<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/author/jslusar/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:22:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Navigating the Digital Frontier: Common Threats in the Blockchain Industry</title>
		<link>https://warroom.rsmus.com/threats-in-blockchain/</link>
		
		<dc:creator><![CDATA[Jonathan Slusar]]></dc:creator>
		<pubDate>Tue, 01 Aug 2023 18:02:12 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=6046</guid>

					<description><![CDATA[The Double-Edged Sword of Blockchain Innovation  In an era characterized by unprecedented digital innovation, one frontier stands out as both a beacon of potential and a minefield of risk: the blockchain industry. Renowned for its capabilities of instigating transformative changes across sectors, blockchain technology is now ubiquitous, powering cryptocurrencies and underpinning a host of revolutionary [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Back to Basics: LLMNR and NBT-NS Spoofing</title>
		<link>https://warroom.rsmus.com/llmnr-and-nbt-ns-spoofing/</link>
		
		<dc:creator><![CDATA[Jonathan Slusar]]></dc:creator>
		<pubDate>Tue, 20 Sep 2022 18:39:54 +0000</pubDate>
				<category><![CDATA[Back to Basics]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[LLMNR]]></category>
		<category><![CDATA[NBT-NS]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Poisoning]]></category>
		<category><![CDATA[Traffic]]></category>
		<category><![CDATA[Tutorial]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5776</guid>

					<description><![CDATA[After performing initial network reconnaissance and enumeration in a penetration test, there are a vast number of potential pathways into obtaining an initial foothold in a targeted network that can be overwhelming to a pen tester. One of the most basic, but tried and true initial attack vectors that I’ve seen utilized in penetration tests [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>CISA Issues Rare Directive Regarding VMware Exploits</title>
		<link>https://warroom.rsmus.com/cisa-issues-rare-directive-regarding-vmware-exploits/</link>
		
		<dc:creator><![CDATA[Jonathan Slusar]]></dc:creator>
		<pubDate>Thu, 19 May 2022 16:14:39 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5704</guid>

					<description><![CDATA[In a directive posted on May 18, 2022, the Cybersecurity and Infrastructure Security Agency (CISA) declared that all Federal Civilian Executive Branch agencies were required to perform actions on several VMware products: VMware Workspace ONE Access (Access), VMware Identity Manager (vIDM), VMware vRealize Automation (vRA), VMware Cloud Foundation vRealize Suite Lifecycle Manager This directive was [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Counterfeit COVID-19 Cards? An Analysis of Vaccination Record Security</title>
		<link>https://warroom.rsmus.com/vaccination-card-security/</link>
		
		<dc:creator><![CDATA[Jonathan Slusar]]></dc:creator>
		<pubDate>Tue, 07 Sep 2021 20:14:25 +0000</pubDate>
				<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[COVID]]></category>
		<category><![CDATA[covid-19]]></category>
		<category><![CDATA[medical record security]]></category>
		<category><![CDATA[vaccination card spoofing]]></category>
		<category><![CDATA[vaccination cards]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5521</guid>

					<description><![CDATA[The following article has been published exclusively with the intentions of being used for education and training purposes. The author (Luke Labenski), War Room Blog, and RSM do not condone nor approve the usage of the information provided below for malicious purposes. Fraud and forgery are punishable by law and can be met with significant [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
