within 72 hours. OT/ICS intrusion claims appeared within 96 hours.</p>



<p class="wp-block-paragraph">Phase 2 (Mar 7–15): Geographic expansion beyond Israel, The defining event was the Stryker Corporation attack on March 12, where Handala (MOIS-linked) abused Microsoft Intune administrator access to remotely wipe 200,000+ devices across 79 countries. Stryker filed an SEC 8-K confirming the incident. This demonstrated that a state-linked actor can leverage compromised cloud MDM infrastructure for destructive global impact against non-combatant civilian companies.</p>



<p class="wp-block-paragraph">Phase 3 (Mar 16–31): Shift to persistent operations and reconnaissance. MuddyWater&#8217;s Dindoor and Fakeset Python implants were confirmed pre-planted in a U.S. bank, airport, defense-adjacent software firm, and NGOs before Feb 28. Geo-doxxing surged (59 incidents in Weeks 3–4), targeting nuclear facilities, offshore gas platforms, military airbases, and refineries. Jordan&#8217;s NCSC confirmed a thwarted APT attack on grain storage. Handala hacked FBI Director Kash Patel&#8217;s personal Gmail account. FBI seized Handala&#8217;s domain; Handala migrated within hours.</p>



<p class="wp-block-paragraph">Phase 4 (Ongoing): Bifurcation point — either managed entrenchment (sustained espionage/coercion) or active escalation (activation of pre-positioned access into destructive operations). Pre-positioned implants remain resident regardless of ceasefire status.</p>



<p class="wp-block-paragraph">TTPs:</p>



<p class="wp-block-paragraph">T1498 &#8211; Network Denial of Service&nbsp;</p>



<p class="wp-block-paragraph">T1485 &#8211; Data Destruction&nbsp;</p>



<p class="wp-block-paragraph">T1078 &#8211; Valid Accounts&nbsp;</p>



<p class="wp-block-paragraph">T1059.006 &#8211; Command and Scripting Interpreter: Python&nbsp;</p>



<p class="wp-block-paragraph">T1133 &#8211; External Remote Services</p>



<p class="wp-block-paragraph">T1567 &#8211; Exfiltration Over Web Service&nbsp;</p>



<p class="wp-block-paragraph">T1588.002 &#8211; Obtain Capabilities: Tool&nbsp;</p>



<p class="wp-block-paragraph">T1583.001 &#8211; Acquire Infrastructure: Domains&nbsp;</p>



<p class="wp-block-paragraph">T1071.001 &#8211; Application Layer Protocol: Web Protocols</p>



<p class="wp-block-paragraph">T1595 &#8211; Active Scanning / Reconnaissance&nbsp;</p>



<p class="wp-block-paragraph">T1489 &#8211; Service Stop&nbsp;</p>



<p class="wp-block-paragraph">T1496 &#8211; Resource Hijacking / Defacement&nbsp;</p>



<p class="wp-block-paragraph">T1190 &#8211; Exploit Public-Facing Application</p>



<p class="wp-block-paragraph">Recommendations:</p>



<ul class="wp-block-list">
<li> Validate DDoS mitigation capacity on all public-facing portals and APIs and confirm upstream scrubbing coverage.</li>
</ul>



<ul class="wp-block-list">
<li>Audit all Microsoft Intune and cloud MDM administrator accounts for unauthorized access; enforce MFA on all admin accounts without exception and review bulk device action logs for unauthorized mass wipe or factory reset commands</li>
</ul>



<ul class="wp-block-list">
<li>Hunt for Dindoor and Fakeset implant indicators across all endpoints; prioritize banks, airports, defense-adjacent organizations, and NGOs</li>
</ul>



<ul class="wp-block-list">
<li>Review and audit all outbound connections to GitHub and Google Drive originating from non-developer endpoints as potential C2 indicators</li>
</ul>



<ul class="wp-block-list">
<li>Audit all installed RMM tools across client environments; remove or block Atera and ScreenConnect where not explicitly authorized</li>
</ul>



<ul class="wp-block-list">
<li>Review all OAuth app grants in Microsoft 365 and Google Workspace tenancies for unauthorized third-party access</li>
</ul>



<ul class="wp-block-list">
<li>For OT/ICS environments: immediately audit internet-facing PLCs, HMI panels, and SCADA systems; remove default vendor credentials and validate OT/IT network segmentation</li>
</ul>



