<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:media="http://search.yahoo.com/mrss/"><channel><title><![CDATA[RootEd Security]]></title><description><![CDATA[RootEd Security]]></description><link>https://rootedsecurity.blog/</link><image><url>https://rootedsecurity.blog/favicon.png</url><title>RootEd Security</title><link>https://rootedsecurity.blog/</link></image><generator>Ghost 5.17</generator><lastBuildDate>Sat, 02 May 2026 19:53:14 GMT</lastBuildDate><atom:link href="https://rootedsecurity.blog/rss/" rel="self" type="application/rss+xml"/><ttl>60</ttl><item><title><![CDATA[Embracing Learning and the Role of Failure]]></title><description><![CDATA[<p>I&apos;ve been in the Learning and Development industry for a decade. Well, in a professional capacity, that is. But if I&apos;m being honest, I&apos;ve been a student of this field my entire life. And so have you. The way we approach learning&#x2014;whether</p>]]></description><link>https://rootedsecurity.blog/embracing-learning-and-the-role-of-failure/</link><guid isPermaLink="false">64bb05d59bb8f625966a5f42</guid><category><![CDATA[Learning & Development]]></category><category><![CDATA[Embracing Failure]]></category><category><![CDATA[Deliberate Practice]]></category><category><![CDATA[Cybersecurity]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Fri, 21 Jul 2023 22:29:58 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1605514449459-5a9cfa0b9955?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDF8fGZhaWx1cmV8ZW58MHx8fHwxNjg5OTc4NjIyfDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1605514449459-5a9cfa0b9955?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=M3wxMTc3M3wwfDF8c2VhcmNofDF8fGZhaWx1cmV8ZW58MHx8fHwxNjg5OTc4NjIyfDA&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="Embracing Learning and the Role of Failure"><p>I&apos;ve been in the Learning and Development industry for a decade. Well, in a professional capacity, that is. But if I&apos;m being honest, I&apos;ve been a student of this field my entire life. And so have you. The way we approach learning&#x2014;whether it&apos;s diving into a new subject or honing an existing skill&#x2014;is pivotal. Do you retreat at the first sign of failure? Do you expect instant success? How do you envision your learning journey? How much of your day is dedicated to study and practice?</p><p>At 19, I took a leap of faith and served a mission for my church, The Church of Jesus Christ of Latter-Day Saints, in Brazil. With zero knowledge of the language, culture, or even the local cuisine, I embarked on this journey in August of 1998. My initial training was at the Missionary Training Center in Provo, UT, where I spent two months. A significant part of our training was language acquisition. Eager to communicate upon my arrival in Brazil, I took an instructor&apos;s advice to heart: spend an entire day speaking only in Portuguese. Armed with a dictionary and notebook, I took on this challenge amidst my group of ten fellow missionaries. It was daunting. Many in my group were hesitant to join in, and some even poked fun at my attempts. But through a cycle of failures and successes, I persevered. By the time I left Brazil, I was nearly fluent. While I might not claim fluency today, I still cherish those skills, allowing me to exchange pleasantries in Portuguese whenever the opportunity arises.</p><p>This experience taught me a universal truth about learning: if a challenge doesn&apos;t push you to the brink of failure, the lessons won&apos;t stick. Regardless of how many times you stumble, the key is to keep pushing forward. Analyze the reasons behind each failure, adjust your approach, and keep going until you succeed. When my eldest son was learning to drive, he feared failing his test. I reassured him that whether he passed on his first or tenth attempt, the end result was the same. After all, does the number of tries truly matter?</p><p>As you embark on your learning journey, remember:</p><!--kg-card-begin: markdown--><ul>
<li>Seek the &quot;Why&quot;: Whether in success or failure, understanding the reasons behind outcomes will solidify your grasp on the subject.</li>
<li>Embrace Failure: Don&apos;t fear the &quot;F&quot; word. Your reaction to failure is what truly counts. When you stumble, seek the &quot;why&quot; and adjust your course.</li>
<li>Forget About Timelines: While there are times when speed is essential (like finishing a semester), don&apos;t let the pressure overshadow your progress.</li>
<li>Practice Makes Perfect: Engage in deliberate practice. Set clear goals, measure your progress, and if possible, find a mentor to guide you.</li>
<li>Stay Humble: Learning thrives in humility. An inflated ego can hinder your growth.</li>
</ul>
<!--kg-card-end: markdown--><p>For my part, I remain committed to this industry. I strive to be a lifelong learner, constantly reminding myself of these principles, and a dedicated teacher, eager to guide others on their learning paths. Stay tuned, as I&apos;ll be sharing posts to help you access foundational knowledge and skills in cybersecurity. Additionally, keep an eye out for a follow-up blog post where I&apos;ll delve deeper into the concept of deliberate practice.</p>]]></content:encoded></item><item><title><![CDATA[Goodbye Cybersecurity Awareness Month, Hello Cybersecurity Awareness!]]></title><description><![CDATA[<p>At the start of October, I decided to kick off a podcast for the month. Never having done one, I had a definite learning curve! I put out 24 different episodes, some on a nearly daily basis. But, just because cybersecurity awareness month has ended, doesn&apos;t mean I</p>]]></description><link>https://rootedsecurity.blog/goodbye-cybersecurity-awareness-month-hello-cybersecurity-awareness/</link><guid isPermaLink="false">636157e69bb8f625966a5f11</guid><category><![CDATA[cybersecurityawareness]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Tue, 01 Nov 2022 17:32:00 GMT</pubDate><media:content url="https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDEyfHxUZWNobm9sb2d5fGVufDB8fHx8MTY2NzMyMzk0Ng&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" medium="image"/><content:encoded><![CDATA[<img src="https://images.unsplash.com/photo-1487058792275-0ad4aaf24ca7?crop=entropy&amp;cs=tinysrgb&amp;fit=max&amp;fm=jpg&amp;ixid=MnwxMTc3M3wwfDF8c2VhcmNofDEyfHxUZWNobm9sb2d5fGVufDB8fHx8MTY2NzMyMzk0Ng&amp;ixlib=rb-4.0.3&amp;q=80&amp;w=2000" alt="Goodbye Cybersecurity Awareness Month, Hello Cybersecurity Awareness!"