<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>The Security Blogger</title>
	<atom:link href="https://www.thesecurityblogger.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.thesecurityblogger.com</link>
	<description>Security news, notes and ramblings.</description>
	<lastBuildDate>Tue, 14 Apr 2026 15:19:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>Meet VENOM: The PhaaS Platform That Neutralizes MFA</title>
		<link>https://www.thesecurityblogger.com/meet-venom-the-phaas-platform-that-neutralizes-mfa/</link>
					<comments>https://www.thesecurityblogger.com/meet-venom-the-phaas-platform-that-neutralizes-mfa/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Tue, 14 Apr 2026 15:19:40 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10461</guid>

					<description><![CDATA[Multifactor Authentication (MFA) is not enough security for today&#8217;s sophisticated threat actors. I was reading the Abnormal blog and they posted yet another example of how MFA can be beat. They wrote about the VENOM platform HERE. Key things to know. Check out the post HERE. And think beyond MFA for your defense strategy.]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/meet-venom-the-phaas-platform-that-neutralizes-mfa/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A.I. lockdown due to fear of Attacker benefits to find vulnerabilities</title>
		<link>https://www.thesecurityblogger.com/a-i-lockdown-due-to-fear-of-attacker-benefits-to-find-vulnerabilities/</link>
					<comments>https://www.thesecurityblogger.com/a-i-lockdown-due-to-fear-of-attacker-benefits-to-find-vulnerabilities/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Fri, 10 Apr 2026 18:18:28 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10459</guid>

					<description><![CDATA[The New York times posted a very interesting article about the fear of AI and need for security/controls. They claim many big companies are pumping the breaks on delivering AI without considering security/controls but not for the popular concerns. They list concerns for misinformation, deepfake nudes, people losing control of their jobs, students or other &#8230; <a href="https://www.thesecurityblogger.com/a-i-lockdown-due-to-fear-of-attacker-benefits-to-find-vulnerabilities/" class="more-link">Continue reading <span class="screen-reader-text">A.I. lockdown due to fear of Attacker benefits to find vulnerabilities</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/a-i-lockdown-due-to-fear-of-attacker-benefits-to-find-vulnerabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Device code phishing attacks surge 37x as new kits spread online</title>
		<link>https://www.thesecurityblogger.com/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online/</link>
					<comments>https://www.thesecurityblogger.com/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 06 Apr 2026 15:02:38 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10454</guid>

					<description><![CDATA[Bleeping computer posted about an increase in code phishing attacks HERE. I completely agree these attacks are popular and hitting organizations I work with. To summarize how this works, I&#8217;ll pull from the Bleeping computer post (see the full post for details) In this type of attack, the threat actor sends a device authorization request &#8230; <a href="https://www.thesecurityblogger.com/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online/" class="more-link">Continue reading <span class="screen-reader-text">Device code phishing attacks surge 37x as new kits spread online</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/device-code-phishing-attacks-surge-37x-as-new-kits-spread-online/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cisco releases DefenseClaw to help secure OpenClaw</title>
		<link>https://www.thesecurityblogger.com/cisco-releases-defenseclaw-to-help-secure-openclaw/</link>
					<comments>https://www.thesecurityblogger.com/cisco-releases-defenseclaw-to-help-secure-openclaw/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Thu, 02 Apr 2026 14:41:29 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10450</guid>

					<description><![CDATA[Cisco recently released DefenseClaw in response to risks associated with OpenClaw. Here is their write up on this: AI agents are powerful. Unchecked, they&#8217;re dangerous. Large language model agents — like those built on&#160;OpenClaw&#160;— can install skills, call MCP servers, execute code, and reach the network. Every one of those actions is an attack surface. &#8230; <a href="https://www.thesecurityblogger.com/cisco-releases-defenseclaw-to-help-secure-openclaw/" class="more-link">Continue reading <span class="screen-reader-text">Cisco releases DefenseClaw to help secure OpenClaw</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/cisco-releases-defenseclaw-to-help-secure-openclaw/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks</title>
		<link>https://www.thesecurityblogger.com/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/</link>
					<comments>https://www.thesecurityblogger.com/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Mon, 30 Mar 2026 14:42:04 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10447</guid>

