<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>The Security Blogger</title>
	<atom:link href="https://www.thesecurityblogger.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.thesecurityblogger.com</link>
	<description>Security news, notes and ramblings.</description>
	<lastBuildDate>Thu, 02 Apr 2026 14:41:32 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Cisco releases DefenseClaw to help secure OpenClaw</title>
		<link>https://www.thesecurityblogger.com/cisco-releases-defenseclaw-to-help-secure-openclaw/</link>
					<comments>https://www.thesecurityblogger.com/cisco-releases-defenseclaw-to-help-secure-openclaw/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 14:41:29 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10450</guid>

					<description><![CDATA[Cisco recently released DefenseClaw in response to risks associated with OpenClaw. Here is their write up on this: AI agents are powerful. Unchecked, they&#8217;re dangerous. Large language model agents — like those built on&#160;OpenClaw&#160;— can install skills, call MCP servers, execute code, and reach the network. Every one of those actions is an attack surface. &#8230; <a href="https://www.thesecurityblogger.com/cisco-releases-defenseclaw-to-help-secure-openclaw/" class="more-link">Continue reading <span class="screen-reader-text">Cisco releases DefenseClaw to help secure OpenClaw</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/cisco-releases-defenseclaw-to-help-secure-openclaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks</title>
		<link>https://www.thesecurityblogger.com/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/</link>
					<comments>https://www.thesecurityblogger.com/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 14:42:04 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10447</guid>

					<description><![CDATA[Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose filesystem data, environment secrets, and conversation history. Why care? LangChain and LangGraph are widely used open-source frameworks used for LLM. So if you are using AI that has LLMs leaning on LangChain and LangGraph, you probably want to &#8230; <a href="https://www.thesecurityblogger.com/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/" class="more-link">Continue reading <span class="screen-reader-text">LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft outlines agentic AI security strategy with new Defender, Entra and Purview capabilities</title>
		<link>https://www.thesecurityblogger.com/microsoft-outlines-agentic-ai-security-strategy-with-new-defender-entra-and-purview-capabilities/</link>
					<comments>https://www.thesecurityblogger.com/microsoft-outlines-agentic-ai-security-strategy-with-new-defender-entra-and-purview-capabilities/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 01:08:24 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10443</guid>

					<description><![CDATA[One hot topic right now is how to address agent security. RSA has many announcements from Cisco to Palo Alto on this topic. Microsoft made their announcements including a new Agent 365 product as well as new capabilities in main product lines for edr, identity and data security. You can find a summary of all &#8230; <a href="https://www.thesecurityblogger.com/microsoft-outlines-agentic-ai-security-strategy-with-new-defender-entra-and-purview-capabilities/" class="more-link">Continue reading <span class="screen-reader-text">Microsoft outlines agentic AI security strategy with new Defender, Entra and Purview capabilities</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/microsoft-outlines-agentic-ai-security-strategy-with-new-defender-entra-and-purview-capabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>FBI seeks victims of Steam games used to spread malware</title>
		<link>https://www.thesecurityblogger.com/fbi-seeks-victims-of-steam-games-used-to-spread-malware/</link>
					<comments>https://www.thesecurityblogger.com/fbi-seeks-victims-of-steam-games-used-to-spread-malware/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 18 Mar 2026 00:48:04 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10440</guid>

					<description><![CDATA[I found this post on bleeping computer (found HERE) that covers the steam malware story. For those that don&#8217;t know steam, they have published some of the coolest games including the beloved halflife. It seems like some people are publishing games through steam and either wrapping malware into the games or threat actors are dropping &#8230; <a href="https://www.thesecurityblogger.com/fbi-seeks-victims-of-steam-games-used-to-spread-malware/" class="more-link">Continue reading <span class="screen-reader-text">FBI seeks victims of Steam games used to spread malware</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/fbi-seeks-victims-of-steam-games-used-to-spread-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How To Get Your First Job In Cybersecurity</title>
		<link>https://www.thesecurityblogger.com/how-to-get-your-first-job-in-cybersecurity/</link>
					<comments>https://www.thesecurityblogger.com/how-to-get-your-first-job-in-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 04 Feb 2026 16:41:09 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10437</guid>

					<description><![CDATA[I speak at a lot of events from conferences to webinars each year. One common question I get when I&#8217;m taking final questions is the title of this post (or something like it). I&#8217;m often asked about what certifications I should take, what training to get a role in cyber or how do I get &#8230; <a href="https://www.thesecurityblogger.com/how-to-get-your-first-job-in-cybersecurity/" class="more-link">Continue reading <span class="screen-reader-text">How To Get Your First Job In Cybersecurity</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/how-to-get-your-first-job-in-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Weaponizing Calendar Invites: A Semantic Attack on Google Gemini</title>
		<link>https://www.thesecurityblogger.com/weaponizing-calendar-invites-a-semantic-attack-on-google-gemini/</link>
					<comments>https://www.thesecurityblogger.com/weaponizing-calendar-invites-a-semantic-attack-on-google-gemini/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 23 Jan 2026 18:24:55 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10434</guid>

					<description><![CDATA[I saw this post from Miggo about hiding attacks within Calendar Invites. What is interesting is the use case may seem a nitch situation, but its not. Its more about the challenges with detection with AI-native threats since this is a AI to calendar vulnerability. There are probably many other examples of AI + SOMETHING &#8230; <a href="https://www.thesecurityblogger.com/weaponizing-calendar-invites-a-semantic-attack-on-google-gemini/" class="more-link">Continue reading <span class="screen-reader-text">Weaponizing Calendar Invites: A Semantic Attack on Google Gemini</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/weaponizing-calendar-invites-a-semantic-attack-on-google-gemini/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How to Get Scammed (by DPRK Hackers). Walking through a scam workflow</title>
		<link>https://www.thesecurityblogger.com/how-to-get-scammed-by-dprk-hackers-walking-through-a-scam-workflow/</link>
					<comments>https://www.thesecurityblogger.com/how-to-get-scammed-by-dprk-hackers-walking-through-a-scam-workflow/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 21 Jan 2026 15:45:31 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10430</guid>

					<description><![CDATA[I love reverse engineering threat actor playbooks, scams, etc (you probably can tell from my last few posts). I&#8217;ve posted about my research on this many times on this blog. Medium.com just posted a break down of a scam found HERE. What I like about their approach is this pause between each step and break &#8230; <a href="https://www.thesecurityblogger.com/how-to-get-scammed-by-dprk-hackers-walking-through-a-scam-workflow/" class="more-link">Continue reading <span class="screen-reader-text">How to Get Scammed (by DPRK Hackers). Walking through a scam workflow</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/how-to-get-scammed-by-dprk-hackers-walking-through-a-scam-workflow/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Inside the Scam Complex’s Detailed Playbook</title>
		<link>https://www.thesecurityblogger.com/inside-the-scam-complexs-detailed-playbook/</link>
					<comments>https://www.thesecurityblogger.com/inside-the-scam-complexs-detailed-playbook/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 16 Jan 2026 18:07:34 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10428</guid>

					<description><![CDATA[I&#8217;ve always been interested in what goes on behind scams. You can search this site for posts where I speak to my research. For example, I have boxes of fake checks where I&#8217;ve played along with a scammer to better understand the scam as well as see what type of fake artifacts are shared. HERE &#8230; <a href="https://www.thesecurityblogger.com/inside-the-scam-complexs-detailed-playbook/" class="more-link">Continue reading <span class="screen-reader-text">Inside the Scam Complex’s Detailed Playbook</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/inside-the-scam-complexs-detailed-playbook/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