<ul class="wp-block-list">
<li>Conduct a full audit of IP camera and CCTV infrastructure; isolate camera networks from enterprise IT, change all default credentials, and patch against CVE-2023-6895 and CVE-2025-34067</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://hazima.wordpress.com/2026/04/20/iran-war-cyber-threat-outlook/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19361</post-id>
		<media:content url="https://0.gravatar.com/avatar/39633b1da943e412232ead8c00ea3fd915556d5c6e94517e141b8884e1968d6e?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">hazimiai</media:title>
		</media:content>

		<media:content url="https://hazima.wordpress.com/wp-content/uploads/2026/04/government-sector-most-targeted.png?w=1024" medium="image" />
	</item>
		<item>
		<title>ازاي تكسب فلوس من خبرتك .. من غير وظيفة 💰</title>
		<link>https://hazima.wordpress.com/2026/04/19/%d8%a7%d8%b2%d8%a7%d9%8a-%d8%aa%d9%83%d8%b3%d8%a8-%d9%81%d9%84%d9%88%d8%b3-%d9%85%d9%86-%d8%ae%d8%a8%d8%b1%d8%aa%d9%83-%d9%85%d9%86-%d8%ba%d9%8a%d8%b1-%d9%88%d8%b8%d9%8a%d9%81%d8%a9-%f0%9f%92%b0/</link>
					<comments>https://hazima.wordpress.com/2026/04/19/%d8%a7%d8%b2%d8%a7%d9%8a-%d8%aa%d9%83%d8%b3%d8%a8-%d9%81%d9%84%d9%88%d8%b3-%d9%85%d9%86-%d8%ae%d8%a8%d8%b1%d8%aa%d9%83-%d9%85%d9%86-%d8%ba%d9%8a%d8%b1-%d9%88%d8%b8%d9%8a%d9%81%d8%a9-%f0%9f%92%b0/#respond</comments>
		
		<dc:creator><![CDATA[Hazim Barahmeh]]></dc:creator>
		<pubDate>Sun, 19 Apr 2026 03:33:04 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">http://hazima.wordpress.com/2026/04/19/%d8%a7%d8%b2%d8%a7%d9%8a-%d8%aa%d9%83%d8%b3%d8%a8-%d9%81%d9%84%d9%88%d8%b3-%d9%85%d9%86-%d8%ae%d8%a8%d8%b1%d8%aa%d9%83-%d9%85%d9%86-%d8%ba%d9%8a%d8%b1-%d9%88%d8%b8%d9%8a%d9%81%d8%a9-%f0%9f%92%b0/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p class="wp-block-paragraph"><iframe loading="lazy" class="youtube-player" width="640" height="360" src="https://www.youtube.com/embed/qGAJ63_-3cQ?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en&#038;autohide=2&#038;wmode=transparent" allowfullscreen="true" style="border:0;" sandbox="allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox"></iframe></p>]]></content:encoded>
					
					<wfw:commentRss>https://hazima.wordpress.com/2026/04/19/%d8%a7%d8%b2%d8%a7%d9%8a-%d8%aa%d9%83%d8%b3%d8%a8-%d9%81%d9%84%d9%88%d8%b3-%d9%85%d9%86-%d8%ae%d8%a8%d8%b1%d8%aa%d9%83-%d9%85%d9%86-%d8%ba%d9%8a%d8%b1-%d9%88%d8%b8%d9%8a%d9%81%d8%a9-%f0%9f%92%b0/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19359</post-id>
		<media:content url="https://0.gravatar.com/avatar/39633b1da943e412232ead8c00ea3fd915556d5c6e94517e141b8884e1968d6e?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">hazimiai</media:title>
		</media:content>
	</item>
		<item>
		<title>CH163 &#124; د. حاتم زغلول مع البودكاسترز  &#124;   WIFI المصري وراء اختراع</title>
		<link>https://hazima.wordpress.com/2026/04/04/ch163-%d8%af-%d8%ad%d8%a7%d8%aa%d9%85-%d8%b2%d8%ba%d9%84%d9%88%d9%84-%d9%85%d8%b9-%d8%a7%d9%84%d8%a8%d9%88%d8%af%d9%83%d8%a7%d8%b3%d8%aa%d8%b1%d8%b2-wifi-%d8%a7%d9%84%d9%85%d8%b5%d8%b1%d9%8a/</link>
					<comments>https://hazima.wordpress.com/2026/04/04/ch163-%d8%af-%d8%ad%d8%a7%d8%aa%d9%85-%d8%b2%d8%ba%d9%84%d9%88%d9%84-%d9%85%d8%b9-%d8%a7%d9%84%d8%a8%d9%88%d8%af%d9%83%d8%a7%d8%b3%d8%aa%d8%b1%d8%b2-wifi-%d8%a7%d9%84%d9%85%d8%b5%d8%b1%d9%8a/#respond</comments>
		
