<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:g-custom="http://base.google.com/cns/1.0" xmlns:media="http://search.yahoo.com/mrss/" version="2.0">
  <channel>
    <title>OPSEC2:1 Blog</title>
    <link>https://www.opsec21.com</link>
    <description>The En'Wokening. Cybersecurity, Information Technology, Information Security, IT Security, Data Security, Science and Technology, Latest News and Trends.</description>
    <atom:link href="https://www.opsec21.com/feed/rss2" type="application/rss+xml" rel="self" />
    <image>
      <title>OPSEC2:1 Blog</title>
      <url>https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/dms3rep/multi/OPSEC-28DropShadowLightMode-29-1a3e611c-b08216e2.png</url>
      <link>https://www.opsec21.com</link>
    </image>
    <item>
      <title>Runaway Ransomware</title>
      <link>https://www.opsec21.com/runaway-ransomware</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
         This is a subtitle for your new post
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/dms3rep/multi/Ransomware+Incident.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
         When a cyber threat grows in magnitude by 35 times in one year, and continues to become even more prevalent the next, every organization should pay attention. This is exactly what happened with ransomware. Cyber criminals have targeted organizations from many different industry segments, as well as businesses of virtually every size.
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         Ransomware-as-a-Service (RaaS) and other kit-like tools have lowered the entry bar for cyber criminals, enabling even novice attackers to be successful against scattered security infrastructures. And monetary technologies like bitcoin make it virtually impossible for law enforcement authorities to track ransom payments. With the exponential growth in ransom paid to ransomware groups, the prospect that this will continue—and at a faster rate—in coming years is great. Recognizing the growing threat, banks are stocking up on bitcoin so their customers can quickly pay cyber criminals to unlock hacked data.
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
          The Runaway Ransomware Threat
         &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         FortiGuard Labs analysis of global data showed a substantial increase in overall ransomware activity in the second half of 2020, compared to the first half. In fact, FortiGuard Labs analyzed the activity for all signatures that it has classified as ransomware, which showed a sevenfold increase in ransomware activity in December compared to July 2020.
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         Among the most active of the ransomware strains in the second half of 2020 were Egregor, Ryuk, Conti, Thanos, Ragnar, WastedLocker, Phobos/EKING, and BazarLoader. Each of these exhibited varying degrees of prevalence, but the common trend among them was an increase in activity over the period.
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         Threat actors have discovered that cryptolocking critical systems and demanding a ransom for the decryption key is a relatively easy way to extort money from organizations regardless of size or the industry to which they belong. This more targeted and sinister form of ransomware scheme has come to be known as “big game hunting.” It’s been all the rage with the ransomware gangs throughout 2020, and the larger paydays netted by such schemes virtually ensure the trend won’t go away anytime soon.
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         Many adversaries took advantage of the disruptions caused by the COVID-19 pandemic to ramp up ransomware attacks against organizations in the healthcare sector in particular. In October, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), the Department of Health and Human Services, and the FBI issued a joint advisory warning U.S. hospitals and healthcare services of increased ransomware activity involving TrickBot and BazarLoader malware. Other sectors that were also heavily targeted in ransomware attacks in 2H 2020 included professional services firms, consumer services companies, public sector organizations, and financial services firms.
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         Multiple trends characterized the ransomware activity that FortiGuard Labs and others observed in the last half of 2020. One of the most troubling was the steady increase in ransomware attacks that involved data exfiltration and the subsequent threat to release the data if a ransom was not paid. The use of data theft as additional leverage in ransomware campaigns really only emerged as an adversary tactic in early 2020, but became part of a majority of attacks by the end of the year.
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         The operators of most major ransomware strains, including Sodinokibi, Ryuk, Egregor, and Conti, all deployed data exfiltration as part of their standard operations last year. Some reported incidents were attacker (sometimes false) claims of data theft to try and scare victims into paying a ransom. In many cases, when victims paid to get attackers to delete stolen data, the attackers reneged and instead leaked or sold the data to others anyway. For organizations, the trend means that robust data backups alone are no longer enough protection against ransomware demands.
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
          How Ransomware Happens
          &#xD;
    &lt;br/&gt;&#xD;
    
          Distribution of Ransomware
         &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         So, how does ransomware happen? Let’s begin by addressing how it is distributed. Any digital means can be used: email, website attachments, business applications, social media, and USB drivers, among other digital delivery mechanisms. Email remains the number one delivery vector, with cyber criminals preferring to use links first and attachments second.
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         In the case of email, phishing emails are sent as delivery notifications or fake requests for software updates. Once a user clicks on the link or the attachment, there is often (but less so recently) a transparent download of additional malicious components that then encrypt files with RSA 2048-bit private-key encryption, leaving it nearly impossible for the user to decrypt the files. In other instances, ransomware is embedded as a file on a website, which when downloaded and installed, activates the attack.
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
          Types of Ransomware
         &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         Ransomware attacks come in different forms. This past year has seen a substantial evolution in ransomware attacks. Traditional ransomware goes after data, locking files until the ransom is paid. But as mentioned above, with the rapid growth in Internet-of-Things (IoT) devices, a new strain of ransomware emerged. It doesn’t go after an organization’s data, but targets control systems (e.g., vehicles, manufacturing assembly lines, power systems) and shuts them down until the ransom is paid.
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         Let’s take a quick look at some of the most prevalent types of ransomware that exist today:
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;div&gt;&#xD;
    
          •    
          &#xD;
    &lt;b&gt;&#xD;
      
           Off-the-shelf ransomware.
          &#xD;
    &lt;/b&gt;&#xD;
    
          Some ransomware exists as off-the-shelf software that cyber criminals can purchase from darknet marketplaces and install on their own nefarious servers. The hacking and encryption of data and systems are managed directly by the software running on the servers of the cyber criminal. Examples of off-the-shelf ransomware include Stampado and Cerber.
           &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;div&gt;&#xD;
    
          •    
          &#xD;
    &lt;b&gt;&#xD;
      
           Ransomware-as-a-Service.
          &#xD;
    &lt;/b&gt;&#xD;
    
          CryptoLocker is perhaps the most well-known RaaS model. Since its servers were taken down, CTB-Locker emerged as the most common RaaS attack method. Another RaaS that is rapidly growing is Tox, a kit that cyber criminals can download. The result produces a dedicated executable file that can be installed or distributed by the cyber criminal, with 20% of gross ransoms being paid to Tox in bitcoin.
          &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;div&gt;&#xD;
    
          •    
          &#xD;
    &lt;b&gt;&#xD;
      
           Ransomware affiliate programs.
          &#xD;
    &lt;/b&gt;&#xD;
    
          The RaaS model uses affiliate hackers with a proven track record to spread the malware.
          &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;div&gt;&#xD;
    
          •    
          &#xD;
    &lt;b&gt;&#xD;
      
           Attacks on IoT devices.
          &#xD;
    &lt;/b&gt;&#xD;
    
          Ransomware infiltrates IoT devices that control systems critical to a business. It shuts down those systems until a ransom is paid to unlock them.
           &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         Interestingly, in addition to polymorphic code, ransomware often uses metamorphic code to change its digital identity while operating the same way. This rapid growth and constant evolution make it even more difficult for organizations that rely on traditional signature-based antivirus solutions to keep pace. By the time one strain has been identified and blacklisted, cyber criminals have already moved to a new variation. The Ryuk and Sodinokibi ransomware families, for example, both contributed to an increase in the ransom amounts demanded by attackers in Q1 of 2020.
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
          Ransomware Targets
         &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         Virtually every operating system is targeted by ransomware today. Attacks also extend to the cloud and mobile devices. The cloud had been left largely untouched by ransomware, so it’s a new market opportunity for hackers.
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         Cyber criminals also target nearly every industry. In 2020 alone, CISA issued alerts about ransomware targeting pipeline operations, healthcare, the public sector, K-12 schools, and more.
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         Another recent strategy of ransomware hacktivists is to target and compromise vulnerable business servers. “The DearCry ransomware targeting the newly discovered vulnerabilities in Microsoft Exchange in early 2021 is a good example of this tactic, as well as demonstrating the agility of cyber criminals.”6 By targeting servers, hackers can identify and target hosts, multiplying the number of potential infected servers, and devices on a network. This compresses the attack time frame, making the attack more viral than those that start with an end-user. This evolution could translate into victims paying more for decryption keys and an elongation of the time to recover the encrypted data.
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;b&gt;&#xD;
    
          Conclusion
         &#xD;
  &lt;/b&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         The financial impact of ransomware is much larger than just the ransom being paid to cyber criminals. Downtime translates into thousands, hundreds of thousands, or even millions of dollars in lost revenue and productivity. Organizations across multiple industry sectors can attest to these implications. Piecemeal approaches to security are not sufficient to thwart ransomware attacks. Integrated models enabling layered security using next-generation firewalls (NGFW), modern endpoint security, and more are required. These security controls must also use proactive threat intelligence when mounting a defense against cyberattacks.
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a&gt;&#xD;
    &lt;img src="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/dms3rep/multi/Ransomware+Causes.png" alt=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/dms3rep/multi/FBI.png" length="33297" type="image/png" />
      <pubDate>Thu, 01 Jul 2021 16:53:57 GMT</pubDate>
      <author>183:834241822 (Brennon Walker)</author>
      <guid>https://www.opsec21.com/runaway-ransomware</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/dms3rep/multi/FBI.png">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/dms3rep/multi/FBI.png">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Who Goes There?</title>
      <link>https://www.opsec21.com/who-goes-there</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
         This is a subtitle for your new post
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/md/and1/dms3rep/multi/116269.jpeg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;span&gt;&#xD;
      
           Managing Access While Maintaining A Secure Network.
          &#xD;
    &lt;/span&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Managing identities and access entitlements while providing ease-of-use authentication, accessibility to applications, and optimal user experience to end-users is becoming increasingly challenging in a rapidly changing business and IT environment. These challenges are compounded with the disruption to society and business due to the COVID-19 pandemic. As a result, the workforce of many organizations has become even more remote and mobile. Enabling effective access rights for every user to protect the organization from cyber adversaries must evolve. They must keep up as an organization’s security guardrails rapidly move from protected network perimeters out to the new home office branch. According to the 2020 Verizon DBIR1, passwords continue to be a weak link. The “Use of Stolen Credentials” is the #1 “Top Hacking Action” and password dumping malware is on the list of “Top Threat Actions.” The OPSEC identity and access management (IAM) solution gives organizations the ability to centrally control and manage the life cycle of user access to critical information, both in the cloud and on-premises. It provides strong authentication through the use of multi-factor authentication (MFA) for identity assurance, audit trails for business regulatory compliance, end-user single sign-on (SSO) to various resources without repeated authentication to increase security while enhancing end-user experience, and X.509 certificate management for onboarding guests and bring-your-own-device (BYOD) policies. The OPSEC IAM solution is available in physical, virtual, and cloud-hosted form factors for deployment on-premises or in the cloud that fulfills your organization’s business needs.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         Solution for Disparate Access Management Systems
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         Most organizations are using a multitude of disparate systems across departments to manage employees, contractors, partners, guest identities, and data access. For example, a human resources department may use a variety of software solutions to identify employees and contractors and provide access to various resources. The marketing department may be integrated with third-party partner applications and using a variety of software to analyze and execute data and workflows based on user identity data gathered through collaborative partnership initiatives. And meanwhile, IT may use multiple systems, including multiple IAM systems, to provide secure access to the organization for a variety of users and devices. In total, the number of disparate systems and resulting siloed data housed within a modern enterprise are cause for alarm. Not only do disparate systems create an arduous, non-unified experience for end-users, they increase risk and make risk assessments more difficult. Also, managing disjointed systems requires a vast amount of IT time and resources. An effective IAM system provides centralized authentication, SSO, and authorization enforcement for targeted applications that are hosted on-premises or in the cloud. These and similar functions ease IT operations, administration, and maintenance, remove the risks of unforeseeable gaps between systems, and provide secure access for the organization—while providing end-users with a consistent and improved experience during the authentication and sign-on process. Organizations across the globe and across all verticals are increasingly adopting the OPSEC IAM solution. OPSEC IAM is comprised of OPSECAuthenticator, OPSECToken, and OPSECToken Cloud—an “MFA-as-a-service” solution that helps organizations adopt and implement advanced IAM practices.
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         OPSEC IAM: OPSECAuthenticator—A Source of Identity with Centralized Management
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         At the center of the OPSEC IAM is OPSECAuthenticator. OPSECAuthenticator functions as an organization’s source of identity, and is deeply integrated into the OPSEC Security Fabric. OPSECAuthenticator strengthens an organization’s user access by simplifying and centralizing the life-cycle management and storage of user identity information obtained from various systems of record. Through integration with existing Active Directory (AD), Lightweight Directory Access Protocol (LDAP) authentication systems, or cloud-based identity stores, OPSECAuthenticator provides user authentication, including MFA, certificate-based and adaptive authentication, and SSO controls for organizations to assure identity and enable access rights for all users, at any time, and from anywhere, whether through corporate wired, wireless, or remote virtual private network (VPN) connections.
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         OPSECAuthenticator is built with high availability (HA) designed to ensure business continuity and resiliency. HA deployment is simple, and it functions seamlessly during a failover, whether for maintenance or during an unexpected failure. OPSECAuthenticator also includes user self-registration and password recovery options, allowing users to reset their password without engaging the help desk, which can represent a significant cost savings for many organizations. OPSECAuthenticator is available for deployment on-premises, in a virtual environment, or via the public cloud. OPSECAuthenticator licensing is structured simply, with perpetual, nonrecurring costs for all features. OPSECAuthenticator reporting also makes it easy to demonstrate return on investment (ROI) throughout the decision and deployment process. And with OPSECAuthenticator flexible form factors, organizations can choose whichever deployment method best meets their IAM initiatives and budgets. And because of its integrated suite of solutions and powerful engines, organizations can save more than 50% annually as compared with alternative solutions.
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         OPSECAuthenticator protects user access with advanced, streamlined Identity Access Management features such as centralized user access policy, user privilege management, MFA, SSO, audit trails, and more. By increasing user access protection, OPSECAuthenticator makes it more difficult for adversaries to steal credentials, impersonate users or devices, and gain unauthorized access to applications or network resources. Additionally, its centralized management simplifies IT operations and reduces unforeseeable security gaps that can be overlooked when managing disjointed IAM systems.
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         OPSEC IAM: OPSECToken—A Comprehensive Option for MFA
         &#xD;
  &lt;br/&gt;&#xD;
  