					<description><![CDATA[Cybersecurity researchers have disclosed three security vulnerabilities impacting LangChain and LangGraph that, if successfully exploited, could expose filesystem data, environment secrets, and conversation history. Why care? LangChain and LangGraph are widely used open-source frameworks used for LLM. So if you are using AI that has LLMs leaning on LangChain and LangGraph, you probably want to &#8230; <a href="https://www.thesecurityblogger.com/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/" class="more-link">Continue reading <span class="screen-reader-text">LangChain, LangGraph Flaws Expose Files, Secrets, Databases in Widely Used AI Frameworks</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/langchain-langgraph-flaws-expose-files-secrets-databases-in-widely-used-ai-frameworks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Microsoft outlines agentic AI security strategy with new Defender, Entra and Purview capabilities</title>
		<link>https://www.thesecurityblogger.com/microsoft-outlines-agentic-ai-security-strategy-with-new-defender-entra-and-purview-capabilities/</link>
					<comments>https://www.thesecurityblogger.com/microsoft-outlines-agentic-ai-security-strategy-with-new-defender-entra-and-purview-capabilities/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 25 Mar 2026 01:08:24 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10443</guid>

					<description><![CDATA[One hot topic right now is how to address agent security. RSA has many announcements from Cisco to Palo Alto on this topic. Microsoft made their announcements including a new Agent 365 product as well as new capabilities in main product lines for edr, identity and data security. You can find a summary of all &#8230; <a href="https://www.thesecurityblogger.com/microsoft-outlines-agentic-ai-security-strategy-with-new-defender-entra-and-purview-capabilities/" class="more-link">Continue reading <span class="screen-reader-text">Microsoft outlines agentic AI security strategy with new Defender, Entra and Purview capabilities</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/microsoft-outlines-agentic-ai-security-strategy-with-new-defender-entra-and-purview-capabilities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>FBI seeks victims of Steam games used to spread malware</title>
		<link>https://www.thesecurityblogger.com/fbi-seeks-victims-of-steam-games-used-to-spread-malware/</link>
					<comments>https://www.thesecurityblogger.com/fbi-seeks-victims-of-steam-games-used-to-spread-malware/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 18 Mar 2026 00:48:04 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10440</guid>

					<description><![CDATA[I found this post on bleeping computer (found HERE) that covers the steam malware story. For those that don&#8217;t know steam, they have published some of the coolest games including the beloved halflife. It seems like some people are publishing games through steam and either wrapping malware into the games or threat actors are dropping &#8230; <a href="https://www.thesecurityblogger.com/fbi-seeks-victims-of-steam-games-used-to-spread-malware/" class="more-link">Continue reading <span class="screen-reader-text">FBI seeks victims of Steam games used to spread malware</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/fbi-seeks-victims-of-steam-games-used-to-spread-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How To Get Your First Job In Cybersecurity</title>
		<link>https://www.thesecurityblogger.com/how-to-get-your-first-job-in-cybersecurity/</link>
					<comments>https://www.thesecurityblogger.com/how-to-get-your-first-job-in-cybersecurity/#respond</comments>
		
		<dc:creator><![CDATA[admin]]></dc:creator>
		<pubDate>Wed, 04 Feb 2026 16:41:09 +0000</pubDate>
				<category><![CDATA[General Security]]></category>
		<guid isPermaLink="false">https://www.thesecurityblogger.com/?p=10437</guid>

					<description><![CDATA[I speak at a lot of events from conferences to webinars each year. One common question I get when I&#8217;m taking final questions is the title of this post (or something like it). I&#8217;m often asked about what certifications I should take, what training to get a role in cyber or how do I get &#8230; <a href="https://www.thesecurityblogger.com/how-to-get-your-first-job-in-cybersecurity/" class="more-link">Continue reading <span class="screen-reader-text">How To Get Your First Job In Cybersecurity</span></a>]]></description>
		
					<wfw:commentRss>https://www.thesecurityblogger.com/how-to-get-your-first-job-in-cybersecurity/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
