<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/category/attack-vectors/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:22:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Monarchy Lives On &#8211; BECs are alive and well</title>
		<link>https://warroom.rsmus.com/the-monarchy-lives-on-becs-are-alive-and-well/</link>
		
		<dc:creator><![CDATA[Sean Renshaw]]></dc:creator>
		<pubDate>Thu, 04 May 2023 16:54:09 +0000</pubDate>
				<category><![CDATA[Attack Vectors]]></category>
		<category><![CDATA[Business Email Compromise]]></category>
		<category><![CDATA[Forensics]]></category>
		<category><![CDATA[BEC]]></category>
		<category><![CDATA[Fraud]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5997</guid>

					<description><![CDATA[For decades, fraudsters have attempted to separate people from their hard-earned money by purporting to be an exiled member of a royal family. Historically, this was done via phone calls and written letters to potential victims. Throughout the years, these “members” of the monarchy were able to successfully exploit peoples good will, and often greed, [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>2022 Attack Vectors Report</title>
		<link>https://warroom.rsmus.com/2022-attack-vectors-report/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Thu, 27 Oct 2022 19:54:14 +0000</pubDate>
				<category><![CDATA[Attack Vectors]]></category>
		<category><![CDATA[AD CS]]></category>
		<category><![CDATA[Attack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Kerberoasting]]></category>
		<category><![CDATA[LLMNR]]></category>
		<category><![CDATA[Maturity]]></category>
		<category><![CDATA[NIST CSF]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Relay]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5873</guid>

					<description><![CDATA[For many years, RSM has made a continuous effort to assist organizations in addressing cybersecurity challenges, provide tools to achieve a desired state of security, and deliver guidance for attack prevention. We perform security penetration testing to simulate attacks on internal networks and closely mimic security breaches within controlled environments. By conducting these assessments, we [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