><p>At the start of October, I decided to kick off a podcast for the month. Never having done one, I had a definite learning curve! I put out 24 different episodes, some on a nearly daily basis. But, just because cybersecurity awareness month has ended, doesn&apos;t mean I will stop. My intention remains to continue producing podcasts and blog posts on cybersecurity. Some will remain for those that sit outside the industry. Others will be more technical in nature. So, join me as I continue to post and grow the content here at RootEd Security!</p>]]></content:encoded></item><item><title><![CDATA[Podcast: Breach Notification - The Church of Jesus Christ of Latter-Day Saints, episode 24]]></title><description><![CDATA[<div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_24_thumb.jpg?v=1666991261437" alt="audio-thumbnail" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_24.m4a" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 24</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">30:34</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href=" https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000584282017"><img src="https://rootedsecurity.blog/content/images/2022/10/badge-7.svg" class="kg-image" alt loading="lazy" width="164" height="40"></a></figure><hr><p>This will likely remain my longest podcast title ever. This also serves to show that no organization is safe from breach. It doesn&apos;t matter if you are a church or a Fortune 500 company. If someone sets their</p>]]></description><link>https://rootedsecurity.blog/podcast-breach-notification-the-church-of-jesus-christ-of-latter-day-saints-episode-24/</link><guid isPermaLink="false">635c441b9bb8f625966a5ebe</guid><category><![CDATA[podcasts]]></category><category><![CDATA[cybersecurityawareness]]></category><category><![CDATA[breachnotification]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Fri, 28 Oct 2022 21:08:01 GMT</pubDate><media:content url="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-22.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_24_thumb.jpg?v=1666991261437" alt="Podcast: Breach Notification - The Church of Jesus Christ of Latter-Day Saints, episode 24" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_24.m4a" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 24</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">30:34</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href=" https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000584282017"><img src="https://rootedsecurity.blog/content/images/2022/10/badge-7.svg" class="kg-image" alt="Podcast: Breach Notification - The Church of Jesus Christ of Latter-Day Saints, episode 24" loading="lazy" width="164" height="40"></a></figure><hr><img src="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-22.jpg" alt="Podcast: Breach Notification - The Church of Jesus Christ of Latter-Day Saints, episode 24"><p>This will likely remain my longest podcast title ever. This also serves to show that no organization is safe from breach. It doesn&apos;t matter if you are a church or a Fortune 500 company. If someone sets their eyes on your network, they will get in. How will you respond? Let&apos;s dive into this breach and find out! My guest today is my wonderful mother-in-law!</p><hr><p>Links of interest</p><ul><li>News article: <a href="https://www.sltrib.com/religion/2022/10/13/cyberattack-targets-lds-church/">https://www.sltrib.com/religion/2022/10/13/cyberattack-targets-lds-church/</a></li></ul>]]></content:encoded></item><item><title><![CDATA[Podcast: Increasing Your Knowledge - Study, episode 23]]></title><description><![CDATA[<div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_23_thumb.jpg?v=1666990784184" alt="audio-thumbnail" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_23.m4a" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 23</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">19:20</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href="https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000584281985"><img src="https://rootedsecurity.blog/content/images/2022/10/badge-6.svg" class="kg-image" alt loading="lazy" width="164" height="40"></a></figure><hr><p>Ah, knowledge, you slippery little minx. How can we hold on to you? Do we even need to chase you? Well, if you want to succed here in the world of cybersecurity, you will definitely need to chase and grab</p>]]></description><link>https://rootedsecurity.blog/podcast-increasing-your-knowledge-study-episode-23/</link><guid isPermaLink="false">635c429c9bb8f625966a5e88</guid><category><![CDATA[podcasts]]></category><category><![CDATA[skills]]></category><category><![CDATA[cybersecurityawareness]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Fri, 28 Oct 2022 21:03:37 GMT</pubDate><media:content url="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-21.jpg" medium="image"/><content:encoded><![CDATA[<div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_23_thumb.jpg?v=1666990784184" alt="Podcast: Increasing Your Knowledge - Study, episode 23" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_23.m4a" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 23</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">19:20</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href="https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000584281985"><img src="https://rootedsecurity.blog/content/images/2022/10/badge-6.svg" class="kg-image" alt="Podcast: Increasing Your Knowledge - Study, episode 23" loading="lazy" width="164" height="40"></a></figure><hr><img src="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-21.jpg" alt="Podcast: Increasing Your Knowledge - Study, episode 23"><p>Ah, knowledge, you slippery little minx. How can we hold on to you? Do we even need to chase you? Well, if you want to succed here in the world of cybersecurity, you will definitely need to chase and grab a tight hold on knowledge. In today&apos;s episode, I describe my process of acquiring knowledge. It really is only one part of an overall strategy to develop your skill set. You need knowledge, but then you need practice. Today, we will discuss knowledge.</p><p>Does your process differ from mine? Let me know how you succeed! Any blogs or other resources you think need to be added? Let me know that as well!</p><!--kg-card-begin: markdown--><p>During this podcast, I break down where we gain knowledge:</p>
<ul>
<li>Social Media
<ul>
<li>Reddit</li>
<li>Twitter</li>
</ul>
</li>
<li>Blog Posts (like these!)