         MFA is an essential security feature for any IAM solution because it enforces the verification of multiple credentials. MFA needs to include at least two of the following:
         &#xD;
  &lt;br/&gt;&#xD;
  
         •    Something the user knows: a username and password.
         &#xD;
  &lt;br/&gt;&#xD;
  
         •    Something the user has: a one-time passcode (OTP) in the form of a token or code. This is sent to the user via email or SMS, to a hardware token generator, or to an authenticator application installed on the user’s smartphone.
         &#xD;
  &lt;br/&gt;&#xD;
  
         •    Something specific to the user: biometric information such as the user’s fingerprint, facial recognition, or iris scan.
         &#xD;
  &lt;br/&gt;&#xD;
  
         OPSECToken (FTK) offers a widest range of OTP tokens and MFA use cases to suit any organization’s needs. FTK also comes in a variety of form factors and the following options are available at a perpetual, nonrecurring cost:
         &#xD;
  &lt;br/&gt;&#xD;
  
         •    Application: time-based and user-friendly, with PUSH to accept/deny credentials during the MFA process. It supports either iOS or Android platforms.
         &#xD;
  &lt;br/&gt;&#xD;
  
         •    Standalone: a physical, tamper-resistant device with time-based OTP. These tokens come in the form of a USB stick, half credit card size, or a small keychain size, each with a large screen to display the token.
         &#xD;
  &lt;br/&gt;&#xD;
  
         •    Email and SMS tokens
         &#xD;
  &lt;br/&gt;&#xD;
  
         Token activation can be performed online or offline (making it suitable for closed environments). FTKs can also be transferred between authenticating devices, such as a OPSECGate or OPSECAuthenticator, or between mobile devices (i.e., iOS or Android). This provides visibility, simplifies two-factor authentication management, and increases security to protect organizations from adversaries seeking unauthorized access (even if a cybercriminal has a username and password, they cannot access the system without the other information).
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         OPSECAuthenticator has token options for all users and scenarios to confirm user identity using MFA. With its centralized management, OPSECAuthenticator and FTKs provide organizations with the ability to assure identity and control user access to corporate VPNs, network devices and resources, and on-premises or cloud-based applications.
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         OPSEC IAM: OPSECToken Cloud—Cloud-based “MFA-as-a-Service”
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         OPSECToken Cloud (FTC) provides everything an organization needs to adopt and manage multi-factor authentication in their OPSECGate or OPSECAuthenticator environment. There is no additional authenticator hardware or software required, nor any changes needed to the existing security policy on the OPSECGate or OPSECAuthenticator. FTC is a subscription service available through the purchase of points.
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         FTC points can easily scale as an organization’s needs change. Through its intuitive dashboard, organizations can get a summary of useful metrics such as overall usage, active users, remaining points, and logs that capture key information about both active and closed sessions.
          &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         OPSECToken Cloud makes it easier for organizations to implement MFA by extending user identity further through the verification of something the user has. MFA makes it more difficult for adversaries to gain access to corporate resources even if they have and use stolen credentials, the #1 “Top Hacking Action” and “Top Threat Actions” leading to network breaches.
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         OPSEC Provides a Full Suite of Market-leading Security Solutions
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
  
         OPSEC is a recognized leader in networking and cybersecurity technologies. The OPSEC IAM solution is an excellent value for organizations. It provides the right IAM tools combined with flexible deployment options to enable access rights for every user, ultimately protecting the business from cybersecurity breaches. The fact that it provides life-cycle management and centralized operations, administration, and maintenance, along with ease of use for end-users, makes the OPSEC IAM an easy choice for an organization’s IAM advanced practices.
         &#xD;
  &lt;br/&gt;&#xD;
  &lt;br/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/12364.jpeg" length="68307" type="image/jpeg" />
      <pubDate>Tue, 29 Jun 2021 16:06:08 GMT</pubDate>
      <author>183:834241822 (Brennon Walker)</author>
      <guid>https://www.opsec21.com/who-goes-there</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/12364.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/12364.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Domestic Spying</title>
      <link>https://www.opsec21.com/domestic-spying</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
         This is a subtitle for your new post
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/md/and1/dms3rep/multi/15076.jpeg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Do you know what is happening on your network?
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Do you receive notifications about suspicious behavior on your network?
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Do you have security protocols in place to block the exfiltration of sensitive data on your network?
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          What about unwanted surveillance, do you have a way to ensure you are not being watched?
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Are you data communications encrypted?
           &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Can your data be intercepted?
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          If it is intercepted, will it be usable?
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          These are the important questions that the average home network user does not have answers to, nor have they typically considered. That is why the work we do is so important. The home network exposes a soft underbelly to an otherwise formidable foe. Businesses are secured with the latest and greatest in enterprise cybersecurity hardware, software, and knowledge. What happens when the users of the enterprise networks go home? Home to their neglected and overlooked home network. A network supported by vulnerability filled consumer grade technology built by foreign companies and operated with reckless abandon. As we saw in the Wikileaks files, even our own government has developed techniques and tools to circumvent the limited security of the home network to surveil and track our fellow citizens. All on a scale that is shocking to the uninitiated.
           &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          OPSEC will armor this underbelly. Protection from all enemies, foreign and domestic. OPSEC is the only grass-roots independent cybersecurity firm that is capable of taking on such a task. All our technicians and solutions are vetted to ensure transparency and so that we can deliver peace of mind to our customers. Our principles encompass moral integrity and constant refinement and enrichment of the individual. We require secure moral compass and intestinal fortitude of our operators. Secure operators ensure secure operations with uncompromising moral integrity and discretion.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Talk with a cybersecurity operator about how we can help you answer some of the aforementioned questions today!
          &#xD;
    &lt;a href="mailto:ops@opsec21.com"&gt;&#xD;
      
           Click Here.
          &#xD;
    &lt;/a&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/117865.jpeg" length="178237" type="image/jpeg" />
      <pubDate>Mon, 28 Jun 2021 21:07:30 GMT</pubDate>
      <author>183:834241822 (Brennon Walker)</author>
      <guid>https://www.opsec21.com/domestic-spying</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/117865.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/117865.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Home Network Security</title>
      <link>https://www.opsec21.com/home-network-security</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
         This is a subtitle for your new post
        &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/md/and1/dms3rep/multi/125733.jpeg"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Cyber Security has become one of the biggest concerns for business. Business and Enterprise have increased their spending to an incredible 150 billion dollars in 2021, according to a recent
          &#xD;
    &lt;a href="https://mytechdecisions.com/network-security/gartner-cybersecurity-spending-tops-spending-priorities-in-2021/" target="_blank"&gt;&#xD;
      
           Gartner
          &#xD;
    &lt;/a&gt;&#xD;
    
          study. The driving force is to secure remote workers and the ever expanding digital footprint of business. Emerging threats from foreign nation-state actors, ransomware enthusiasts, and even our own governments have spurred a renewed imperative to secure operations. But, what about your home network? You the individual have a right to know that your home network is secure from unwanted digital communication, wire-tapping, and data harvesting. What is the individual person to do about ransomware and other emerging threats that can cripple and decimate a network that isn't backed by enterprise grade cyber security technicians? The average home user does not have the budget to implement the security countermeasures warranted by such insurmountable threats.
           &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Gartner did not include recent security events that spurred further spending. This spending was to remediate and secure vulnerable systems from real world bad-guys. These events likely pushed the annual spend closer to 200 billion dollars. This year saw one of the biggest cyber security compromises of recorded history. The SolarWinds/FireEye hack took everyone by surprise and exposed some very real vulnerabilities that were overlooked by even the most prepared security teams. Complacency is to blame. Furthermore, the Microsoft Exchange Server vulnerability gave cyber criminals access to confidential and encrypted communications from some of the highest levels of government and enterprise. These vulnerabilities exist in the enterprise environment due to the shear complexity of modern business. These same exploits do not pose a risk to the average home user. However, home users typically deploy consumer grade hardware to create the home network. These consumer grade devices are full of vulnerabilities that are easily exploited. There are an estimated 110 million individual home networks in the U.S. as of 2017 and those numbers likely exploded in 2019 during the COVID-19 lockdown and stay-at-home orders.
           &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          There is a new imperative to secure America; American business, American homes, and American data. The majority of business and government compromises come from the individual. Social engineering and phishing attacks are some of the most effective. Even if you have the latest and greatest in enterprise cyber security hardware, software, and technicians, the users of the network, the people that access the critical data can often be exploited and it is often at home. The home network presents a unique opportunity for cyber criminals and a blind spot for most cyber security teams. Users have personal email accounts, social media, and a digital footprint all of their own. The security of this footprint is the responsibility of the individual and so is subject to their individual cyber security acumen or lack thereof.
         &#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          The average home user does not typically consider vulnerabilities and exploits when they purchase their home network equipment. Even with the hardware recommendations of cyber security professionals, the average home user does not have the skills or time necessary to monitor, control, or implement cyber security countermeasures. The gaping hole in the American cyber security defense becomes ever expansive. OPSEC aims to patch this vulnerability, house by house. By securing the home network, we secure America. Applying enterprise grade technology and solutions to the average consumer's home network. Supplying enterprise grade cyber security technicians and experience to provide solutions to common home network vulnerabilities with cost effectiveness at the forefront. OPSEC already secures businesses with our Network Operations Center and Security Operations Center. Staffed 24x7 and redundant, OPSEC is poised to supply enterprise IT solutions at massive scale. This easily scalable model can be pointed at any network, business or home. OPSEC had zero systems compromised during 2019, 2020, and 2021. OPSEC looks to spread our impeccable track record to the consumer market and make America secure from all enemies, foreign and domestic.
           &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Talk to a cybersecurity technician today. 
          &#xD;
    &lt;a href="mailto:ops@opsec21.com"&gt;&#xD;
      
           Click Here.
          &#xD;
    &lt;/a&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/113701.jpeg" length="257660" type="image/jpeg" />
      <pubDate>Mon, 28 Jun 2021 20:46:51 GMT</pubDate>
      <guid>https://www.opsec21.com/home-network-security</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/113701.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/113701.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Biden's Cybersecurity Executive Order</title>
      <link>https://www.opsec21.com/biden-s-cybersecurity-executive-order</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  &lt;font&gt;&#xD;
    
          New executive orders? What does that mean for us?
         &#xD;
  &lt;/font&gt;&#xD;
  &lt;br/&gt;&#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/md/dmtmpl/dms3rep/multi/blog_post_image.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;div&gt;&#xD;
    
