<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>War Room</title>
	<atom:link href="https://warroom.rsmus.com/category/physical/feed/" rel="self" type="application/rss+xml" />
	<link>https://warroom.rsmus.com</link>
	<description>Shells From Above</description>
	<lastBuildDate>Thu, 15 Feb 2024 19:23:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://warroom.rsmus.com/wp-content/uploads/2018/09/cropped-favicon-32x32.png</url>
	<title>War Room</title>
	<link>https://warroom.rsmus.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Intel Insights &#8211; USB Flash Drive Bombs Observed in Ecuador</title>
		<link>https://warroom.rsmus.com/intel-insights-usb-flash-drive-bombs/</link>
		
		<dc:creator><![CDATA[Joel Belton]]></dc:creator>
		<pubDate>Fri, 24 Mar 2023 19:58:37 +0000</pubDate>
				<category><![CDATA[Physical]]></category>
		<category><![CDATA[RSM Defense]]></category>
		<category><![CDATA[Threat Intelligence]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5982</guid>

					<description><![CDATA[RSM Defense Intelligence has observed some claims and reports of a Universal Serial Bus (USB) thumb drive or commonly called flash drive being used as single detonation bombs. One such example was in Ecuador. The device was mailed to a journalist and Ecuadorian television presenter, which resulted in the USB being utilized as an explosive [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>TSA cybersecurity directives: What pipeline companies need to know</title>
		<link>https://warroom.rsmus.com/tsa-cybersecurity-directives-what-pipeline-companies-need-to-know/</link>
		
		<dc:creator><![CDATA[Ken Smith]]></dc:creator>
		<pubDate>Wed, 04 Aug 2021 17:01:44 +0000</pubDate>
				<category><![CDATA[Defense]]></category>
		<category><![CDATA[Physical]]></category>
		<category><![CDATA[Pipeline]]></category>
		<category><![CDATA[TSA]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=5474</guid>

					<description><![CDATA[After the Colonial Pipeline ransomware attack shut down the entire pipeline system for over a week, the Department of Homeland Security’s (DHS) Transportation Security Administration (TSA) issued a directive requiring all pipeline companies to take immediate actions to mitigate cyber risks. The first cybersecurity directive was issued on May 27 and the follow-up directive was [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Physical Penetration Testing Basics – A Primer</title>
		<link>https://warroom.rsmus.com/physical-penetration-testing-basics-primer/</link>
		
		<dc:creator><![CDATA[RSM Author]]></dc:creator>
		<pubDate>Mon, 09 Oct 2017 20:55:28 +0000</pubDate>
				<category><![CDATA[Physical]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=4346</guid>

					<description><![CDATA[Physical Penetration Testing is an assessment that involves testing physical security controls to see where they might fail. While this can include a number of different activities, including social engineering, many doors and locks are designed to simply slow down an attacker, not completely protect against one. At RSM, we constructed a sample door for [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Dirty Deeds&#8230;. On Video</title>
		<link>https://warroom.rsmus.com/dirty-deeds-video/</link>
		
		<dc:creator><![CDATA[Thomas McBee]]></dc:creator>
		<pubDate>Fri, 26 May 2017 21:19:47 +0000</pubDate>
				<category><![CDATA[Physical]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Tools]]></category>
		<guid isPermaLink="false">https://warroom.rsmus.com/?p=3853</guid>

					<description><![CDATA[Recently the team and I were engaged in a physical penetration test where our goal was to gain access to multiple facilities and data deemed sensitive by the client. During our internal discussions for the engagement it was brought up that recording portions of the assessment could provide some additional benefit for the client. As [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