<ul>
<li>Company</li>
<li>News</li>
<li>Personal</li>
</ul>
</li>
<li>Vulnerabilites / Threats</li>
</ul>
<!--kg-card-end: markdown--><p>One of the best ways to consume this is through a RSS Feed Reader. Many applications will even bring in subreddits and Twitter feeds. This will ensure you stay <em>out of</em> the social media black hole during your research time.</p><p><a href="https://feedly.com">Feedly</a> - RSS Reader, cross platform. Free, but has a yearly premium cost of $99. This adds the ability to add Twitter feeds and Reddit subreddits.</p><p><a href="https://www.inoreader.com">Inoreader</a> - RSS Reader, cross platform. Free, but has a yearly premium cost of $90. This adds the ability to add Twitter feeds (among other things). The ability to add Reddit subreddits is in their Free Tier.</p><p><a href="https://netnewswire.com">NetNewWire</a> - This is an open source RSS Reader. Mac only.</p><p><a href="https://getpocket.com/en/">Pocket</a> and <a href="https://www.instapaper.com">Instapaper</a>: These are good repositories for links you read and want to keep around.</p><p>For note taking, this will be highly personal.</p><p>That being said, my recommendation is <a href="https://www.craft.do">Craft Docs</a>. It is highly flexible and allows you to really organize your notes very well. Remember: you want to capture what you are researching. Make notes about points you feel are important. Add a &quot;so what&quot; section. And a section for &quot;Follow up&quot; topics.</p><p>These are other apps that work well for note taking:</p><p><a href="https://bear.app">Bear</a></p><p><a href="https://ulysses.app">Ulysses</a></p><p><a href="https://www.microsoft.com/en-us/microsoft-365/onenote/digital-note-taking-app">OneNote</a></p><p><a href="https://evernote.com">Evernote</a></p><p><a href="https://support.apple.com/guide/notes/welcome/mac">Apple Notes</a></p><p>Now for the links. This is going to just be a dump of links without much context. Enjoy them. Look over them. Make them your own: remove ones that don&apos;t interest you and add ones that do!</p><p><strong>Twitter</strong></p><p><a href="https://twitter.com/4n6ir">https://twitter.com/4n6ir</a></p><p><a href="https://twitter.com/anton_chuvakin">https://twitter.com/anton_chuvakin</a></p><p><a href="https://twitter.com/briankrebs">https://twitter.com/briankrebs</a></p><p><a href="https://twitter.com/sans_isc">https://twitter.com/sans_isc</a></p><p><a href="https://twitter.com/sansforensics">https://twitter.com/sansforensics</a></p><p><a href="https://twitter.com/EricRZimmerman">https://twitter.com/EricRZimmerman</a></p><p><a href="https://twitter.com/13CubedDFIR">https://twitter.com/13CubedDFIR</a></p><p><a href="https://twitter.com/cyb3rops">https://twitter.com/cyb3rops</a></p><p><a href="https://twitter.com/schneierblog">https://twitter.com/schneierblog</a></p><p><a href="https://twitter.com/offsectraining">https://twitter.com/offsectraining</a></p><p><a href="https://twitter.com/ExploitDB">https://twitter.com/ExploitDB</a></p><p><a href="https://twitter.com/taosecurity">https://twitter.com/taosecurity</a></p><p><strong>Reddit</strong></p><p><a href="https://www.reddit.com/r/netsec/">https://www.reddit.com/r/netsec/</a></p><p><a href="https://www.reddit.com/r/cybersecurity/">https://www.reddit.com/r/cybersecurity/</a></p><p><a href="https://www.reddit.com/r/AskNetsec/">https://www.reddit.com/r/AskNetsec/</a></p><p><a href="https://www.reddit.com/r/Cybersecurity101/">https://www.reddit.com/r/Cybersecurity101/</a></p><p><a href="https://www.reddit.com/r/netsecstudents/">https://www.reddit.com/r/netsecstudents/</a></p><p><a href="https://www.reddit.com/r/blueteamsec/">https://www.reddit.com/r/blueteamsec/</a></p><p><a href="https://www.reddit.com/r/redteamsec/">https://www.reddit.com/r/redteamsec/</a></p><p><a href="https://www.reddit.com/r/linuxquestions/">https://www.reddit.com/r/linuxquestions/</a></p><p><a href="https://www.reddit.com/r/securityCTF/">https://www.reddit.com/r/securityCTF/</a></p><p><a href="https://www.reddit.com/r/ReverseEngineering/">https://www.reddit.com/r/ReverseEngineering/</a></p><p><a href="https://www.reddit.com/r/computerforensics/">https://www.reddit.com/r/computerforensics/</a></p><p><a href="https://www.reddit.com/r/Malware/">https://www.reddit.com/r/Malware/</a></p><p><a href="https://www.reddit.com/r/crypto/">https://www.reddit.com/r/crypto/</a></p><p><strong>Blogs</strong></p><p><strong><em>Company</em></strong></p><p><a href="https://www.rapid7.com/blog/">https://www.rapid7.com/blog/</a></p><p><a href="https://www.mandiant.com/resources/blog">https://www.mandiant.com/resources/blog</a></p><p><a href="https://www.trellix.com/en-us/about/newsroom/stories.html">https://www.trellix.com/en-us/about/newsroom/stories.html</a></p><p><a href="https://www.crowdstrike.com/blog/">https://www.crowdstrike.com/blog/</a></p><p><a href="https://www.malwarebytes.com/blog">https://www.malwarebytes.com/blog</a></p><p><a href="https://nakedsecurity.sophos.com/">https://nakedsecurity.sophos.com/</a></p><p><a href="https://www.offensive-security.com/blog/">https://www.offensive-security.com/blog/</a></p><p><strong><em>News</em></strong></p><p><a href="https://thehackernews.com/">https://thehackernews.com/</a></p><p><a href="https://www.bleepingcomputer.com/">https://www.bleepingcomputer.com/</a></p><p><a href="https://www.darkreading.com/">https://www.darkreading.com/</a></p><p><a href="https://isc.sans.edu/">https://isc.sans.edu/</a></p><p><a href="https://www.securityweek.com/">https://www.securityweek.com/</a></p><p><a href="https://thehackernews.com/">https://thehackernews.com/</a></p><p><a href="https://threatpost.com/">https://threatpost.com/</a></p><p><strong><em>Personal</em></strong></p><p><a href="https://krebsonsecurity.com/">https://krebsonsecurity.com/</a></p><p><a href="https://www.schneier.com/">https://www.schneier.com/</a></p><p><a href="https://taosecurity.blogspot.com/">https://taosecurity.blogspot.com/</a></p><p><a href="https://medium.com/katies-five-cents">https://medium.com/katies-five-cents</a></p><p><a href="https://rootedsecurity.blog/">https://rootedsecurity.blog/</a></p><p><strong><em>Vulnerabilities / Threats</em></strong></p><p><a href="https://www.cisa.gov/uscert/ncas/bulletins">https://www.cisa.gov/uscert/ncas/bulletins</a></p><p><a href="https://www.cisa.gov/uscert/ncas/current-activity">https://www.cisa.gov/uscert/ncas/current-activity</a></p><p><a href="https://www.cve.org/Media/News/AllNews">https://www.cve.org/Media/News/AllNews</a></p><p><a href="https://packetstormsecurity.com/">https://packetstormsecurity.com/</a></p><p><a href="https://kb.cert.org/vuls/">https://kb.cert.org/vuls/</a></p><p><a href="https://www.exploit-db.com/">https://www.exploit-db.com/</a></p><p><a href="https://seclists.org/#fulldisclosure">https://seclists.org/#fulldisclosure</a></p><hr>]]></content:encoded></item><item><title><![CDATA[Podcast: Dip Your Toes, episode 22]]></title><description><![CDATA[<p>Look in the sky! It&apos;s a SIM, no a SEM, wait ... it&apos;s a SIEM! It&apos;s here to save us! Or is it? Come with me and learn about this essential, albeit frustrating, tool that exists in nearly every single organization.