		<dc:creator><![CDATA[Hazim Barahmeh]]></dc:creator>
		<pubDate>Sat, 04 Apr 2026 10:05:27 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">http://hazima.wordpress.com/2026/04/04/ch163-%d8%af-%d8%ad%d8%a7%d8%aa%d9%85-%d8%b2%d8%ba%d9%84%d9%88%d9%84-%d9%85%d8%b9-%d8%a7%d9%84%d8%a8%d9%88%d8%af%d9%83%d8%a7%d8%b3%d8%aa%d8%b1%d8%b2-wifi-%d8%a7%d9%84%d9%85%d8%b5%d8%b1%d9%8a/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p class="wp-block-paragraph"><iframe loading="lazy" class="youtube-player" width="640" height="360" src="https://www.youtube.com/embed/EOFN6aZZmJI?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en&#038;autohide=2&#038;wmode=transparent" allowfullscreen="true" style="border:0;" sandbox="allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox"></iframe></p>]]></content:encoded>
					
					<wfw:commentRss>https://hazima.wordpress.com/2026/04/04/ch163-%d8%af-%d8%ad%d8%a7%d8%aa%d9%85-%d8%b2%d8%ba%d9%84%d9%88%d9%84-%d9%85%d8%b9-%d8%a7%d9%84%d8%a8%d9%88%d8%af%d9%83%d8%a7%d8%b3%d8%aa%d8%b1%d8%b2-wifi-%d8%a7%d9%84%d9%85%d8%b5%d8%b1%d9%8a/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19358</post-id>
		<media:content url="https://0.gravatar.com/avatar/39633b1da943e412232ead8c00ea3fd915556d5c6e94517e141b8884e1968d6e?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">hazimiai</media:title>
		</media:content>
	</item>
		<item>
		<title>لماذا يريد الجميع أن تصدق أن الذكاء الاصطناعي مجرد فقاعة؟</title>
		<link>https://hazima.wordpress.com/2026/03/28/%d9%84%d9%85%d8%a7%d8%b0%d8%a7-%d9%8a%d8%b1%d9%8a%d8%af-%d8%a7%d9%84%d8%ac%d9%85%d9%8a%d8%b9-%d8%a3%d9%86-%d8%aa%d8%b5%d8%af%d9%82-%d8%a3%d9%86-%d8%a7%d9%84%d8%b0%d9%83%d8%a7%d8%a1-%d8%a7%d9%84%d8%a7/</link>
					<comments>https://hazima.wordpress.com/2026/03/28/%d9%84%d9%85%d8%a7%d8%b0%d8%a7-%d9%8a%d8%b1%d9%8a%d8%af-%d8%a7%d9%84%d8%ac%d9%85%d9%8a%d8%b9-%d8%a3%d9%86-%d8%aa%d8%b5%d8%af%d9%82-%d8%a3%d9%86-%d8%a7%d9%84%d8%b0%d9%83%d8%a7%d8%a1-%d8%a7%d9%84%d8%a7/#respond</comments>
		
		<dc:creator><![CDATA[Hazim Barahmeh]]></dc:creator>
		<pubDate>Sat, 28 Mar 2026 18:30:20 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">http://hazima.wordpress.com/2026/03/28/%d9%84%d9%85%d8%a7%d8%b0%d8%a7-%d9%8a%d8%b1%d9%8a%d8%af-%d8%a7%d9%84%d8%ac%d9%85%d9%8a%d8%b9-%d8%a3%d9%86-%d8%aa%d8%b5%d8%af%d9%82-%d8%a3%d9%86-%d8%a7%d9%84%d8%b0%d9%83%d8%a7%d8%a1-%d8%a7%d9%84%d8%a7/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p class="wp-block-paragraph"><iframe loading="lazy" class="youtube-player" width="640" height="360" src="https://www.youtube.com/embed/A-fgUVE0yY8?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en&#038;autohide=2&#038;wmode=transparent" allowfullscreen="true" style="border:0;" sandbox="allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox"></iframe></p>]]></content:encoded>
					