          New executive orders on cybersecurity have been signed. What does it mean for you? It means it is time to invest in the much needed infrastructure upgrades that your cybersecurity consultant has been telling you that you need. If you already listened? Good job, you've done what you are supposed to do. If you, like many of your peers in the private sector, have postponed these upgrades, the time to act is upon us.
           &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          Constant threat of infrastructure compromise is no longer reserved for systems of high value. In the wild, OPSEC technicians have observed nation state actors attempting to compromise new systems on new internet circuits with brand new IP blocks within seconds of initial interconnection. While most attempts seem to be simple brute force attacks that are "shotgunned" en masse to all known public IP blocks, there is a very serious component behind it. Just like the triage of IT support tiers, these nation state actors pass compromised systems up to higher levels and to technicians with far greater knowledge and skill. So what started as a simple brute force that got lucky with a weak password, soon becomes a compromise on the scale of the SolarWinds incident in a nanosecond.
           &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          What is rational person to do in these dire times? Secure your operations. If it plugs in, it needs to be secured against all possible attack vectors, known and unknown. Now is not the time for half-measures. The theory of "just good enough, is good enough" is wrong. It is easier to stop a fly from intruding through a pinhole than it is to bar its entry through an open door. Implementing automation, zero day countermeasures, and behavior analytics are a great start. But true security is multi-layered, redundant, and disaster resilient. So, not only do you have sensors and AI monitoring the pinhole for anything suspicious. You should also have 24x7 staff of fly-swatting enthusiasts jacked up on coffee and general contempt for all fly-kind. This team should further be supported by bug spray, glue traps, poisoned honey-pots, and a claymore as a last ditch failsafe insurance policy.
           &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;div&gt;&#xD;
    
          These nation state actors don't play. Neither does OPSEC.
           &#xD;
    &lt;br/&gt;&#xD;
  &lt;/div&gt;&#xD;
  &lt;br/&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/114225.jpeg" length="135899" type="image/jpeg" />
      <pubDate>Mon, 17 May 2021 21:43:07 GMT</pubDate>
      <author>183:834241822 (Brennon Walker)</author>
      <guid>https://www.opsec21.com/biden-s-cybersecurity-executive-order</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/114225.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/114225.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>The malware of a thousand faces: A comprehensive look at the different Gozi variants spawned over the years</title>
      <link>https://www.opsec21.com/r/Malware/comments/ijx3cn/the_malware_of_a_thousand_faces_a_comprehensive</link>
      <description>submitted by    /u/Megabeets   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/efZkXNvHgGnR_S6D4Fi5eGGqiLa2s3xOlCKxYHvQNoE.jpg" length="3951" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:28:25 GMT</pubDate>
      <guid>https://www.opsec21.com/r/Malware/comments/ijx3cn/the_malware_of_a_thousand_faces_a_comprehensive</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/efZkXNvHgGnR_S6D4Fi5eGGqiLa2s3xOlCKxYHvQNoE.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>[Blog] DLL Fixer leads to Cyrat Ransomware</title>
      <link>https://www.opsec21.com/r/Malware/comments/ikk3ay/blog_dll_fixer_leads_to_cyrat_ransomware</link>
      <description>submitted by    /u/Struppigel   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/9JZledpJu-wfjqzWoUna699cxFWIQ3UZozcRlYlFa0c.jpg" length="2051" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:28:20 GMT</pubDate>
      <guid>https://www.opsec21.com/r/Malware/comments/ikk3ay/blog_dll_fixer_leads_to_cyrat_ransomware</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/9JZledpJu-wfjqzWoUna699cxFWIQ3UZozcRlYlFa0c.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>As revealed in 2020 Cyber Threat Index Report, Imperva Research Labs recorded two separate DDoS attacks between July 1 and 31, each remarkable in its size and scope.</title>
      <link>https://www.opsec21.com/r/Malware/comments/iflox0/as_revealed_in_2020_cyber_threat_index_report</link>
      <description>submitted by    /u/ujeio   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/wranGTBHOtAalK0qGggNXVoFHMhr02PRCZ_OjGcXaRo.jpg" length="1742" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:28:09 GMT</pubDate>
      <guid>https://www.opsec21.com/r/Malware/comments/iflox0/as_revealed_in_2020_cyber_threat_index_report</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/wranGTBHOtAalK0qGggNXVoFHMhr02PRCZ_OjGcXaRo.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials</title>
      <link>https://www.opsec21.com/r/Malware/comments/ibfd83/team_tnt_the_first_cryptomining_worm_to_steal_aws</link>
      <description>submitted by    /u/zenomeno   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/SOCGNhJJQ7oFm3ZddwO3tTHLzcClmMUptDgIyTscIrM.jpg" length="2217" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:28:02 GMT</pubDate>
      <guid>https://www.opsec21.com/r/Malware/comments/ibfd83/team_tnt_the_first_cryptomining_worm_to_steal_aws</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/SOCGNhJJQ7oFm3ZddwO3tTHLzcClmMUptDgIyTscIrM.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Assembly Language / Reversing / Malware Analysis -resources</title>
      <link>https://www.opsec21.com/r/Malware/comments/i5c6wr/assembly_language_reversing_malware_analysis</link>
      <description>submitted by    /u/navneetmuffin   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/NMkX4hLbAUtsHZCktE0ezaGTPr-gP0iU4pIUF3jtyRE.jpg" length="2179" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:27:51 GMT</pubDate>
      <guid>https://www.opsec21.com/r/Malware/comments/i5c6wr/assembly_language_reversing_malware_analysis</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/NMkX4hLbAUtsHZCktE0ezaGTPr-gP0iU4pIUF3jtyRE.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>GandCrab ransomware hacker arrested in Belarus</title>
      <link>https://www.opsec21.com/r/Malware/comments/i4c0lf/gandcrab_ransomware_hacker_arrested_in_belarus</link>
      <description>submitted by    /u/DrinkMoreCodeMore   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/vnLRq3kQ-4DfxXBgIowduUCCb1wq6gUwQOi9Uw4CGb4.jpg" length="3577" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:27:40 GMT</pubDate>
      <guid>https://www.opsec21.com/r/Malware/comments/i4c0lf/gandcrab_ransomware_hacker_arrested_in_belarus</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/vnLRq3kQ-4DfxXBgIowduUCCb1wq6gUwQOi9Uw4CGb4.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Reminder: List of FREE cyber cons/training/resources is a r/cybersecurity wiki now</title>
      <link>https://www.opsec21.com/comments/i1tooa/reminder_list_of_free_cyber_constrainingresources</link>
      <description>submitted by    /u/HeyGuyGuyGuy   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/DQxVwber3s9lJ1NF93j4Nvw8wNFzcbC0XPOLYrtSAqw.jpg" length="3524" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:22:24 GMT</pubDate>
      <guid>https://www.opsec21.com/comments/i1tooa/reminder_list_of_free_cyber_constrainingresources</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/DQxVwber3s9lJ1NF93j4Nvw8wNFzcbC0XPOLYrtSAqw.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Cybercrime has been predicted to rise regardless of the pandemic, says WEF expert</title>
      <link>https://www.opsec21.com/comments/ijyx79/cybercrime_has_been_predicted_to_rise_regardless</link>
      <description>submitted by    /u/amoeraf   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/k3TWsC44Kgshy1ydPiJBnAcT1LLIqMus81HJPj67ZJw.jpg" length="1790" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:12:48 GMT</pubDate>
      <guid>https://www.opsec21.com/comments/ijyx79/cybercrime_has_been_predicted_to_rise_regardless</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/k3TWsC44Kgshy1ydPiJBnAcT1LLIqMus81HJPj67ZJw.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Norway's Parliament Says It Was Hit by 'Significant' Cyber Attack</title>
      <link>https://www.opsec21.com/comments/iklyrk/norways_parliament_says_it_was_hit_by_significant</link>
      <description>submitted by    /u/alexam0603   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/y3jlddOIJuo5Q7OybNPCNEGRJA9JtBxXbi-6O4s-fuo.jpg" length="911" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:12:44 GMT</pubDate>
      <guid>https://www.opsec21.com/comments/iklyrk/norways_parliament_says_it_was_hit_by_significant</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/y3jlddOIJuo5Q7OybNPCNEGRJA9JtBxXbi-6O4s-fuo.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Protect against Syn Attacks</title>
      <link>https://www.opsec21.com/comments/ikjr22/protect_against_syn_attacks</link>
      <description>submitted by    /u/orangehello1   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/-f4uAus9GRQEawHo5TGYN8LuVL5cahcjqa1-0DGUwRA.jpg" length="6416" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:12:39 GMT</pubDate>
      <guid>https://www.opsec21.com/comments/ikjr22/protect_against_syn_attacks</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/-f4uAus9GRQEawHo5TGYN8LuVL5cahcjqa1-0DGUwRA.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Facebook Sues App Developers for Harvesting Users’ Data Illegally</title>
      <link>https://www.opsec21.com/comments/ikksa5/facebook_sues_app_developers_for_harvesting_users</link>
      <description>submitted by    /u/cisoonboard   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/u8x306B8Y6xNNjzR9q6SwyQxkA0hrllIIRvQkeNVH2E.jpg" length="4208" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:12:34 GMT</pubDate>
      <guid>https://www.opsec21.com/comments/ikksa5/facebook_sues_app_developers_for_harvesting_users</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/u8x306B8Y6xNNjzR9q6SwyQxkA0hrllIIRvQkeNVH2E.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>8 in 10 Consumers are Concerned to Share their Personal Data to Companies</title>
      <link>https://www.opsec21.com/comments/ikinl0/8_in_10_consumers_are_concerned_to_share_their</link>
      <description>submitted by    /u/cisoonboard   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/IEhyip-Vd2T4Pq5FOdbcXF_81SAZYzgzqjaAdNYFPYA.jpg" length="4715" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:12:29 GMT</pubDate>
      <guid>https://www.opsec21.com/comments/ikinl0/8_in_10_consumers_are_concerned_to_share_their</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/IEhyip-Vd2T4Pq5FOdbcXF_81SAZYzgzqjaAdNYFPYA.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Best Practice Guide For Rest API Security</title>
      <link>https://www.opsec21.com/comments/iki57l/best_practice_guide_for_rest_api_security</link>
      <description>submitted by    /u/aman_agrwl   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/YaKah-NeB8fJ4cK1ZQRPUMWKp7sKGK_UitOYES0pnNw.jpg" length="1652" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:12:27 GMT</pubDate>
      <guid>https://www.opsec21.com/comments/iki57l/best_practice_guide_for_rest_api_security</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/YaKah-NeB8fJ4cK1ZQRPUMWKp7sKGK_UitOYES0pnNw.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Start Measuring Your Cybersecurity Maturity Today</title>
      <link>https://www.opsec21.com/comments/ikgjg1/start_measuring_your_cybersecurity_maturity_today</link>
      <description>submitted by    /u/cisoonboard   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/WcJVoQ8Of60cTyv1Wskewwh3bhFM5uA28yC2uuReYhw.jpg" length="4750" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:12:20 GMT</pubDate>
      <guid>https://www.opsec21.com/comments/ikgjg1/start_measuring_your_cybersecurity_maturity_today</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/WcJVoQ8Of60cTyv1Wskewwh3bhFM5uA28yC2uuReYhw.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Covid Is Accelerating a Global Censorship Crisis</title>
      <link>https://www.opsec21.com/comments/ijvma4/covid_is_accelerating_a_global_censorship_crisis</link>
      <description>submitted by    /u/Plethura   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/XGsrPKqSGZJnAHJXmlEHu1a1-EPAxCmhtBrw1njYzrA.jpg" length="2205" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:12:13 GMT</pubDate>
      <guid>https://www.opsec21.com/comments/ijvma4/covid_is_accelerating_a_global_censorship_crisis</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/XGsrPKqSGZJnAHJXmlEHu1a1-EPAxCmhtBrw1njYzrA.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Profile of a Cybercriminal: Cryptocurrency Attacks</title>
      <link>https://www.opsec21.com/comments/ikivkl/profile_of_a_cybercriminal_cryptocurrency_attacks</link>
      <description>submitted by    /u/Abecedisq   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/n2Rxqbg8TLYL6ZzcG6UzxDEVtjMycLBWR84UZRl7_RE.jpg" length="2618" type="image/jpeg" />
      <pubDate>Tue, 01 Sep 2020 15:12:01 GMT</pubDate>
      <guid>https://www.opsec21.com/comments/ikivkl/profile_of_a_cybercriminal_cryptocurrency_attacks</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/n2Rxqbg8TLYL6ZzcG6UzxDEVtjMycLBWR84UZRl7_RE.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>A failed Risk Management</title>
      <link>https://www.opsec21.com/2020/08/a-failed-risk-managementhtml</link>
      <description>I have created a small  self-explanatory diagram that explains how front-line defences are often  useless while your internal security architecture is not up to the  mark.  </description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;span&gt;&#xD;
          &lt;/span&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/risk.png" target="_top"&gt;&#xD;
    &lt;img src="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/risk.png" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;span&gt;&#xD;
            