</p><hr><p><strong>Links of interest</strong></p><ul><li>Minutes</li></ul>]]></description><link>https://rootedsecurity.blog/podcast-dip-your-toes-episode-22/</link><guid isPermaLink="false">635b43179bb8f625966a5e65</guid><category><![CDATA[podcasts]]></category><category><![CDATA[cybersecurityawareness]]></category><category><![CDATA[dipyourtoes]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Fri, 28 Oct 2022 02:55:41 GMT</pubDate><media:content url="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-20.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-20.jpg" alt="Podcast: Dip Your Toes, episode 22"><p>Look in the sky! It&apos;s a SIM, no a SEM, wait ... it&apos;s a SIEM! It&apos;s here to save us! Or is it? Come with me and learn about this essential, albeit frustrating, tool that exists in nearly every single organization.</p><hr><p><strong>Links of interest</strong></p><ul><li>Minutes from the 1977 meeting that started the industry talking about logs: <a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nbsspecialpublication500-19.pdf">https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nbsspecialpublication500-19.pdf</a></li><li>SIEM overview: <a href="https://www.prelude-siem.com/en/what-is-a-siem/">https://www.prelude-siem.com/en/what-is-a-siem/</a></li><li>Great article by Alissa Knight on the SIEM vendor history: <a href="https://alissaknight.medium.com/ashes-to-ashes-we-all-fall-down-the-death-of-siem-and-rise-of-soar-e2fcfbb81cdd">https://alissaknight.medium.com/ashes-to-ashes-we-all-fall-down-the-death-of-siem-and-rise-of-soar-e2fcfbb81cdd</a></li></ul><hr><div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_22_thumb.jpg?v=1666925658975" alt="Podcast: Dip Your Toes, episode 22" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_22.m4a" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 22</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">21:36</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href="https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000584178870"><img src="https://rootedsecurity.blog/content/images/2022/10/badge-5.svg" class="kg-image" alt="Podcast: Dip Your Toes, episode 22" loading="lazy" width="164" height="40"></a></figure>]]></content:encoded></item><item><title><![CDATA[Podcast: Dip your toes: MITRE ATT&CK, episode 21]]></title><description><![CDATA[<p>No, I didn&#x2019;t mistype the word attack. Today we are talking about an attack framework from MITRE. Come learn what this framework is, how organizations use it to keep themselves ahead of the adversary (or at least pace with). And I&#x2019;ll even discuss how you can</p>]]></description><link>https://rootedsecurity.blog/podcast-dip-your-toes-mitre-attck-episode-21/</link><guid isPermaLink="false">6359e0d29bb8f625966a5e2a</guid><category><![CDATA[podcasts]]></category><category><![CDATA[dipyourtoes]]></category><category><![CDATA[cybersecurityawareness]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Thu, 27 Oct 2022 01:55:15 GMT</pubDate><media:content url="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-19.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-19.jpg" alt="Podcast: Dip your toes: MITRE ATT&amp;CK, episode 21"><p>No, I didn&#x2019;t mistype the word attack. Today we are talking about an attack framework from MITRE. Come learn what this framework is, how organizations use it to keep themselves ahead of the adversary (or at least pace with). And I&#x2019;ll even discuss how you can use this to level up your cybersecurity skills!</p><hr><!--kg-card-begin: markdown--><p><strong>Links of interest</strong></p>
<ul>
<li><a href="https://attack.mitre.org/resources/faq/">Our Story | MITRE</a></li>
<li><a href="https://attack.mitre.org">MITRE ATT&amp;CK&#xAE;</a></li>
</ul>
<!--kg-card-end: markdown--><hr><div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_21_thumb.jpg?v=1666835372240" alt="Podcast: Dip your toes: MITRE ATT&amp;CK, episode 21" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_21.m4a" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 21</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">27:21</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href="https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000584017339"><img src="https://rootedsecurity.blog/content/images/2022/10/badge-4.svg" class="kg-image" alt="Podcast: Dip your toes: MITRE ATT&amp;CK, episode 21" loading="lazy" width="164" height="40"></a></figure>]]></content:encoded></item><item><title><![CDATA[Podcast: Cybersecurity Discipline - Threat Hunting, episode 20]]></title><description><![CDATA[<p>Do you like the idea of stealthily stalking your cyber prey? How about being so advanced in your skills that you are ahead of that security vendor you just cut a million dollar check to? Threat Hunting is a great field that will push your skills to their limits. It</p>]]></description><link>https://rootedsecurity.blog/podcast-cybersecurity-discipline-threat-hunting-episode-20/</link><guid isPermaLink="false">635898179bb8f625966a5dfb</guid><category><![CDATA[cybersecuritydiscipline]]></category><category><![CDATA[podcasts]]></category><category><![CDATA[cybersecurityawareness]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Wed, 26 Oct 2022 02:22:02 GMT</pubDate><media:content url="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-18.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-18.jpg" alt="Podcast: Cybersecurity Discipline - Threat Hunting, episode 20"><p>Do you like the idea of stealthily stalking your cyber prey? How about being so advanced in your skills that you are ahead of that security vendor you just cut a million dollar check to? Threat Hunting is a great field that will push your skills to their limits. It gives you a great opportunity to dive deep into the threats that exist against your organization. So, grab your preferred weapon of choice and join me as we journey into this jungle, hunting for those oh-so-stealthy threats.