<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; Mindflare</title>
<link>https://blog.intelligencex.org/rss/author/Mindflare</link>
<description>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; Mindflare</description>
<dc:language>en</dc:language>
<dc:rights>© 2026 IntelligenceX Blog. All rights reserved.</dc:rights>

<item>
<title>System Architecture</title>
<link>https://blog.intelligencex.org/system-architecture</link>
<guid>https://blog.intelligencex.org/system-architecture</guid>
<description><![CDATA[ A clear overview of Windows internal architecture: user mode vs kernel mode, executive services, HAL, hypervisor, subsystem DLLs, and how Windows achieves portability across x86, x64, and ARM. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693013c33c3db.webp" length="23754" type="image/jpeg"/>
<pubDate>Wed, 03 Dec 2025 16:11:53 +0530</pubDate>
<dc:creator>Mindflare</dc:creator>
<media:keywords>Windows architecture, kernel mode, user mode, ntoskrnl.exe, HAL, Win32k.sys, hypervisor, subsystem DLLs, Windows portability, ring 0, ring 3, system calls, NtCreateFile</media:keywords>
</item>

<item>
<title>CVE&#45;2025&#45;61882: Deep Dive into the Oracle E&#45;Business Suite Zero&#45;Day Exploited</title>
<link>https://blog.intelligencex.org/cve-2025-61882-oracle-zero-day-exploit-analysis</link>
<guid>https://blog.intelligencex.org/cve-2025-61882-oracle-zero-day-exploit-analysis</guid>
<description><![CDATA[ Deep dive into CVE-2025-61882: Critical Oracle E-Business Suite zero-day exploited by Cl0p ransomware. Learn the 5-stage attack chain, IOCs, and defense strategies. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68f0891bc77d7.webp" length="33414" type="image/jpeg"/>
<pubDate>Thu, 16 Oct 2025 11:09:32 +0530</pubDate>
<dc:creator>Mindflare</dc:creator>
<media:keywords>CVE-2025-61882  Oracle E-Business Suite vulnerability Oracle EBS zero-day  Cl0p ransomware Oracle EBS RCE</media:keywords>
</item>

<item>
<title>CPU Ring Architecture: Security Implications from Ring 3 to Ring &#45;1</title>
<link>https://blog.intelligencex.org/cpu-privilege-levels-user-kernel-hypervisor-security</link>
<guid>https://blog.intelligencex.org/cpu-privilege-levels-user-kernel-hypervisor-security</guid>
<description><![CDATA[ Explore the fundamental security architecture of modern CPUs through user mode, kernel mode, and hypervisor mode. Learn how attackers exploit privilege boundaries, understand real-world vulnerabilities, and discover practical security implications with hands-on examples and code demonstrations. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202508/image_870x580_68b036f23b55d.jpg" length="82223" type="image/jpeg"/>
<pubDate>Thu, 28 Aug 2025 16:31:15 +0530</pubDate>
<dc:creator>Mindflare</dc:creator>
<media:keywords>CPU privilege levels, user mode, kernel mode, hypervisor mode, ring 0, ring 3, privilege escalation, system security, virtualization security, kernel vulnerabilities, VM escape, CPU rings, operating system security, malware analysis, exploit development</media:keywords>
</item>

<item>
<title>Inside Windows Process Creation: What Really Happens After You Double&#45;Click an EXE</title>
<link>https://blog.intelligencex.org/inside-windows-process-creation</link>
<guid>https://blog.intelligencex.org/inside-windows-process-creation</guid>
<description><![CDATA[ Ever wondered what happens when you double-click an executable in Windows? In this guide, we trace the journey from CreateProcess to running code, exploring how the Windows kernel creates processes, maps memory, loads DLLs, and jumps to your program’s entry point — with hands-on experiments you can try at home. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202508/image_870x580_68af15e14753f.jpg" length="39074" type="image/jpeg"/>
<pubDate>Wed, 27 Aug 2025 21:13:04 +0530</pubDate>
<dc:creator>Mindflare</dc:creator>
<media:keywords>windows internals process creation  CreateProcess explained  NtCreateProcess windows  windows kernel process  process hollowing internals  malware analysis windows process</media:keywords>
</item>

<item>
<title>How Rust Protects Against Memory Leaks and Memory Corruption</title>
<link>https://blog.intelligencex.org/rust-memory-safety-protection</link>
<guid>https://blog.intelligencex.org/rust-memory-safety-protection</guid>
<description><![CDATA[ Rust is redefining systems programming with built-in memory safety guarantees. Learn how Rust’s ownership model, borrow checker, and lifetimes prevent memory leaks, use-after-free, and null pointer dereferences—issues that plague languages like C and C++. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202508/image_870x580_68aefbeacc3bf.jpg" length="88619" type="image/jpeg"/>
<pubDate>Wed, 27 Aug 2025 18:19:36 +0530</pubDate>
<dc:creator>Mindflare</dc:creator>
<media:keywords>Rust memory safety, Rust memory leaks, Rust use after free, Rust vs C++, Rust borrow checker, Rust null pointer safety</media:keywords>
</item>

</channel>
</rss>