                            
          
           
        
        
                          &#xD;
          &lt;/span&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;span&gt;&#xD;
      &lt;span&gt;&#xD;
        &lt;span&gt;&#xD;
          &lt;span&gt;&#xD;
          &lt;/span&gt;&#xD;
        &lt;/span&gt;&#xD;
      &lt;/span&gt;&#xD;
    &lt;/span&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;a href="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/Final%2BVM%2BDiagram.jpg" target="_top"&gt;&#xD;
    &lt;img src="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/Final%2BVM%2BDiagram.jpg" alt="" title=""/&gt;&#xD;
  &lt;/a&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/risk.png" length="7958" type="image/png" />
      <pubDate>Fri, 14 Aug 2020 06:00:00 GMT</pubDate>
      <guid>https://www.opsec21.com/2020/08/a-failed-risk-managementhtml</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/risk.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Spoofed emails and spf records</title>
      <link>https://www.opsec21.com/r/gsuite/comments/i0csd1/spoofed_emails_and_spf_records</link>
      <description>My account has 2 factor authentication, a complex password and I use a Mac and iPhone. I checked to see where I was logged in and it was those two devices. This morning I got a few emails from people Saying they got a Suspicious email me. My spam folder showed 15 messages bounces back that I didn’t send. How was my account hacked? What happened here? There are no outgoing sent messages I don’t recognize. It’s just in the spam folder.    submitted by    /u/doofusmcdoof    to    r/gsuite   [link]   [comments]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    My account has 2 factor authentication, a complex password and I use a Mac and iPhone. I checked to see where I was logged in and it was those two devices. This morning I got a few emails from people Saying they got a Suspicious email me. My spam folder showed 15 messages bounces back that I didn’t send. How was my account hacked? What happened here? There are no outgoing sent messages I don’t recognize. It’s just in the spam folder.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.reddit.com/user/doofusmcdoof"&gt;&#xD;
      
                      
    
  
     /u/doofusmcdoof 
  

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.reddit.com/r/gsuite/"&gt;&#xD;
      
                      
    