					<wfw:commentRss>https://hazima.wordpress.com/2026/03/28/%d9%84%d9%85%d8%a7%d8%b0%d8%a7-%d9%8a%d8%b1%d9%8a%d8%af-%d8%a7%d9%84%d8%ac%d9%85%d9%8a%d8%b9-%d8%a3%d9%86-%d8%aa%d8%b5%d8%af%d9%82-%d8%a3%d9%86-%d8%a7%d9%84%d8%b0%d9%83%d8%a7%d8%a1-%d8%a7%d9%84%d8%a7/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19357</post-id>
		<media:content url="https://0.gravatar.com/avatar/39633b1da943e412232ead8c00ea3fd915556d5c6e94517e141b8884e1968d6e?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">hazimiai</media:title>
		</media:content>
	</item>
		<item>
		<title>شرح تفصيلي لاحد اقوى نماذج الذكاء الاصطناعي كلوود Claude AI  &#8211; دليل شامل&#8230;</title>
		<link>https://hazima.wordpress.com/2026/03/25/%d8%b4%d8%b1%d8%ad-%d8%aa%d9%81%d8%b5%d9%8a%d9%84%d9%8a-%d9%84%d8%a7%d8%ad%d8%af-%d8%a7%d9%82%d9%88%d9%89-%d9%86%d9%85%d8%a7%d8%b0%d8%ac-%d8%a7%d9%84%d8%b0%d9%83%d8%a7%d8%a1-%d8%a7%d9%84%d8%a7%d8%b5/</link>
					<comments>https://hazima.wordpress.com/2026/03/25/%d8%b4%d8%b1%d8%ad-%d8%aa%d9%81%d8%b5%d9%8a%d9%84%d9%8a-%d9%84%d8%a7%d8%ad%d8%af-%d8%a7%d9%82%d9%88%d9%89-%d9%86%d9%85%d8%a7%d8%b0%d8%ac-%d8%a7%d9%84%d8%b0%d9%83%d8%a7%d8%a1-%d8%a7%d9%84%d8%a7%d8%b5/#respond</comments>
		
		<dc:creator><![CDATA[Hazim Barahmeh]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 15:59:38 +0000</pubDate>
				<category><![CDATA[Videos]]></category>
		<guid isPermaLink="false">http://hazima.wordpress.com/2026/03/25/%d8%b4%d8%b1%d8%ad-%d8%aa%d9%81%d8%b5%d9%8a%d9%84%d9%8a-%d9%84%d8%a7%d8%ad%d8%af-%d8%a7%d9%82%d9%88%d9%89-%d9%86%d9%85%d8%a7%d8%b0%d8%ac-%d8%a7%d9%84%d8%b0%d9%83%d8%a7%d8%a1-%d8%a7%d9%84%d8%a7%d8%b5/</guid>

					<description><![CDATA[]]></description>
										<content:encoded><![CDATA[<p class="wp-block-paragraph"><iframe loading="lazy" class="youtube-player" width="640" height="360" src="https://www.youtube.com/embed/0YOezAtuRmY?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en&#038;autohide=2&#038;wmode=transparent" allowfullscreen="true" style="border:0;" sandbox="allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox"></iframe></p>]]></content:encoded>
					
					<wfw:commentRss>https://hazima.wordpress.com/2026/03/25/%d8%b4%d8%b1%d8%ad-%d8%aa%d9%81%d8%b5%d9%8a%d9%84%d9%8a-%d9%84%d8%a7%d8%ad%d8%af-%d8%a7%d9%82%d9%88%d9%89-%d9%86%d9%85%d8%a7%d8%b0%d8%ac-%d8%a7%d9%84%d8%b0%d9%83%d8%a7%d8%a1-%d8%a7%d9%84%d8%a7%d8%b5/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">19356</post-id>
		<media:content url="https://0.gravatar.com/avatar/39633b1da943e412232ead8c00ea3fd915556d5c6e94517e141b8884e1968d6e?s=96&#38;d=identicon&#38;r=G" medium="image">
			<media:title type="html">hazimiai</media:title>
		</media:content>
	</item>
	</channel>
</rss>