</p><hr><p><strong>Links of interest</strong></p><p><a href="https://taosecurity.blogspot.com/2017/03/the-origin-of-threat-hunting.html">The Origin of Threat Hunting</a></p><p><a href="http://docs.media.bitpipe.com/io_24x/io_24618/item_370437/informationsecurity_july_aug2011_final.pdf">An early Threat Hunting article by Richard Bejtlich</a></p><hr><div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_20-1_thumb.jpg?v=1666802529144" alt="Podcast: Cybersecurity Discipline - Threat Hunting, episode 20" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_20-1.m4a" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 20</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">12:08</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href="https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000583900172"><img src="https://rootedsecurity.blog/content/images/2022/10/badge-3.svg" class="kg-image" alt="Podcast: Cybersecurity Discipline - Threat Hunting, episode 20" loading="lazy" width="164" height="40"></a></figure>]]></content:encoded></item><item><title><![CDATA[Podcast: Breach Notification - Toyota, episode 19]]></title><description><![CDATA[<p>What would you say if I told you a company didn&apos;t know some of their customer data was exposed for 5 years? It happened! Jump in today and learn how Toyota kept things in neutral and missed the on-ramp to better security! Join my special guest (my wife!</p>]]></description><link>https://rootedsecurity.blog/podcast-breach-notification-toyota-episode-19/</link><guid isPermaLink="false">6356ff829bb8f625966a5dd9</guid><category><![CDATA[podcasts]]></category><category><![CDATA[News]]></category><category><![CDATA[breachnotification]]></category><category><![CDATA[cybersecurityawareness]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Mon, 24 Oct 2022 21:57:53 GMT</pubDate><media:content url="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-17.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-17.jpg" alt="Podcast: Breach Notification - Toyota, episode 19"><p>What would you say if I told you a company didn&apos;t know some of their customer data was exposed for 5 years? It happened! Jump in today and learn how Toyota kept things in neutral and missed the on-ramp to better security! Join my special guest (my wife!) and I as we delve into how this occurred and what other companies need to watch out for!</p><hr><p><strong>Links of interest</strong></p><p>Toyota defines T-Connect: <a href="http://www.toyotaconnected.co.jp/en/service/telematics.html">http://www.toyotaconnected.co.jp/en/service/telematics.html</a></p><p>GitGuardian&apos;s take on this breach: <a href="https://blog.gitguardian.com/toyota-accidently-exposed-a-secret-key-publicly-on-github-for-five-years/">https://blog.gitguardian.com/toyota-accidently-exposed-a-secret-key-publicly-on-github-for-five-years/</a></p><p>Toyota&apos;s Breach Notification: <a href="https://global.toyota/jp/newsroom/corporate/38095972.html">https://global.toyota/jp/newsroom/corporate/38095972.html</a></p><p>Duo&apos;s advice for monitoring GitHub for your secrets: <a href="https://duo.com/labs/research/how-to-monitor-github-for-secrets">https://duo.com/labs/research/how-to-monitor-github-for-secrets</a></p><p>Samsung has a similar problem: <a href="https://www.bleepingcomputer.com/news/security/hackers-leak-190gb-of-alleged-samsung-data-source-code/">https://www.bleepingcomputer.com/news/security/hackers-leak-190gb-of-alleged-samsung-data-source-code/</a></p><hr><div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_19_thumb.jpg?v=1666646182333" alt="Podcast: Breach Notification - Toyota, episode 19" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_19.m4a" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 19</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">28:48</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href="https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000583736218"><img src="https://rootedsecurity.blog/content/images/2022/10/badge-2.svg" class="kg-image" alt="Podcast: Breach Notification - Toyota, episode 19" loading="lazy" width="164" height="40"></a></figure>]]></content:encoded></item><item><title><![CDATA[Podcast: Dip Your Toes - Cyber Threat Intellegince, episode 18]]></title><description><![CDATA[<p><a href="craftdocs://open?blockId=36D36701-7923-4B71-98AD-5D3518C2245D&amp;spaceId=887bb760-6f8a-3979-9d12-5f0e5fb91d2d">Link to Original Document</a></p><p>Oh, we have a good one today! Cyber threat Intellegince is our focus: what is it, why is it important, and how is it accomplished. Let&apos;s talk about what makes threat intel, threat intel.</p><hr><p><strong>Links of interest</strong></p><p>Initial definition of cyber threat intelligence: <a href="https://www.gartner.com/en/documents/2487216">https:</a></p>]]></description><link>https://rootedsecurity.blog/podcast-dip-your-toes-cyber-threat-intellegince-episode-18/</link><guid isPermaLink="false">635213739bb8f625966a5d81</guid><category><![CDATA[podcasts]]></category><category><![CDATA[cybersecurityawareness]]></category><category><![CDATA[dipyourtoes]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Fri, 21 Oct 2022 03:55:55 GMT</pubDate><media:content url="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-16.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-16.jpg" alt="Podcast: Dip Your Toes - Cyber Threat Intellegince, episode 18"><p><a href="craftdocs://open?blockId=36D36701-7923-4B71-98AD-5D3518C2245D&amp;spaceId=887bb760-6f8a-3979-9d12-5f0e5fb91d2d">Link to Original Document</a></p><p>Oh, we have a good one today! Cyber threat Intellegince is our focus: what is it, why is it important, and how is it accomplished. Let&apos;s talk about what makes threat intel, threat intel.</p><hr><p><strong>Links of interest</strong></p><p>Initial definition of cyber threat intelligence: <a href="https://www.gartner.com/en/documents/2487216">https://www.gartner.com/en/documents/2487216</a></p><p>Mandiant&apos;s APT1 report: <a href="https://www.mandiant.com/resources/apt1-exposing-one-of-chinas-cyber-espionage-units">https://www.mandiant.com/resources/apt1-exposing-one-of-chinas-cyber-espionage-units</a></p><!--kg-card-begin: markdown--><p>A great starting point for cyber threat intelligence:</p>
<ol>
<li><a href="https://www.oreilly.com/library/view/threat-intelligence-in/9781492049302/ch01.html">https://www.oreilly.com/library/view/threat-intelligence-in/9781492049302/ch01.html</a></li>
<li><a href="https://www.recordedfuture.com/threat-intelligence">https://www.recordedfuture.com/threat-intelligence</a></li>
<li><a href="https://www.cisecurity.org/insights/blog/what-is-cyber-threat-intelligence">https://www.cisecurity.org/insights/blog/what-is-cyber-threat-intelligence</a></li>
</ol>
<!--kg-card-end: markdown--><!--kg-card-begin: markdown--><p>3 great resources from Katie Nickels, the Director of Intellegince at Red Canary:</p>
<ol>
<li><a href="https://www.youtube.com/watch?v=J7e74QLVxCk">A great webcast on the threat intel process</a></li>
<li><a href="https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-1-968b5a8daf9a?source=user_profile---------2----------------------------">Her threat intel study plan, part 1</a></li>