  
     r/gsuite 
  

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/114248.jpeg" length="211593" type="image/jpeg" />
      <pubDate>Wed, 05 Aug 2020 01:27:32 GMT</pubDate>
      <guid>https://www.opsec21.com/r/gsuite/comments/i0csd1/spoofed_emails_and_spf_records</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/114248.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>4 hours later I managed to cram all this nicely into a 10” network cabinet</title>
      <link>https://www.opsec21.com/r/homelab/comments/i1vdmb/4_hours_later_i_managed_to_cram_all_this_nicely74d60b4e</link>
      <description>submitted by    /u/quantastical    to    r/homelab   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/yStDiwoiqD54AO2ifjRTZsctzetgSXKvOneXnXLMhjc.jpg" length="5295" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 17:03:05 GMT</pubDate>
      <guid>https://www.opsec21.com/r/homelab/comments/i1vdmb/4_hours_later_i_managed_to_cram_all_this_nicely74d60b4e</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/yStDiwoiqD54AO2ifjRTZsctzetgSXKvOneXnXLMhjc.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Finally spent (too much) time to diagram my home lab/network (credit in comments)</title>
      <link>https://www.opsec21.com/r/homelab/comments/hy1gmw/finally_spent_too_much_time_to_diagram_my_home</link>
      <description>submitted by    /u/rst-2cv    to    r/homelab   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/weQpF2bpYIjAZbYqv-7XZByQC3Wvz0t8MzFBFvJyaN4.jpg" length="4108" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 17:02:56 GMT</pubDate>
      <guid>https://www.opsec21.com/r/homelab/comments/hy1gmw/finally_spent_too_much_time_to_diagram_my_home</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/weQpF2bpYIjAZbYqv-7XZByQC3Wvz0t8MzFBFvJyaN4.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>My small networking cube + stealthy 1U</title>
      <link>https://www.opsec21.com/r/homelab/comments/hzmubh/my_small_networking_cube_stealthy_1u</link>
      <description>submitted by    /u/GalacticArachnids    to    r/homelab   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/jDPgxkamQwg9-QhN8RvRhKv1zXDzRG1V6b1iEQvNvcE.jpg" length="5637" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 17:01:30 GMT</pubDate>
      <guid>https://www.opsec21.com/r/homelab/comments/hzmubh/my_small_networking_cube_stealthy_1u</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/jDPgxkamQwg9-QhN8RvRhKv1zXDzRG1V6b1iEQvNvcE.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>My weekend project! Migrate network to UXGPro</title>
      <link>https://www.opsec21.com/r/homelab/comments/hkd0sl/my_weekend_project_migrate_network_to_uxgpro</link>
      <description>submitted by    /u/HighfeePB    to    r/homelab   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/OHlXoxvrmNFYu0GoTbHnSsQKhv4mQtQb6na8X5YwTEI.jpg" length="3884" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 17:00:45 GMT</pubDate>
      <guid>https://www.opsec21.com/r/homelab/comments/hkd0sl/my_weekend_project_migrate_network_to_uxgpro</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/OHlXoxvrmNFYu0GoTbHnSsQKhv4mQtQb6na8X5YwTEI.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>4 hours later I managed to cram all this nicely into a 10” network cabinet</title>
      <link>https://www.opsec21.com/r/homelab/comments/i1vdmb/4_hours_later_i_managed_to_cram_all_this_nicely</link>
      <description>submitted by    /u/quantastical    to    r/homelab   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/yStDiwoiqD54AO2ifjRTZsctzetgSXKvOneXnXLMhjc.jpg" length="5295" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:57:18 GMT</pubDate>
      <guid>https://www.opsec21.com/r/homelab/comments/i1vdmb/4_hours_later_i_managed_to_cram_all_this_nicely</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/yStDiwoiqD54AO2ifjRTZsctzetgSXKvOneXnXLMhjc.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Cisco Switch Configuration Cheat Sheet by Tamaranth #programming #network #commands #cisco #networking #configuration #ios #switch #security #switches</title>
      <link>https://www.opsec21.com/r/Cheatography/comments/i2w89r/cisco_switch_configuration_cheat_sheet_by</link>
      <description>submitted by    /u/Cheatography    to    r/Cheatography   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/lDs4E-AOYMUsEZBf5vb2yNseVT2iiAjm4PJqbmm_6As.jpg" length="5437" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:57:09 GMT</pubDate>
      <guid>https://www.opsec21.com/r/Cheatography/comments/i2w89r/cisco_switch_configuration_cheat_sheet_by</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/lDs4E-AOYMUsEZBf5vb2yNseVT2iiAjm4PJqbmm_6As.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Sprint and TMobile have merged to bring you the fastest network! Here's my proof as a customer!</title>
      <link>https://www.opsec21.com/r/LateStageCapitalism/comments/i1do07/sprint_and_tmobile_have_merged_to_bring_you_the</link>
      <description>submitted by    /u/peanutbutterspacejam    to    r/LateStageCapitalism   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/d3bn52iTv-5ulygIH7j0hxAe6mFCYSEh_VCYu_Pan3w.jpg" length="4719" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:56:49 GMT</pubDate>
      <guid>https://www.opsec21.com/r/LateStageCapitalism/comments/i1do07/sprint_and_tmobile_have_merged_to_bring_you_the</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/d3bn52iTv-5ulygIH7j0hxAe6mFCYSEh_VCYu_Pan3w.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Sure China owns all the Bitcoin nodes, and only needs 4 to censor the network at will... but BTC isn't centralised</title>
      <link>https://www.opsec21.com/r/btc/comments/i1w1bc/sure_china_owns_all_the_bitcoin_nodes_and_only</link>
      <description>submitted by    /u/optfhpns    to    r/btc   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/dEHA5z9XRFegM22qiaCIRSipPz6oERuHBtJj7DaR8c8.jpg" length="5808" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:56:40 GMT</pubDate>
      <guid>https://www.opsec21.com/r/btc/comments/i1w1bc/sure_china_owns_all_the_bitcoin_nodes_and_only</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/dEHA5z9XRFegM22qiaCIRSipPz6oERuHBtJj7DaR8c8.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Anyone else experiencing AT&amp;T network issues this morning? Only phone calls affected for me</title>
      <link>https://www.opsec21.com/r/sandiego/comments/i0oy1f/anyone_else_experiencing_att_network_issues_this</link>
      <description>submitted by    /u/curtisas    to    r/sandiego   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/YC3cbgbDqg2mOJ2nHwkNAhO3DPSocmUUgj4vILLYhLU.jpg" length="2918" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:56:16 GMT</pubDate>
      <guid>https://www.opsec21.com/r/sandiego/comments/i0oy1f/anyone_else_experiencing_att_network_issues_this</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/YC3cbgbDqg2mOJ2nHwkNAhO3DPSocmUUgj4vILLYhLU.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>I think Google messaging just tried to block my group text about hydroxychloroquine. Can anyone test this on their network with Google messaging.</title>
      <link>https://www.opsec21.com/r/conspiracy/comments/hzt634/i_think_google_messaging_just_tried_to_block_my</link>
      <description>submitted by    /u/PaulMe    to    r/conspiracy   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/i2RwSGYJsJvTt8xPopN_Ny_PpspsJrZ3bj7ngy8Ybqo.jpg" length="4435" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:56:10 GMT</pubDate>
      <guid>https://www.opsec21.com/r/conspiracy/comments/hzt634/i_think_google_messaging_just_tried_to_block_my</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/i2RwSGYJsJvTt8xPopN_Ny_PpspsJrZ3bj7ngy8Ybqo.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Cisco Device Security Cheat Sheet by Tamaranth (3 pages) #programming #network #commands #cisco #networking</title>
      <link>https://www.opsec21.com/r/Cheatography/comments/i0igx9/cisco_device_security_cheat_sheet_by_tamaranth_3</link>
      <description>submitted by    /u/Cheatography    to    r/Cheatography   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/crukvPhkPDkC8b2kQ71t44AkUqv5mxd2SQ-OQD5wBcw.jpg" length="5321" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:55:57 GMT</pubDate>
      <guid>https://www.opsec21.com/r/Cheatography/comments/i0igx9/cisco_device_security_cheat_sheet_by_tamaranth_3</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/crukvPhkPDkC8b2kQ71t44AkUqv5mxd2SQ-OQD5wBcw.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>My network cabinet</title>
      <link>https://www.opsec21.com/r/homeautomation/comments/i11dfo/my_network_cabinet711bc87d</link>
      <description>submitted by    /u/msiekkinen    to    r/homeautomation   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/A9Ji0mOS_7M0bwfLus4QQqkgG-3emOVDn7WCvaq8UZE.jpg" length="7207" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:55:33 GMT</pubDate>
      <guid>https://www.opsec21.com/r/homeautomation/comments/i11dfo/my_network_cabinet711bc87d</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/A9Ji0mOS_7M0bwfLus4QQqkgG-3emOVDn7WCvaq8UZE.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>When reporting jobs on FB, Network Marketing falls under "not a real job"</title>
      <link>https://www.opsec21.com/r/antiMLM/comments/hf3l3k/when_reporting_jobs_on_fb_network_marketing_falls</link>
      <description>submitted by    /u/KneelBeforeC    to    r/antiMLM   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/W9omgLGeg5a0KAnJpDS1F38e0PjTd_iWFFWMCqvfjKo.jpg" length="5199" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:55:29 GMT</pubDate>
      <guid>https://www.opsec21.com/r/antiMLM/comments/hf3l3k/when_reporting_jobs_on_fb_network_marketing_falls</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/W9omgLGeg5a0KAnJpDS1F38e0PjTd_iWFFWMCqvfjKo.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Neural Network algorithm generates human faces based on sketches</title>
      <link>https://www.opsec21.com/r/interestingasfuck/comments/gx466j/neural_network_algorithm_generates_human_faces</link>
      <description>submitted by    /u/NourEhsan    to    r/interestingasfuck   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/n4Y4qKq81UoRoQmy9tyWGfYJIBN-Q8UXKV-aigjTnHo.jpg" length="4094" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:55:20 GMT</pubDate>
      <guid>https://www.opsec21.com/r/interestingasfuck/comments/gx466j/neural_network_algorithm_generates_human_faces</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/n4Y4qKq81UoRoQmy9tyWGfYJIBN-Q8UXKV-aigjTnHo.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>People wanted to know what this cabinet is. Stores all my network stuff and VR/gaming accessories with 3D printed mounts.</title>
      <link>https://www.opsec21.com/r/OculusQuest/comments/hu9e1g/people_wanted_to_know_what_this_cabinet_is_stores</link>
      <description>submitted by    /u/thunderflies    to    r/OculusQuest   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/0TaP6yDJEAdRsGkJDkEc4EhicAbA6actBV3w4aijTug.jpg" length="5787" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:55:15 GMT</pubDate>
      <guid>https://www.opsec21.com/r/OculusQuest/comments/hu9e1g/people_wanted_to_know_what_this_cabinet_is_stores</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/0TaP6yDJEAdRsGkJDkEc4EhicAbA6actBV3w4aijTug.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Finally removed COAX in favor of CAT 5e, also got a new rack and network gear</title>
      <link>https://www.opsec21.com/r/homelab/comments/hhazrc/finally_removed_coax_in_favor_of_cat_5e_also_got</link>
      <description>submitted by    /u/SwabianStargazer    to    r/homelab   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/aVLLvucB0iC0-w3ShrQ3PlTKtAA_fZJvBCYe8HLBpkA.jpg" length="5869" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:54:48 GMT</pubDate>
      <guid>https://www.opsec21.com/r/homelab/comments/hhazrc/finally_removed_coax_in_favor_of_cat_5e_also_got</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/aVLLvucB0iC0-w3ShrQ3PlTKtAA_fZJvBCYe8HLBpkA.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Don't worry about the delays, networking tech isn't a key requirement for an MMO</title>
      <link>https://www.opsec21.com/r/starcitizen_refunds/comments/htz8ok/dont_worry_about_the_delays_networking_tech_isnt</link>
      <description>submitted by    /u/QuaversAndWotsits    to    r/starcitizen_refunds   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/V6wsvEr6_zV_kMIB71JclzO6gxj6lz1WrF_f1nZHUJs.jpg" length="6601" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:54:07 GMT</pubDate>
      <guid>https://www.opsec21.com/r/starcitizen_refunds/comments/htz8ok/dont_worry_about_the_delays_networking_tech_isnt</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/V6wsvEr6_zV_kMIB71JclzO6gxj6lz1WrF_f1nZHUJs.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Hi BAPC, planning a new build, is this good enough to post ignorant shit to reddit and play Minecraft@60fps? : 560xEPYC 7742, 35,840 cores at 2.25GHz/3.4GHz, 280TB DDR4, 15,482,880 CUDA + 967,680 T...</title>
      <link>https://www.opsec21.com/r/Gamingcirclejerk/comments/hu362j/hi_bapc_planning_a_new_build_is_this_good_enough</link>
      <description>submitted by    /u/Lost4468    to    r/Gamingcirclejerk   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/T7_cKcniQDafocdBcW0jxczp0jR_2JpdlQFON1Z4FNo.jpg" length="5023" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:54:04 GMT</pubDate>
      <guid>https://www.opsec21.com/r/Gamingcirclejerk/comments/hu362j/hi_bapc_planning_a_new_build_is_this_good_enough</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/T7_cKcniQDafocdBcW0jxczp0jR_2JpdlQFON1Z4FNo.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Any idea why Apollo is asking for network access?</title>
      <link>https://www.opsec21.com/r/apolloapp/comments/hjp6sf/any_idea_why_apollo_is_asking_for_network_access</link>
      <description>submitted by    /u/shayonpal    to    r/apolloapp   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/l62XNoT1D1ug42TSbd2nZSDHO9mX3BFYCEEZIT6ZCvE.jpg" length="6432" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:53:44 GMT</pubDate>
      <guid>https://www.opsec21.com/r/apolloapp/comments/hjp6sf/any_idea_why_apollo_is_asking_for_network_access</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/l62XNoT1D1ug42TSbd2nZSDHO9mX3BFYCEEZIT6ZCvE.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Cisco Device Configuration Commands (NET-126) Cheat Sheet by Tamaranth (2 pages) #programming #network #commands #intermediate #cisco #networking</title>
      <link>https://www.opsec21.com/r/Cheatography/comments/i03pys/cisco_device_configuration_commands_net126_cheat</link>
      <description>submitted by    /u/Cheatography    to    r/Cheatography   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/cvjKxcXH6OAYwwe8rDx_81V0lNzshFd3bnEJ0LxSGtw.jpg" length="5569" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:53:33 GMT</pubDate>
      <guid>https://www.opsec21.com/r/Cheatography/comments/i03pys/cisco_device_configuration_commands_net126_cheat</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/cvjKxcXH6OAYwwe8rDx_81V0lNzshFd3bnEJ0LxSGtw.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Friendship Annex, also known as FANX, is NSA facility complex established in the 1970s to serve as a cyber espionage station, electronic intelligence processing facility and NSA Broadcast Network t...</title>
      <link>https://www.opsec21.com/r/intelligenceporn/comments/hzw0tb/friendship_annex_also_known_as_fanx_is_nsa</link>
      <description>submitted by    /u/Cultural_Attache    to    r/intelligenceporn   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/8ADO-r4v-ION3qejy6uw08RxU2uUGl3FD9G4AY7wX-U.jpg" length="5335" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:53:22 GMT</pubDate>
      <guid>https://www.opsec21.com/r/intelligenceporn/comments/hzw0tb/friendship_annex_also_known_as_fanx_is_nsa</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/8ADO-r4v-ION3qejy6uw08RxU2uUGl3FD9G4AY7wX-U.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Adding Incident Response Containers To The Cyber Security Tool Belt</title>
      <link>https://www.opsec21.com/executive-decisions/articles/adding-incident-response-containers-to-the-cyber-security-tool-belt</link>
      <description>Ensure that you know the criteria that you are investigating- number of users impacted, regulatory risk to the company, etc. It's only at that point that an enterprise can consider an incident respons...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Ensure that you know the criteria that you are investigating- number of users impacted, regulatory risk to the company, etc. It's only at that point that an enterprise can consider an incident respons...
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/116302.jpeg" length="236550" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:51:45 GMT</pubDate>
      <guid>https://www.opsec21.com/executive-decisions/articles/adding-incident-response-containers-to-the-cyber-security-tool-belt</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/116302.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/116302.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Business Continuity Management For Governance, Risk Management &amp;#38; Compliance</title>
      <link>https://www.opsec21.com/executive-decisions/articles/business-continuity-management-for-governance-risk-management-compliance</link>
      <description>Manage for disruptions big and small, immediate and long-term, obvious and elusive. Most top-level cyber security executives are built with this mindset. But now the need is to directly connect a rele...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Manage for disruptions big and small, immediate and long-term, obvious and elusive. Most top-level cyber security executives are built with this mindset. But now the need is to directly connect a rele...
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/116702.jpeg" length="129489" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:50:41 GMT</pubDate>
      <guid>https://www.opsec21.com/executive-decisions/articles/business-continuity-management-for-governance-risk-management-compliance</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/116702.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/116702.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Common Ports to Remember (credits: packetlife.net)</title>
      <link>https://www.opsec21.com/r/cybersecurity/comments/fufk4x/common_ports_to_remember_credits_packetlifenet</link>
      <description>submitted by    /u/ATTACKERSA    to    r/cybersecurity   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/Y83XEoy0Kfp5_KMptyZdZPXvqtAjaaBO-RKcALowNLk.jpg" length="8541" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:48:33 GMT</pubDate>
      <guid>https://www.opsec21.com/r/cybersecurity/comments/fufk4x/common_ports_to_remember_credits_packetlifenet</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/Y83XEoy0Kfp5_KMptyZdZPXvqtAjaaBO-RKcALowNLk.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Hotels at RSA are entering people's rooms to leave spam flyers on beds</title>
      <link>https://www.opsec21.com/r/cybersecurity/comments/f9jir8/hotels_at_rsa_are_entering_peoples_rooms_to_leave</link>
      <description>submitted by    /u/TalTallon    to    r/cybersecurity   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/beWKfXI_mewzJcNG2-2OwQVXBCfJewWMpdUvmIsAwFk.jpg" length="5756" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:48:20 GMT</pubDate>
      <guid>https://www.opsec21.com/r/cybersecurity/comments/f9jir8/hotels_at_rsa_are_entering_peoples_rooms_to_leave</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/beWKfXI_mewzJcNG2-2OwQVXBCfJewWMpdUvmIsAwFk.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Google Hangouts Interview Scam</title>
