<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/category/defense/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Wed, 11 Mar 2026 21:06:39 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>When Your Browser Becomes the Attacker: Detecting Drive-By Script Execution in the Wild</title>
		<link>https://warroom.rsmus.com/when-your-browser-becomes-the-attacker-detecting-drive-by-script-execution-in-the-wild/</link>
		
		<dc:creator><![CDATA[Justin Dolgos]]></dc:creator>
		<pubDate>Wed, 11 Mar 2026 19:46:54 +0000</pubDate>
				<category><![CDATA[Defense]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=6331</guid>

					<description><![CDATA[Published by The RSM Defense Threat Hunting Team Author: Justin Dolgos &#8211; Sr. Threat Hunter MITRE ATT&#38;CK: T1204.002 · T1059 · T1218 · T1219 · T1222 &#160; ⚠  TLDR Executive Summary Our threat hunters built a custom detection that fires the moment a browser or Windows Explorer spawns a script or suspicious executable from a [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Fake Captcha Chains – Portable Behaviors, Practical Detections, And Field Notes</title>
		<link>https://warroom.rsmus.com/fake-captcha-chains/</link>
		
		<dc:creator><![CDATA[Justin Dolgos]]></dc:creator>
		<pubDate>Tue, 14 Oct 2025 18:28:19 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<category><![CDATA[Uncategorized]]></category>
		<category><![CDATA[Fake Captcha]]></category>
		<category><![CDATA[Fake Captcha Chains]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=6301</guid>

					<description><![CDATA[Executive Summary RSM Defense’s Threat Hunting Team performed a focused investigation after reviewing recent intelligence on the “Fake CAPTCHA” campaign. Our hypothesis was: “If the actor is in the environment, we may observe escaped or obfuscated PowerShell commands (for example h^t^t^p) used to download and stage payloads.” The hunt confirmed activity that occurred over a [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Threat Hunting Win: Uncovering Multi-Stage Malware from RMM Abuse</title>
		<link>https://warroom.rsmus.com/threat-hunting-win-uncovering-multi-stage-malware-from-rmm-abuse/</link>
		
		<dc:creator><![CDATA[Ben McGavin]]></dc:creator>
		<pubDate>Thu, 05 Jun 2025 12:57:05 +0000</pubDate>
				<category><![CDATA[Defense]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=6280</guid>

					<description><![CDATA[At RSM Defense, we embrace a proactive approach to cybersecurity. Instead of waiting for alerts to trigger a response, our Threat Hunting team regularly conducts hypothesis-driven investigations. These investigations are designed to uncover subtle threats hiding within behavior that might seem legitimate. In late May 2025, our proactive approach paid off when we uncovered an [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Microsoft and HPE targeted by Cozy Bear in seemingly unrelated attacks</title>
		<link>https://warroom.rsmus.com/microsoft-and-hpe-targeted-by-cozy-bear-in-seemingly-unrelated-attacks/</link>
		
		<dc:creator><![CDATA[Morgan Kennedy]]></dc:creator>
		<pubDate>Mon, 29 Jan 2024 14:41:52 +0000</pubDate>
				<category><![CDATA[Threat Intelligence]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=6129</guid>

					<description><![CDATA[Over the past week, Microsoft and Hewlett Packard Enterprise (HPE) disclosed successful campaigns targeting the organizations by Russian-based threat actor Cozy Bear (aka Midnight Blizzard, aka APT29). Both campaigns conducted successfully obtained access to emails for both companies, including emails for senior leadership and cybersecurity positions.  Neither Microsoft nor HPE believe the attacks were related [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