<li><a href="https://medium.com/katies-five-cents/a-cyber-threat-intelligence-self-study-plan-part-2-d04b7a529d36?source=user_profile---------0----------------------------">Her threat intel study plan, part 2</a></li>
</ol>
<!--kg-card-end: markdown--><hr><div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_18_thumb.jpg?v=1666323524099" alt="Podcast: Dip Your Toes - Cyber Threat Intellegince, episode 18" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_18.m4a" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 18</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">16:17</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href="https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000583373120"><img src="https://rootedsecurity.blog/content/images/2022/10/badge-1.svg" class="kg-image" alt="Podcast: Dip Your Toes - Cyber Threat Intellegince, episode 18" loading="lazy" width="164" height="40"></a></figure>]]></content:encoded></item><item><title><![CDATA[Podcast: Dip Your Toes - PII, episode 17]]></title><description><![CDATA[<p>Let&apos;s dip our toes again today! Do you know what PII is? Nope, I didn&apos;t mean pi ... I meant Personally Identifiable Information. This means how you can be identified with various bits and pieces of data. Do companies deserve your trust with your data? Probably not.</p>]]></description><link>https://rootedsecurity.blog/podcast-dip-your-toes-pii-episode-17/</link><guid isPermaLink="false">6350bdc39bb8f625966a5d4c</guid><category><![CDATA[podcasts]]></category><category><![CDATA[cybersecurityawareness]]></category><category><![CDATA[dipyourtoes]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Thu, 20 Oct 2022 03:38:46 GMT</pubDate><media:content url="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-15.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-15.jpg" alt="Podcast: Dip Your Toes - PII, episode 17"><p>Let&apos;s dip our toes again today! Do you know what PII is? Nope, I didn&apos;t mean pi ... I meant Personally Identifiable Information. This means how you can be identified with various bits and pieces of data. Do companies deserve your trust with your data? Probably not. Listen today and find out what you can do to protect yourself.</p><div class="kg-card kg-callout-card kg-callout-card-pink"><div class="kg-callout-emoji">&#x2757;</div><div class="kg-callout-text">Slight correction note: In this episode, I discuss the OPM data breach. In it, I reference the SF-86 documents that were lost. I erronsouly refered to the document as an SF-84 document. Also, we tend to say files were &quot;lost&quot;, however a better term is exfiltrated. The Government still has the files ... but so does the group that took it. Read more about the breach here: <a href="https://www.csoonline.com/article/3318238/the-opm-hack-explained-bad-security-practices-meet-chinas-captain-america.html">https://www.csoonline.com/article/3318238/the-opm-hack-explained-bad-security-practices-meet-chinas-captain-america.html</a></div></div><hr><div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_17-1_thumb.jpg?v=1666236311724" alt="Podcast: Dip Your Toes - PII, episode 17" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/RootEdSecurity_17-1.m4a" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 17</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">18:09</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href="https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000583249218"><img src="https://rootedsecurity.blog/content/images/2022/10/badge.svg" class="kg-image" alt="Podcast: Dip Your Toes - PII, episode 17" loading="lazy" width="164" height="40"></a></figure>]]></content:encoded></item><item><title><![CDATA[Podcast: Cybersecurity Discipline - Pen Testing, episode 16]]></title><description><![CDATA[<p>We&apos;re discussing pen testing today! Have you ever wanted to break into a computer and not risk any legal ramifications? Have you ever wondered just what a hacker does to gain control of a company&apos;s network? Well, pen testing may be a field for you! Jump</p>]]></description><link>https://rootedsecurity.blog/podcast-cybersecurity-discipline-pen-testing-episode-16/</link><guid isPermaLink="false">634e1b929bb8f625966a5d2d</guid><category><![CDATA[podcasts]]></category><category><![CDATA[cybersecuritydiscipline]]></category><category><![CDATA[cybersecurityawareness]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Tue, 18 Oct 2022 03:23:59 GMT</pubDate><media:content url="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-14.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-14.jpg" alt="Podcast: Cybersecurity Discipline - Pen Testing, episode 16"><p>We&apos;re discussing pen testing today! Have you ever wanted to break into a computer and not risk any legal ramifications? Have you ever wondered just what a hacker does to gain control of a company&apos;s network? Well, pen testing may be a field for you! Jump in, and let&apos;s explore this amazingly fun role together.</p><hr><p><strong>Links of interest</strong></p><p>TryHackMe: <a href="https://tryhackme.com">https://tryhackme.com</a></p><p>Kali Linux: <a href="https://www.kali.org">https://www.kali.org</a></p><p>Offensive Security: <a href="https://www.offensive-security.com">https://www.offensive-security.com</a></p><p>EC-Council: <a href="https://www.eccouncil.org">https://www.eccouncil.org</a> (They have many different types of training and certifications, including Pen Testing)</p><p>Great background on Pen Testing: <a href="https://resources.infosecinstitute.com/topic/the-history-of-penetration-testing/">https://resources.infosecinstitute.com/topic/the-history-of-penetration-testing/</a></p><hr><div class="kg-card kg-audio-card"><img src alt="Podcast: Cybersecurity Discipline - Pen Testing, episode 16" class="kg-audio-thumbnail kg-audio-hide"><div class="kg-audio-thumbnail placeholder"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/rootedsecurity_116.mp3" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 16</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">12:03</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href="https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000582971466"><img src="https://rootedsecurity.blog/content/images/2022/10/US_UK_Apple_Podcasts_Listen_Badge_RGB-15.svg" class="kg-image" alt="Podcast: Cybersecurity Discipline - Pen Testing, episode 16" loading="lazy" width="164" height="40"></a></figure>]]></content:encoded></item><item><title><![CDATA[Podcast: Dip Your Toes - Social Engineering, episode 15]]></title><description><![CDATA[We are dipping our toes into the discussion of social engineering! How gullible are you? Hopefully, not as gullible as the victims of the Indian conman, Natwarlal...]]