      <link>https://www.opsec21.com/r/cybersecurity/comments/elysv5/google_hangouts_interview_scam</link>
      <description>submitted by    /u/Chrs987    to    r/cybersecurity   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/RAVEzggjMZA9nHItSAiSpj3QRHXQAKtwMRAaheBEIcw.jpg" length="9501" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:48:12 GMT</pubDate>
      <guid>https://www.opsec21.com/r/cybersecurity/comments/elysv5/google_hangouts_interview_scam</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/RAVEzggjMZA9nHItSAiSpj3QRHXQAKtwMRAaheBEIcw.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>New anti - virus !</title>
      <link>https://www.opsec21.com/r/cybersecurity/comments/ex9q31/new_anti_virus</link>
      <description>submitted by    /u/cypersecurity    to    r/cybersecurity   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/LSc3PBttfNbu6FLhDbEO4187mj9fnDK2IMShOVb7I_g.jpg" length="7288" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:47:59 GMT</pubDate>
      <guid>https://www.opsec21.com/r/cybersecurity/comments/ex9q31/new_anti_virus</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/LSc3PBttfNbu6FLhDbEO4187mj9fnDK2IMShOVb7I_g.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Crunch time (MS Cybersecurity and Information Assurance)</title>
      <link>https://www.opsec21.com/r/WGU/comments/e07o90/crunch_time_ms_cybersecurity_and_information</link>
      <description>submitted by    /u/Bluentes69    to    r/WGU   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/qthfP96AfG-zTCoBGzGKmAuNmDO_MuWKt0FRAVI96EI.jpg" length="1495" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:47:37 GMT</pubDate>
      <guid>https://www.opsec21.com/r/WGU/comments/e07o90/crunch_time_ms_cybersecurity_and_information</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/qthfP96AfG-zTCoBGzGKmAuNmDO_MuWKt0FRAVI96EI.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>What my private information was worth in the Experian Data Breach</title>
      <link>https://www.opsec21.com/r/cybersecurity/comments/e07jg7/what_my_private_information_was_worth_in_the</link>
      <description>submitted by    /u/TargusTardus    to    r/cybersecurity   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/z4t9riTYfBOH0R0kHm9J0EDIP0GQrZnFXZnJOUPbVnA.jpg" length="4094" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:47:08 GMT</pubDate>
      <guid>https://www.opsec21.com/r/cybersecurity/comments/e07jg7/what_my_private_information_was_worth_in_the</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/z4t9riTYfBOH0R0kHm9J0EDIP0GQrZnFXZnJOUPbVnA.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Cybersecurity guru</title>
      <link>https://www.opsec21.com/r/PoliticalHumor/comments/dpu2py/cybersecurity_guru</link>
      <description>submitted by    /u/Brief_Good    to    r/PoliticalHumor   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/hzzfOqvp56tl08LrqMfOEnL-xLJEbwllI61oQTjWhPA.jpg" length="6164" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:46:53 GMT</pubDate>
      <guid>https://www.opsec21.com/r/PoliticalHumor/comments/dpu2py/cybersecurity_guru</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/hzzfOqvp56tl08LrqMfOEnL-xLJEbwllI61oQTjWhPA.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>"Your computer will be faster and more reliable"</title>
      <link>https://www.opsec21.com/r/hardwaregore/comments/i38nyj/your_computer_will_be_faster_and_more_reliable</link>
      <description>submitted by    /u/JustARegulaNerd    to    r/hardwaregore   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/_RLckXUbpU8UHalH2kS5OwqSEsktRy1Ooz9OE0zxUp0.jpg" length="3300" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:41:16 GMT</pubDate>
      <guid>https://www.opsec21.com/r/hardwaregore/comments/i38nyj/your_computer_will_be_faster_and_more_reliable</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/_RLckXUbpU8UHalH2kS5OwqSEsktRy1Ooz9OE0zxUp0.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Smithers' "Mr. Burns computer boot screen" [1080x1920]</title>
      <link>https://www.opsec21.com/r/SimpsonsWallpaper/comments/i2x4lg/smithers_mr_burns_computer_boot_screen_1080x1920</link>
      <description>submitted by    /u/-MyNameIsBort-    to    r/SimpsonsWallpaper   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/yTih_Z7EiuDW8OEzxeVeYIGa7b--4TYNMyNfvC-trSQ.jpg" length="2364" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:41:05 GMT</pubDate>
      <guid>https://www.opsec21.com/r/SimpsonsWallpaper/comments/i2x4lg/smithers_mr_burns_computer_boot_screen_1080x1920</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/yTih_Z7EiuDW8OEzxeVeYIGa7b--4TYNMyNfvC-trSQ.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>DIY: i've built myself a new computer desk ( bonus cat in the pictures )</title>
      <link>https://www.opsec21.com/r/DIY/comments/i2dekh/diy_ive_built_myself_a_new_computer_desk_bonus</link>
      <description>submitted by    /u/0fiuco    to    r/DIY   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/GI4djbFVuGiNh4QoIUFJGzB8-z-GiZUwjphTCzXZioA.jpg" length="6424" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:40:48 GMT</pubDate>
      <guid>https://www.opsec21.com/r/DIY/comments/i2dekh/diy_ive_built_myself_a_new_computer_desk_bonus</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/GI4djbFVuGiNh4QoIUFJGzB8-z-GiZUwjphTCzXZioA.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Are circuit boards worth scrapping? I found an old computer monitor today. Any of this worth anything?</title>
      <link>https://www.opsec21.com/r/ScrapMetal/comments/i26d00/are_circuit_boards_worth_scrapping_i_found_an_old</link>
      <description>submitted by    /u/CallMeWolfYouTuber    to    r/ScrapMetal   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/z6MznkGQYrHmwoJqyZ2Z_0TCMFzWdItVc0cj_FN1gZQ.jpg" length="6782" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:40:33 GMT</pubDate>
      <guid>https://www.opsec21.com/r/ScrapMetal/comments/i26d00/are_circuit_boards_worth_scrapping_i_found_an_old</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/z6MznkGQYrHmwoJqyZ2Z_0TCMFzWdItVc0cj_FN1gZQ.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Reminder to dust your computer regularly :)</title>
      <link>https://www.opsec21.com/r/battlestations/comments/i18j7e/reminder_to_dust_your_computer_regularly</link>
      <description>submitted by    /u/Ofsy    to    r/battlestations   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/IYa8IWdQ-HK-VO4MWe2xg5oAispZjJjOfX50hnnUNDg.jpg" length="4851" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 16:40:11 GMT</pubDate>
      <guid>https://www.opsec21.com/r/battlestations/comments/i18j7e/reminder_to_dust_your_computer_regularly</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/IYa8IWdQ-HK-VO4MWe2xg5oAispZjJjOfX50hnnUNDg.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>My computers not working, I think I bricked it.</title>
      <link>https://www.opsec21.com/r/boottoobig/comments/hdqyr3/my_computers_not_working_i_think_i_bricked_it</link>
      <description>submitted by    /u/DjGoreface    to    r/boottoobig   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/0-j95RQvGZr7O0J74lEHDmKZ_6Nprva2JieAUcqxI4U.jpg" length="7373" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:33:23 GMT</pubDate>
      <guid>https://www.opsec21.com/r/boottoobig/comments/hdqyr3/my_computers_not_working_i_think_i_bricked_it</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/0-j95RQvGZr7O0J74lEHDmKZ_6Nprva2JieAUcqxI4U.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>DIY: i've built myself a new computer desk ( bonus cat in the pictures )</title>
      <link>https://www.opsec21.com/r/DIY/comments/i2dekh/diy_ive_built_myself_a_new_computer_desk_bonusd2465c10</link>
      <description>submitted by    /u/0fiuco    to    r/DIY   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/GI4djbFVuGiNh4QoIUFJGzB8-z-GiZUwjphTCzXZioA.jpg" length="6424" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:33:04 GMT</pubDate>
      <guid>https://www.opsec21.com/r/DIY/comments/i2dekh/diy_ive_built_myself_a_new_computer_desk_bonusd2465c10</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/GI4djbFVuGiNh4QoIUFJGzB8-z-GiZUwjphTCzXZioA.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>User calls about disc being stuck in another computer, mentions off hand about this laptop. They had been using and charging it like this for weeks...</title>
      <link>https://www.opsec21.com/r/techsupportgore/comments/hede5r/user_calls_about_disc_being_stuck_in_another</link>
      <description>submitted by    /u/Aderplaide    to    r/techsupportgore   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/mQH7e0qNv5dEXQv2TFVK9TEiqZCAi33bOi88QKmRXyk.jpg" length="6723" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:32:47 GMT</pubDate>
      <guid>https://www.opsec21.com/r/techsupportgore/comments/hede5r/user_calls_about_disc_being_stuck_in_another</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/mQH7e0qNv5dEXQv2TFVK9TEiqZCAi33bOi88QKmRXyk.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Had a corrupt OS image on one computer and no extra SATA cables on the clients custom built new computer. Powered the SSD with one computer and plugged it in to the second to transfer the data. Hon...</title>
      <link>https://www.opsec21.com/r/techsupportmacgyver/comments/hsomtg/had_a_corrupt_os_image_on_one_computer_and_no</link>
      <description>submitted by    /u/Vrael22    to    r/techsupportmacgyver   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/jfkDIxvIfixc_vHHB4AaHRaupO_tahDtRrXml5UvHaU.jpg" length="8067" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:32:35 GMT</pubDate>
      <guid>https://www.opsec21.com/r/techsupportmacgyver/comments/hsomtg/had_a_corrupt_os_image_on_one_computer_and_no</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/jfkDIxvIfixc_vHHB4AaHRaupO_tahDtRrXml5UvHaU.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>password too secure</title>
      <link>https://www.opsec21.com/r/cybersecurity/comments/e2lr0c/password_too_secure</link>
      <description>submitted by    /u/insakna    to    r/cybersecurity   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/REeXZLZHWPDthuCTkO88pnRSyOAFtwiEDu0IxWRb8VA.jpg" length="2954" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:29:04 GMT</pubDate>
      <guid>https://www.opsec21.com/r/cybersecurity/comments/e2lr0c/password_too_secure</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/REeXZLZHWPDthuCTkO88pnRSyOAFtwiEDu0IxWRb8VA.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>The hat colors !</title>
      <link>https://www.opsec21.com/r/cybersecurity/comments/dv6eqi/the_hat_colors</link>
      <description>submitted by    /u/cypersecurity    to    r/cybersecurity   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/3C1hhuQd-XJtAWp3AalPU8IjelBkb0wC0YeeQqRg6-0.jpg" length="5457" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:28:35 GMT</pubDate>
      <guid>https://www.opsec21.com/r/cybersecurity/comments/dv6eqi/the_hat_colors</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/3C1hhuQd-XJtAWp3AalPU8IjelBkb0wC0YeeQqRg6-0.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Guys, is anyone interested for Cybersecurity and Big Data courses in Kathmandu? &#x1f602;</title>
      <link>https://www.opsec21.com/r/Nepal/comments/haom7g/guys_is_anyone_interested_for_cybersecurity_anddb180b9f</link>
      <description>submitted by    /u/the_legend_01    to    r/Nepal   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/A2YJdQZI3_WNoW7KSFbEqovRG-AWSpsAvMRcczoCvMY.jpg" length="7728" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:28:09 GMT</pubDate>
      <guid>https://www.opsec21.com/r/Nepal/comments/haom7g/guys_is_anyone_interested_for_cybersecurity_anddb180b9f</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/A2YJdQZI3_WNoW7KSFbEqovRG-AWSpsAvMRcczoCvMY.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Essential worker going back to school to become higher paid essential worker. Cybersecurity major.</title>
      <link>https://www.opsec21.com/r/EDC/comments/heb1wj/essential_worker_going_back_to_school_to_become465b69e8</link>
      <description>submitted by    /u/n0th1ng_r3al    to    r/EDC   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/zq02iyRm-vWKhBM8nR15fV1dyQonzWPk6iKhd-1u_jk.jpg" length="5025" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:27:55 GMT</pubDate>
      <guid>https://www.opsec21.com/r/EDC/comments/heb1wj/essential_worker_going_back_to_school_to_become465b69e8</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/zq02iyRm-vWKhBM8nR15fV1dyQonzWPk6iKhd-1u_jk.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Internship - Industry Expectations</title>
      <link>https://www.opsec21.com/r/cybersecurity/comments/how4hn/internship_industry_expectations36642cf7</link>
      <description>submitted by    /u/deadbroccoli    to    r/cybersecurity   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/9xH29f8nG3fmDTQFMR9W_0Az0c995DZ-d_I2CGhbfVs.jpg" length="4551" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:25:05 GMT</pubDate>
      <guid>https://www.opsec21.com/r/cybersecurity/comments/how4hn/internship_industry_expectations36642cf7</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/9xH29f8nG3fmDTQFMR9W_0Az0c995DZ-d_I2CGhbfVs.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>"Cybersecurity reporter" Eric Geller at Politico tries to debunk latest news showing DNC was a leak not a hack- Putin apparently has a secret, super fast internet connection flowing straight into t...</title>
      <link>https://www.opsec21.com/r/WikiLeaks/comments/6todv9/cybersecurity_reporter_eric_geller_at_politico</link>
      <description>submitted by    /u/NathanOhio    to    r/WikiLeaks   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/r1G6pljtXhwa9-m1lXJQo9RErI-e66LyGNDKqwWI8jo.jpg" length="3368" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:25:00 GMT</pubDate>
      <guid>https://www.opsec21.com/r/WikiLeaks/comments/6todv9/cybersecurity_reporter_eric_geller_at_politico</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/r1G6pljtXhwa9-m1lXJQo9RErI-e66LyGNDKqwWI8jo.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>[Australian Police PSA] Cybersecurity Expert vs Cybercriminal</title>
      <link>https://www.opsec21.com/r/itsaunixsystem/comments/5ja2w7/australian_police_psa_cybersecurity_expert_vs</link>
      <description>submitted by    /u/TehVulpez    to    r/itsaunixsystem   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/ffJ0VZvyyHQ0G-3cJFZRA5Pm0ikXDGsSntenSm01QgM.jpg" length="8050" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:24:32 GMT</pubDate>
      <guid>https://www.opsec21.com/r/itsaunixsystem/comments/5ja2w7/australian_police_psa_cybersecurity_expert_vs</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/ffJ0VZvyyHQ0G-3cJFZRA5Pm0ikXDGsSntenSm01QgM.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>The Japanese cybersecurity minister has the right idea</title>
      <link>https://www.opsec21.com/r/AdviceAnimals/comments/9xcsjp/the_japanese_cybersecurity_minister_has_the_right</link>
      <description>submitted by    /u/SciFiXhi    to    r/AdviceAnimals   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/qiu6YUJxxHoFGs-UT82JkM9Q-cek_TOQ6hU7o0McQY0.jpg" length="4570" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:24:09 GMT</pubDate>
      <guid>https://www.opsec21.com/r/AdviceAnimals/comments/9xcsjp/the_japanese_cybersecurity_minister_has_the_right</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/qiu6YUJxxHoFGs-UT82JkM9Q-cek_TOQ6hU7o0McQY0.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Common Ports to Remember (credits: packetlife.net)</title>
      <link>https://www.opsec21.com/r/cybersecurity/comments/fufk4x/common_ports_to_remember_credits_packetlifenetfe1a1554</link>
      <description>submitted by    /u/ATTACKERSA    to    r/cybersecurity   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/Y83XEoy0Kfp5_KMptyZdZPXvqtAjaaBO-RKcALowNLk.jpg" length="8541" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:23:55 GMT</pubDate>
      <guid>https://www.opsec21.com/r/cybersecurity/comments/fufk4x/common_ports_to_remember_credits_packetlifenetfe1a1554</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/Y83XEoy0Kfp5_KMptyZdZPXvqtAjaaBO-RKcALowNLk.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Are cybersecurity memes a safe bet?</title>
      <link>https://www.opsec21.com/r/MemeEconomy/comments/69jkij/are_cybersecurity_memes_a_safe_bet</link>
      <description>submitted by    /u/ctwtn    to    r/MemeEconomy   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/_g6yatj2rINoVcQ6G25XosllahKYJoHrhJM1zXrmH2I.jpg" length="4031" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:18:07 GMT</pubDate>
      <guid>https://www.opsec21.com/r/MemeEconomy/comments/69jkij/are_cybersecurity_memes_a_safe_bet</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/_g6yatj2rINoVcQ6G25XosllahKYJoHrhJM1zXrmH2I.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Lenovo Yoga Vs Acer Nitro ?</title>
      <link>https://www.opsec21.com/r/SuggestALaptop/comments/i0bdtg/lenovo_yoga_vs_acer_nitro</link>
      <description>Hello fellow Redditors! So few days ago ... I posted a question about a Laptop suggestion for my CS undergrad ( Network Security major) starting soon as a freshman. Now, I'm very much aware of the fact that studying Cybersecurity will take time ( at least 2 years constant studies for even Starting brute force stuff - correct me if I'm wrong) with a clear mindset of gaining experience from   Tech support job to  Sys/Netw.Admin to  Finally SOC and ahead.  The reason to mention the Experience gaining stuff above was to highlight that I'm no expert . Just gonna start IT from scratch towards Cybersec. Now, Based on some suggestions , I've shortlisted two Laptops : 1) Lenovo Yoga C740 2-in-1 15.6" Touch-Screen Laptop - 10th Gen. Intel Core i5 ( i5-10210U ) - 12GB Memory (Soldered) - 256GB Solid State Drive  2) Acer Nitro 5 With * AMD 3rd Gen Ryzen 5 (4600H) or * 10th Gen. Intel Core i5 ( i5-10300H) - 8GB Memory ( upgradable upto 32 GB) - NVIDIA GeForce GTX 1650 - 256GB SSD - Obsidian Black -  Which laptop should I go for?  I'll be grateful for your help ! Thanks!    submitted by    /u/FatnFlat0313    to    r/SuggestALaptop   [link]   [comments]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Hello fellow Redditors!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    So few days ago ... I posted a question about a Laptop suggestion for my CS undergrad ( Network Security major) starting soon as a freshman.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Now, I'm very much aware of the fact that studying Cybersecurity will take time ( at least 2 years constant studies for even Starting brute force stuff - correct me if I'm wrong) with a clear mindset of gaining experience from
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    The reason to mention the Experience gaining stuff above was to highlight that I'm no expert . Just gonna start IT from scratch towards Cybersec.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Now, Based on some suggestions , I've shortlisted two Laptops :
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    1) Lenovo Yoga C740 2-in-1 15.6" Touch-Screen Laptop - 10th Gen. Intel Core i5 ( i5-10210U ) - 12GB Memory (Soldered) - 256GB Solid State Drive
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    2) Acer Nitro 5 With * AMD 3rd Gen Ryzen 5 (4600H) or * 10th Gen. Intel Core i5 ( i5-10300H) -
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    8GB Memory ( upgradable upto 32 GB) - NVIDIA GeForce GTX 1650 - 256GB SSD - Obsidian Black -
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Which laptop should I go for?
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    I'll be grateful for your help ! Thanks!
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.reddit.com/user/FatnFlat0313"&gt;&#xD;
      
                      
    
  
     /u/FatnFlat0313 
  

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.reddit.com/r/SuggestALaptop/"&gt;&#xD;
      
                      
    
  
     r/SuggestALaptop 
  

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/124833.jpeg" length="196458" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 01:09:15 GMT</pubDate>
      <guid>https://www.opsec21.com/r/SuggestALaptop/comments/i0bdtg/lenovo_yoga_vs_acer_nitro</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/124833.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Critical SAP Recon Vulnerability Affecting Over 40,000 Customers #sap #sapnetweaver #hacker #hacking #cybersecurity #hackers #linux #ethicalhacking #programming #security #mrhacker</title>
      <link>https://www.opsec21.com/r/u_mrhackerco/comments/i37r6a/critical_sap_recon_vulnerability_affecting_over</link>
      <description>submitted by    /u/mrhackerco    to    u/mrhackerco   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/XtTx_cMq4jcRmh7bBNquNDwSu_6hIojZeCQOpBB_Mlc.jpg" length="3605" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 00:06:13 GMT</pubDate>
      <guid>https://www.opsec21.com/r/u_mrhackerco/comments/i37r6a/critical_sap_recon_vulnerability_affecting_over</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/XtTx_cMq4jcRmh7bBNquNDwSu_6hIojZeCQOpBB_Mlc.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Hackers Massively Scanning for SAP Recon Vulnerability #sap #sapvulnerability #hacker #hacking #cybersecurity #hackers #linux #ethicalhacking #programming #security #mrhacker</title>
      <link>https://www.opsec21.com/r/u_mrhackerco/comments/i37qof/hackers_massively_scanning_for_sap_recon</link>
      <description>submitted by    /u/mrhackerco    to    u/mrhackerco   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/1kshPyxXRYPACMNYzpyZeiwerXIbspzK0qGmn38EsxM.jpg" length="3751" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 00:06:06 GMT</pubDate>
      <guid>https://www.opsec21.com/r/u_mrhackerco/comments/i37qof/hackers_massively_scanning_for_sap_recon</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/1kshPyxXRYPACMNYzpyZeiwerXIbspzK0qGmn38EsxM.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Popular Home Routers Affected With Multiple Critical Security Flaws #routers #vulnerability #hacker #hacking #cybersecurity #hackers #linux #ethicalhacking #programming #security #mrhacker</title>
      <link>https://www.opsec21.com/r/u_mrhackerco/comments/i37rc3/popular_home_routers_affected_with_multiple</link>
      <description>submitted by    /u/mrhackerco    to    u/mrhackerco   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/73Fxbh04NwhQESwDtcMxl2Y8X9AKENxvpli59s8hYx4.jpg" length="3055" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 00:06:01 GMT</pubDate>
      <guid>https://www.opsec21.com/r/u_mrhackerco/comments/i37rc3/popular_home_routers_affected_with_multiple</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/73Fxbh04NwhQESwDtcMxl2Y8X9AKENxvpli59s8hYx4.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Critical Cisco Security Flaws Allow Complete Router Firewall Takeover #ciscopatch #ciscosecurityupdates #hacker #hacking #cybersecurity #hackers #linux #ethicalhacking #programming #security #mrhacker</title>
      <link>https://www.opsec21.com/r/u_mrhackerco/comments/i37r06/critical_cisco_security_flaws_allow_complete</link>
      <description>submitted by    /u/mrhackerco    to    u/mrhackerco   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/enmBlbdRvz6FqfPciVXBijeoc9H96_TFZxjCQSKmIC0.jpg" length="4148" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 00:05:52 GMT</pubDate>
      <guid>https://www.opsec21.com/r/u_mrhackerco/comments/i37r06/critical_cisco_security_flaws_allow_complete</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/enmBlbdRvz6FqfPciVXBijeoc9H96_TFZxjCQSKmIC0.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Automated Web Application Security Tool “Acunetix ” Now Available on macOS &amp; All Major OS #hacker #hacking #cybersecurity #hackers #linux #ethicalhacking #programming #security #mrhacker</title>
      <link>https://www.opsec21.com/r/u_mrhackerco/comments/i37qvj/automated_web_application_security_tool_acunetix</link>
      <description>submitted by    /u/mrhackerco    to    u/mrhackerco   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/taPrZN85eX4whOc-HUed53g0hbwB7_N_PwEq1_HrIt4.jpg" length="3533" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 00:05:46 GMT</pubDate>
      <guid>https://www.opsec21.com/r/u_mrhackerco/comments/i37qvj/automated_web_application_security_tool_acunetix</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/taPrZN85eX4whOc-HUed53g0hbwB7_N_PwEq1_HrIt4.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Vulnerability Summary for the Week of July 27, 2020</title>
      <link>https://www.opsec21.com/r/cybersecurity/comments/i386nn/vulnerability_summary_for_the_week_of_july_27_2020</link>
      <description>submitted by    /u/antdude    to    r/cybersecurity   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/ye9azyN4gqTw8UwiY4v7FR80ijRDClpVdYHVF5yXhGQ.jpg" length="3519" type="image/jpeg" />
      <pubDate>Tue, 04 Aug 2020 00:05:31 GMT</pubDate>
      <guid>https://www.opsec21.com/r/cybersecurity/comments/i386nn/vulnerability_summary_for_the_week_of_july_27_2020</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/ye9azyN4gqTw8UwiY4v7FR80ijRDClpVdYHVF5yXhGQ.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Russian Crypto Scams Triple in First Half of 2020</title>
      <link>https://www.opsec21.com/r/fuzzyone/comments/i0cu7a/russian_crypto_scams_triple_in_first_half_of_2020</link>
      <description>Cybersecurity firms have identified an exponential rise in crypto-related scams in Russia during the first half of 2020. Researchers identified 23,000 sites involved with crypto scams that are still online and targeting new victims. According to Kommersant, which cited research from Kaspersky Labs, the problem is three times greater than during the same period last [&amp;hellip;]    submitted by    /u/FuzzyOneAdmin    to    r/fuzzyone   [link]   [comments]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Cybersecurity firms have identified an exponential rise in crypto-related scams in Russia during the first half of 2020. Researchers identified 23,000 sites involved with crypto scams that are still online and targeting new victims. According to Kommersant, which cited research from Kaspersky Labs, the problem is three times greater than during the same period last […]
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.reddit.com/user/FuzzyOneAdmin"&gt;&#xD;
      
                      
    
  
     /u/FuzzyOneAdmin 
  

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.reddit.com/r/fuzzyone/"&gt;&#xD;
      
                      
    
  
     r/fuzzyone 
  

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/118129.jpeg" length="315951" type="image/jpeg" />
      <pubDate>Thu, 30 Jul 2020 01:35:52 GMT</pubDate>
      <guid>https://www.opsec21.com/r/fuzzyone/comments/i0cu7a/russian_crypto_scams_triple_in_first_half_of_2020</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/118129.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/118129.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How To Protect Your Privacy in 2020 | Essential Privacy Tools</title>
      <link>https://www.opsec21.com/r/cybersecurity/comments/i0cadj/how_to_protect_your_privacy_in_2020_essential</link>
      <description>submitted by    /u/myghostpeek    to    r/cybersecurity   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/X972sLWScpDyEKBDTTMGkGpu37RIkfsX0GgNnzM9tII.jpg" length="5147" type="image/jpeg" />
      <pubDate>Thu, 30 Jul 2020 01:34:41 GMT</pubDate>
      <guid>https://www.opsec21.com/r/cybersecurity/comments/i0cadj/how_to_protect_your_privacy_in_2020_essential</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/X972sLWScpDyEKBDTTMGkGpu37RIkfsX0GgNnzM9tII.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Provisional CISSP pass! 7/29/2020</title>
      <link>https://www.opsec21.com/r/cissp/comments/i08jaq/provisional_cissp_pass_7292020</link>
      <description>Provisionally passed today at the 150 questions mark taking the full 3 hours. Reading everyone's reports about the congratulations screen at 100 questions got my hopes up. When my exam didn't end at 100, my heart just sank. I managed to recollect mentally and hunker down for the remaining 50 questions but man did my mind waver. If there's any advice I have to give: hide the question number counter. It doesn't do you any favors to be constantly reminded of where you're at. I studied for roughly a year using just the Sybex CISSP textbook and Wiley MCQ database. Wiley is showing that I slammed exactly 60 hours of MCQs. For those of us who tend to commit terms to muscle memory, it's not that useful. I didn't receive a single definition or technical question. Everything was process oriented. If you understand the material, and more importantly, can decipher the true meaning of a question, that's half the fight.  My history: I grauted Dec 2016 with a Bachelors in Accounting. I got my start with an IT audit function at a Big 4 firm and obtained my CISA in 2018. I subsequently transferred out to industry Internal Audit later on. All of my cybersecurity knowledge is theoretical, with no practical application. If a guy like me who ticks boxes and draws circles on screenshots can pass the CISSP, you can too.    submitted by    /u/hiddenpowerlevel    to    r/cissp   [link]   [comments]</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Provisionally passed today at the 150 questions mark taking the full 3 hours. Reading everyone's reports about the congratulations screen at 100 questions got my hopes up. When my exam didn't end at 100, my heart just sank. I managed to recollect mentally and hunker down for the remaining 50 questions but man did my mind waver. If there's any advice I have to give: hide the question number counter. It doesn't do you any favors to be constantly reminded of where you're at.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    I studied for roughly a year using just the Sybex CISSP textbook and Wiley MCQ database. Wiley is showing that I slammed exactly 60 hours of MCQs. For those of us who tend to commit terms to muscle memory, it's not that useful. I didn't receive a single definition or technical question. Everything was process oriented. If you understand the material, and more importantly, can decipher the true meaning of a question, that's half the fight.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    My history: I grauted Dec 2016 with a Bachelors in Accounting. I got my start with an IT audit function at a Big 4 firm and obtained my CISA in 2018. I subsequently transferred out to industry Internal Audit later on. All of my cybersecurity knowledge is theoretical, with no practical application. If a guy like me who ticks boxes and draws circles on screenshots can pass the CISSP, you can too.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.reddit.com/user/hiddenpowerlevel"&gt;&#xD;
      