></description><link>https://rootedsecurity.blog/podcast-dip-your-toes-social-engineering-episode-15/</link><guid isPermaLink="false">634b78649bb8f625966a5cfa</guid><category><![CDATA[podcasts]]></category><category><![CDATA[dipyourtoes]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Sun, 16 Oct 2022 03:26:28 GMT</pubDate><media:content url="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-13.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-13.jpg" alt="Podcast: Dip Your Toes - Social Engineering, episode 15"><p>We are dipping our toes into the discussion of social engineering! How gullible are you? Hopefully, not as gullible as the victims of the Indian conman, Natwarlal (see this article on Wikipedia for his exploits: <a href="https://en.wikipedia.org/wiki/Natwarlal">https://en.wikipedia.org/wiki/Natwarlal</a>). Scammers play on our desires to be helpful and avoid trouble. Sometimes, even the most cautious can be fooled. In today&apos;s episode, we will look at scammers&apos; tactics and how you can avoid being duped.</p><hr><p><strong>Links of interest</strong></p><p>The Wired article on John Brennan: <a href="https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/">https://www.wired.com/2015/10/hacker-who-broke-into-cia-director-john-brennan-email-tells-how-he-did-it/</a></p><p>Article from CompTIA on Social Engineering: <a href="https://www.comptia.org/content/articles/what-is-social-engineering">https://www.comptia.org/content/articles/what-is-social-engineering</a></p><hr><div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/rootedsecurity_15-1_thumb.jpg?v=1665892078345" alt="Podcast: Dip Your Toes - Social Engineering, episode 15" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/rootedsecurity_15-1.mp3" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 15</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">10:34</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href="https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000582767647"><img src="https://rootedsecurity.blog/content/images/2022/10/US_UK_Apple_Podcasts_Listen_Badge_RGB-14.svg" class="kg-image" alt="Podcast: Dip Your Toes - Social Engineering, episode 15" loading="lazy" width="164" height="40"></a></figure>]]></content:encoded></item><item><title><![CDATA[Podcast: Breach Notification - 2k, episode 14]]></title><description><![CDATA[<p>We&apos;ve got another Breach Notification episode today with another special guest: my daughter! What breach are we talking about? 2k! If you haven&apos;t heard of 2k, you may not play many video games. But that doesn&apos;t lessen the impact of this breach. It was</p>]]></description><link>https://rootedsecurity.blog/podcast-breach-notification-2k-episode-14/</link><guid isPermaLink="false">6349e9f09bb8f625966a5cde</guid><category><![CDATA[podcasts]]></category><category><![CDATA[breachnotification]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Fri, 14 Oct 2022 23:08:24 GMT</pubDate><media:content url="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-12.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-12.jpg" alt="Podcast: Breach Notification - 2k, episode 14"><p>We&apos;ve got another Breach Notification episode today with another special guest: my daughter! What breach are we talking about? 2k! If you haven&apos;t heard of 2k, you may not play many video games. But that doesn&apos;t lessen the impact of this breach. It was a sneaky one and something that could happen with other organizations.</p><p>Join us as we discuss how it happened, what it means to those impacted, and what could have been done to prevent it.</p><hr><p><strong>Links of Interest</strong></p><p>Initial article from Bleeping Computer: <a href="https://www.bleepingcomputer.com/news/security/2k-game-support-hacked-to-email-redline-info-stealing-malware/">https://www.bleepingcomputer.com/news/security/2k-game-support-hacked-to-email-redline-info-stealing-malware/</a></p><p>Follow-up article from Bleeping Computer: <a href="https://www.bleepingcomputer.com/news/security/2k-games-warns-users-their-stolen-data-is-now-up-for-sale-online/">https://www.bleepingcomputer.com/news/security/2k-games-warns-users-their-stolen-data-is-now-up-for-sale-online/</a></p><p>2k tweet on the breach: <a href="https://twitter.com/2KSupport/status/1572320721333796865">https://twitter.com/2KSupport/status/1572320721333796865</a></p><p>2k FAQ regarding the incident: <a href="https://2k.com/playerinfo/">https://2k.com/playerinfo/</a></p><p>RedLine malware overview: <a href="https://blog.avast.com/redline-stealer-malware">https://blog.avast.com/redline-stealer-malware</a></p><p>Recommended password manager, 1Password: <a href="https://1password.com">https://1password.com</a></p><hr><div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/rootedsecurity_14_thumb.jpg?v=1665788548113" alt="Podcast: Breach Notification - 2k, episode 14" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/rootedsecurity_14.mp3" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 14</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">19:05</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href="https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000582702284"><img src="https://rootedsecurity.blog/content/images/2022/10/US_UK_Apple_Podcasts_Listen_Badge_RGB-13.svg" class="kg-image" alt="Podcast: Breach Notification - 2k, episode 14" loading="lazy" width="164" height="40"></a></figure>]]></content:encoded></item><item><title><![CDATA[Podcast: Dip Your Toes - Vulnerabilities and Exploits, episode 13]]></title><description><![CDATA[Another security patch?! Make it stop! Sadly, it won't stop. Today, we are going to dip our toes into vulnerabilities, exploits, and zero-days! What does all of this mean and why should you care? Well, you will need to listen to find out!]]></description><link>https://rootedsecurity.blog/podcast-dip-your-toes-vulnerabilities-and-exploits-episode-113/</link><guid isPermaLink="false">6348c8019bb8f625966a5cbb</guid><category><![CDATA[podcasts]]></category><category><![CDATA[cybersecurityawareness]]></category><category><![CDATA[dipyourtoes]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Fri, 14 Oct 2022 02:49:12 GMT</pubDate><media:content url="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-11.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-11.jpg" alt="Podcast: Dip Your Toes - Vulnerabilities and Exploits, episode 13"><p>Another security patch?! Make it stop! Sadly, it won&apos;t stop. Today, we are going to dip our toes into vulnerabilities, exploits, and zero-days! What does all of this mean and why should you care? Well, you will need to listen to find out!</p><hr><p><strong>Links of interest</strong></p><p>Grace Hopper Bio: <a href="https://president.yale.edu/biography-grace-murray-hopper">https://president.yale.edu/biography-grace-murray-hopper</a></p><p>More information on vulnerabilities and exploits: <a href="https://www.rapid7.com/fundamentals/vulnerabilities-exploits-threats/">https://www.rapid7.com/fundamentals/vulnerabilities-exploits-threats/</a></p><p>Lists of exploits from CISA: <a href="https://www.cisa.gov/known-exploited-vulnerabilities-catalog">https://www.cisa.gov/known-exploited-vulnerabilities-catalog</a></p><p>&quot;First&quot; computer bug! <a href="https://education.nationalgeographic.org/resource/worlds-first-computer-bug">https://education.nationalgeographic.org/resource/worlds-first-computer-bug</a></p><hr><div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/rootedsecurity_113_thumb.jpg?v=1665715283185" alt="Podcast: Dip Your Toes - Vulnerabilities and Exploits, episode 13" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/rootedsecurity_113.mp3" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 13</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">14:42</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href="https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000582602922"><img src="https://rootedsecurity.blog/content/images/2022/10/US_UK_Apple_Podcasts_Listen_Badge_RGB-12.svg" class="kg-image" alt="Podcast: Dip Your Toes - Vulnerabilities and Exploits, episode 13" loading="lazy" width="164" height="40"></a></figure>]]></content:encoded></item><item><title><![CDATA[Podcast: Cybersecurity Discipline - Incident Response, episode 12]]></title><description><![CDATA[We are touching on another Cybersecurity Discipline today! Incident Response!]]></description><link>https://rootedsecurity.blog/podcast-cybersecurity-discipline-incident-response-episode-112/</link><guid isPermaLink="false">63477cae9bb8f625966a5c98</guid><category><![CDATA[podcasts]]></category><category><![CDATA[cybersecurityawareness]]></category><category><![CDATA[cybersecuritydiscipline]]></category><dc:creator><![CDATA[Mike Kizerian]]></dc:creator><pubDate>Thu, 13 Oct 2022 03:46:38 GMT</pubDate><media:content url="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-10.jpg" medium="image"/><content:encoded><![CDATA[<img src="https://rootedsecurity.blog/content/images/2022/10/will-francis-ZDNyhmgkZlQ-unsplash-10.jpg" alt="Podcast: Cybersecurity Discipline - Incident Response, episode 12"><p>We are touching on another Cybersecurity Discipline today! Incident Response!</p><p>Red Alert! An alert hits, stating that some &quot;big bad thing&quot; has occurred! It is your job to figure out what happened, when it happened, and what the impact is to the business. Oh - and you need to make sure that the &quot;bad guy&quot; is out of the network and can&apos;t get back in again!</p><p>Does that sound like fun? If so, jump in!</p><hr><p><strong>Links of interest</strong></p><p>Definition: <a href="https://www.techtarget.com/searchsecurity/definition/incident-response">https://www.techtarget.com/searchsecurity/definition/incident-response</a></p><p>Trend Micro History of Incident Response: <a href="https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/historical-overview-of-proactive-incident-response-strategies-and-what-they-mean-to-enterprises">https://www.trendmicro.com/vinfo/us/security/news/cybercrime-and-digital-threats/historical-overview-of-proactive-incident-response-strategies-and-what-they-mean-to-enterprises</a></p><hr><div class="kg-card kg-audio-card"><img src="https://rootedsecurity.blog/content/media/2022/10/rootedsecurity_112_thumb.jpg?v=1665630337291" alt="Podcast: Cybersecurity Discipline - Incident Response, episode 12" class="kg-audio-thumbnail"><div class="kg-audio-thumbnail placeholder kg-audio-hide"><svg width="24" height="24" fill="none" xmlns="http://www.w3.org/2000/svg"><path fill-rule="evenodd" clip-rule="evenodd" d="M7.5 15.33a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0ZM15 13.83a.75.75 0 1 0 0 1.5.75.75 0 0 0 0-1.5Zm-2.25.75a2.25 2.25 0 1 1 4.5 0 2.25 2.25 0 0 1-4.5 0Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M14.486 6.81A2.25 2.25 0 0 1 17.25 9v5.579a.75.75 0 0 1-1.5 0v-5.58a.75.75 0 0 0-.932-.727.755.755 0 0 1-.059.013l-4.465.744a.75.75 0 0 0-.544.72v6.33a.75.75 0 0 1-1.5 0v-6.33a2.25 2.25 0 0 1 1.763-2.194l4.473-.746Z"/><path fill-rule="evenodd" clip-rule="evenodd" d="M3 1.5a.75.75 0 0 0-.75.75v19.5a.75.75 0 0 0 .75.75h18a.75.75 0 0 0 .75-.75V5.133a.75.75 0 0 0-.225-.535l-.002-.002-3-2.883A.75.75 0 0 0 18 1.5H3ZM1.409.659A2.25 2.25 0 0 1 3 0h15a2.25 2.25 0 0 1 1.568.637l.003.002 3 2.883a2.25 2.25 0 0 1 .679 1.61V21.75A2.25 2.25 0 0 1 21 24H3a2.25 2.25 0 0 1-2.25-2.25V2.25c0-.597.237-1.169.659-1.591Z"/></svg></div><div class="kg-audio-player-container"><audio src="https://rootedsecurity.blog/content/media/2022/10/rootedsecurity_112.mp3" preload="metadata"></audio><div class="kg-audio-title">RootEd Security, episode 12</div><div class="kg-audio-player"><button class="kg-audio-play-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M23.14 10.608 2.253.164A1.559 1.559 0 0 0 0 1.557v20.887a1.558 1.558 0 0 0 2.253 1.392L23.14 13.393a1.557 1.557 0 0 0 0-2.785Z"/></svg></button><button class="kg-audio-pause-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><rect x="3" y="1" width="7" height="22" rx="1.5" ry="1.5"/><rect x="14" y="1" width="7" height="22" rx="1.5" ry="1.5"/></svg></button><span class="kg-audio-current-time">0:00</span><div class="kg-audio-time">/<span class="kg-audio-duration">33:00</span></div><input type="range" class="kg-audio-seek-slider" max="100" value="0"><button class="kg-audio-playback-rate">1&#xD7;</button><button class="kg-audio-unmute-icon"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M15.189 2.021a9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h1.794a.249.249 0 0 1 .221.133 9.73 9.73 0 0 0 7.924 4.85h.06a1 1 0 0 0 1-1V3.02a1 1 0 0 0-1.06-.998Z"/></svg></button><button class="kg-audio-mute-icon kg-audio-hide"><svg xmlns="http://www.w3.org/2000/svg" viewbox="0 0 24 24"><path d="M16.177 4.3a.248.248 0 0 0 .073-.176v-1.1a1 1 0 0 0-1.061-1 9.728 9.728 0 0 0-7.924 4.85.249.249 0 0 1-.221.133H5.25a3 3 0 0 0-3 3v2a3 3 0 0 0 3 3h.114a.251.251 0 0 0 .177-.073ZM23.707 1.706A1 1 0 0 0 22.293.292l-22 22a1 1 0 0 0 0 1.414l.009.009a1 1 0 0 0 1.405-.009l6.63-6.631A.251.251 0 0 1 8.515 17a.245.245 0 0 1 .177.075 10.081 10.081 0 0 0 6.5 2.92 1 1 0 0 0 1.061-1V9.266a.247.247 0 0 1 .073-.176Z"/></svg></button><input type="range" class="kg-audio-volume-slider" max="100" value="100"></div></div></div><figure class="kg-card kg-image-card"><a href="https://podcasts.apple.com/us/podcast/rooted-security/id1647993833?i=1000582478646"><img src="https://rootedsecurity.blog/content/images/2022/10/US_UK_Apple_Podcasts_Listen_Badge_RGB-11.svg" class="kg-image" alt="Podcast: Cybersecurity Discipline - Incident Response, episode 12" loading="lazy" width="164" height="40"></a></figure>]]></content:encoded></item></channel></rss>