                      
    
  
     /u/hiddenpowerlevel 
  

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    &lt;a href="https://www.reddit.com/r/cissp/"&gt;&#xD;
      
                      
    
  
     r/cissp 
  

  
                    &#xD;
    &lt;/a&gt;&#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/124650.jpeg" length="206950" type="image/jpeg" />
      <pubDate>Thu, 30 Jul 2020 01:33:36 GMT</pubDate>
      <guid>https://www.opsec21.com/r/cissp/comments/i08jaq/provisional_cissp_pass_7292020</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/124650.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/124650.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>How Russians hack your Steam Account and steal your Rocket League content</title>
      <link>https://www.opsec21.com/r/RocketLeague/comments/i0cxas/how_russians_hack_your_steam_account_and_steal</link>
      <description>submitted by    /u/jinxvrsa    to    r/RocketLeague   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/-a4LyGQuLQiEfpXR3l-ztnw-enlicqqytr642JwjDDM.jpg" length="6745" type="image/jpeg" />
      <pubDate>Thu, 30 Jul 2020 01:26:22 GMT</pubDate>
      <guid>https://www.opsec21.com/r/RocketLeague/comments/i0cxas/how_russians_hack_your_steam_account_and_steal</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/-a4LyGQuLQiEfpXR3l-ztnw-enlicqqytr642JwjDDM.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>@WSJ: A China-backed group hacked into Vatican computers on the eve of important negotiations with Beijing, according to a U.S. cybersecurity firm https://t.co/CGfikfwAFN</title>
      <link>https://www.opsec21.com/r/newsbotbot/comments/i09flu/wsj_a_chinabacked_group_hacked_into_vatican</link>
      <description>submitted by    /u/-en-    to    r/newsbotbot   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/ZBJ7SPoJNK1DlPk1qrVoeYDdUYT1G0sq8BfFrTFgXYQ.jpg" length="3019" type="image/jpeg" />
      <pubDate>Thu, 30 Jul 2020 01:20:59 GMT</pubDate>
      <guid>https://www.opsec21.com/r/newsbotbot/comments/i09flu/wsj_a_chinabacked_group_hacked_into_vatican</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/ZBJ7SPoJNK1DlPk1qrVoeYDdUYT1G0sq8BfFrTFgXYQ.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>What is an Endpoint Protection Platform</title>
      <link>https://www.opsec21.com/r/Action1/comments/i08u0m/what_is_an_endpoint_protection_platform</link>
      <description>What is an Endpoint Protection Platform  https://www.action1.com/blog/2020/06/what-is-an-endpoint-protection-platform/  #EndpointProtection #endpointsecurity #Cybersecurity #AI #machinelearning #Windows10 #automation #endpoints  ​ https://preview.redd.it/sj7mgekh3vd51.jpg?width=1300&amp;format=pjpg&amp;auto=webp&amp;s=39af05c4b9faf5504c8cd8c3ff4dd575ad5609b4    submitted by    /u/MauriceTorres    to    r/Action1   [link]   [comments]</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/4g6TwAzrVYa8gDI5PljUghie24as--XCiDbMJ3ZfCVw.jpg" length="1097" type="image/jpeg" />
      <pubDate>Thu, 30 Jul 2020 01:20:51 GMT</pubDate>
      <guid>https://www.opsec21.com/r/Action1/comments/i08u0m/what_is_an_endpoint_protection_platform</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/4g6TwAzrVYa8gDI5PljUghie24as--XCiDbMJ3ZfCVw.jpg">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Understand The Data</title>
      <link>https://www.opsec21.com/attacks/articles/understand-the-data</link>
      <description>Understand the data, what you have, where it is, how it’s exposed, how it’s being used, how it’s accessed- when you start from the inside out you have a much better picture of what’s going on and a mu...</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Understand the data, what you have, where it is, how it’s exposed, how it’s being used, how it’s accessed- when you start from the inside out you have a much better picture of what’s going on and a mu...
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/117173.jpeg" length="359488" type="image/jpeg" />
      <pubDate>Thu, 23 Jul 2020 23:20:04 GMT</pubDate>
      <guid>https://www.opsec21.com/attacks/articles/understand-the-data</guid>
      <g-custom:tags type="string">data,big data</g-custom:tags>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/117173.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/117173.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Adopting a Zero Trust Security Model [WATCH On Demand]</title>
      <link>https://www.opsec21.com/executive-decisions/articles/adopting-a-zero-trust-security-model</link>
      <description>View the Sami Laine, Director of Technology Strategy, Okta CSHub APAC Summit on-demand session now.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    View the Sami Laine, Director of Technology Strategy, Okta CSHub APAC Summit on-demand session now.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/114277.jpeg" length="235577" type="image/jpeg" />
      <pubDate>Fri, 17 Jul 2020 00:47:07 GMT</pubDate>
      <guid>https://www.opsec21.com/executive-decisions/articles/adopting-a-zero-trust-security-model</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/114277.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/114277.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Incident Of The Week: Alabama Hit By 2nd Ransomware Attack In As Many Months</title>
      <link>https://www.opsec21.com/attacks/articles/incident-of-the-week-alabama-hit-by-2nd-ransomware-attack-in-as-many-months</link>
      <description>ransomware and walware are running rampant. what can you do to protect yourself?</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
          Alabama’s Chilton County employees notified the local IT team that their computers were running sluggish and some of the applications looked different. In an effort to shut down a suspected ransomware...
         &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/114409.jpeg" length="164283" type="image/jpeg" />
      <pubDate>Thu, 09 Jul 2020 23:18:13 GMT</pubDate>
      <guid>https://www.opsec21.com/attacks/articles/incident-of-the-week-alabama-hit-by-2nd-ransomware-attack-in-as-many-months</guid>
      <g-custom:tags type="string">Incident of the week,Malware,Ransomware</g-custom:tags>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/114409.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/114409.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Real-Time Top-Level Cyber Security Insight On Demand Now</title>
      <link>https://www.opsec21.com/executive-decisions/articles/real-time-top-level-cyber-security-insight-on-demand-now</link>
      <description>Zero Trust, Cyber AI, DevSecOps, Cloud Security &amp; CASB, GRC and evolving CISO role were topics of enlightenment at the CSHub APAC Summit. View all sessions on demand now.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    Zero Trust, Cyber AI, DevSecOps, Cloud Security &amp;amp; CASB, GRC and evolving CISO role were topics of enlightenment at the CSHub APAC Summit. View all sessions on demand now.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/116347.jpeg" length="311845" type="image/jpeg" />
      <pubDate>Fri, 03 Jul 2020 00:48:18 GMT</pubDate>
      <guid>https://www.opsec21.com/executive-decisions/articles/real-time-top-level-cyber-security-insight-on-demand-now</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/116347.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/116347.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Always Be Testing, Always Be Assessing, Always Be Prepared [WATCH On Demand}</title>
      <link>https://www.opsec21.com/executive-decisions/articles/always-be-testing-always-be-assessing-always-be-prepared-1</link>
      <description>View the Parag Deodhar, Director - Information Security, Asia Pacific, VF Corporation CSHub APAC Summit session on-demand session now.</description>
      <content:encoded>&lt;div data-rss-type="text"&gt;&#xD;
  &lt;p&gt;&#xD;
    
                    View the Parag Deodhar, Director - Information Security, Asia Pacific, VF Corporation CSHub APAC Summit session on-demand session now.
                  &#xD;
  &lt;/p&gt;&#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/md/and1/dms3rep/multi/123181.jpeg" length="96876" type="image/jpeg" />
      <pubDate>Fri, 26 Jun 2020 00:49:33 GMT</pubDate>
      <guid>https://www.opsec21.com/executive-decisions/articles/always-be-testing-always-be-assessing-always-be-prepared-1</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/123181.jpeg">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/md/and1/dms3rep/multi/123181.jpeg">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>Philosophy</title>
      <link>https://www.opsec21.com/philosophy</link>
      <description />
      <content:encoded>&lt;h3&gt;&#xD;
  
                  
         This is a subtitle for your new post
        
                &#xD;
&lt;/h3&gt;&#xD;
&lt;div&gt;&#xD;
  &lt;img src="https://cdn.website-editor.net/md/dmtmpl/dms3rep/multi/blog_post_image.png"/&gt;&#xD;
&lt;/div&gt;&#xD;
&lt;div data-rss-type="text"&gt;&#xD;
  
                  
         There is a perfect way of doing things. The most simple, efficient, and effective path exists, and we should all strive to walk upon it. The fog of war is real. In business, like the battlefield, it is often difficult for those in the fight to see the way to the path, let alone, walk upon it. If the way were clear, many folly and tragedy could be avoided. We know the path. We walk the path. We clear the way for businesses to not only get to the path, but punch a ticket for the coming rocketship of human progress. 
        
                &#xD;
&lt;/div&gt;</content:encoded>
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/dms3rep/multi/62ED474B-915B-4A9C-8B98-AC67735240A8-c078c5ae.PNG" length="5494" type="image/png" />
      <pubDate>Mon, 01 Jun 2020 22:46:45 GMT</pubDate>
      <guid>https://www.opsec21.com/philosophy</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/dms3rep/multi/62ED474B-915B-4A9C-8B98-AC67735240A8-c078c5ae.PNG">
        <media:description>thumbnail</media:description>
      </media:content>
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/dms3rep/multi/62ED474B-915B-4A9C-8B98-AC67735240A8-c078c5ae.PNG">
        <media:description>main image</media:description>
      </media:content>
    </item>
    <item>
      <title>SOC Monitoring Mindmap</title>
      <link>https://www.opsec21.com/2020/05/soc-monitoring-mindmaphtml</link>
      <description>This COVID-19 pandemic significantly influenced the worldwide economy. The rapid interruption to organization businesses around the globe has left organizations attempting to keep up security and business resilience.Often in this fast shift, SOC divisions cannot monitor and track events coming from multiple sources, tools, and departments because they have no visibility into the threat environment or too much visibility in their infrastructure, which often leads them to false-positive incidents.Download high quality PDF here - https://www.linkedin.com/feed/update/urn:li:activity:6664730823222276096/I have built this mindmap for people working in SOC division. This mindmap particularly informs two things:- What ALL to monitor.- From WHERE to monitor.I hope this helps the community. There is no perfect list of SOC monitoring activities; hence I am open for any suggestion items that I can add or remove from this list.</description>
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/png-transparent-brain-with-neurons-mind-map-cartoon-brain-thinking-divergent-color-tree-template-color-splash-text.png" length="17161" type="image/png" />
      <pubDate>Mon, 11 May 2020 03:48:00 GMT</pubDate>
      <guid>https://www.opsec21.com/2020/05/soc-monitoring-mindmaphtml</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/png-transparent-brain-with-neurons-mind-map-cartoon-brain-thinking-divergent-color-tree-template-color-splash-text.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
    <item>
      <title>Guidelines for Corporate Email Audit</title>
      <link>https://www.opsec21.com/2019/11/guidelines-for-corporate-email-audithtml</link>
      <description />
      <content:encoded />
      <enclosure url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/Email%2BAudit.png" length="48653" type="image/png" />
      <pubDate>Sun, 24 Nov 2019 19:49:00 GMT</pubDate>
      <guid>https://www.opsec21.com/2019/11/guidelines-for-corporate-email-audithtml</guid>
      <g-custom:tags type="string" />
      <media:content medium="image" url="https://cdn.website-editor.net/9a7d34ad0bfe44238507ac80504ed761/Email%2BAudit.png">
        <media:description>thumbnail</media:description>
      </media:content>
    </item>
  </channel>
</rss>
