<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; flatline</title>
<link>https://blog.intelligencex.org/rss/author/flatline</link>
<description>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; flatline</description>
<dc:language>en</dc:language>
<dc:rights>© 2026 IntelligenceX Blog. All rights reserved.</dc:rights>

<item>
<title>TALES FROM THE WAF | Attacking Web Application Firewalls From a Real World Perspective</title>
<link>https://blog.intelligencex.org/tales-from-the-waf-attacking-web-application-firewalls-from-a-real-world-perspective</link>
<guid>https://blog.intelligencex.org/tales-from-the-waf-attacking-web-application-firewalls-from-a-real-world-perspective</guid>
<description><![CDATA[ In this article we are going to shed some light on what WAFs are, how they work and how hackers actually bypass them. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_694103fcd70a9.webp" length="88478" type="image/jpeg"/>
<pubDate>Tue, 16 Dec 2025 12:33:15 +0530</pubDate>
<dc:creator>flatline</dc:creator>
<media:keywords>Web Application Firewall, WAF, WAF Bypass, Hacking, Offensive Security, Payloads, Penetration Testing</media:keywords>
</item>

<item>
<title>Is Your Phone Really Safe?  The Uncomfortable Truth Nobody&amp;apos;s Telling You</title>
<link>https://blog.intelligencex.org/is-your-phone-really-safe-the-uncomfortable-truth-nobodys-telling-you</link>
<guid>https://blog.intelligencex.org/is-your-phone-really-safe-the-uncomfortable-truth-nobodys-telling-you</guid>
<description><![CDATA[ In this blog we are really going to dive deep into Mobile Security. Uncover what the companies won&#039;t actually tell you. It might sound a bit scary but it is what it is. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693f9fbe1ebfa.webp" length="59944" type="image/jpeg"/>
<pubDate>Mon, 15 Dec 2025 11:08:43 +0530</pubDate>
<dc:creator>flatline</dc:creator>
<media:keywords>Cybersecurity, Smartphones, Apple, Android, iOS, Graphene OS, Mobile Security, IoT, Research, Malware, Spyware, Pegasus, Truth</media:keywords>
</item>

<item>
<title>Model Context Protocol (MCP): A hands on guide</title>
<link>https://blog.intelligencex.org/model-context-protocol-mcp-a-hands-on-guide</link>
<guid>https://blog.intelligencex.org/model-context-protocol-mcp-a-hands-on-guide</guid>
<description><![CDATA[ This is a hands on guide to get started creating your own AI-Agents, who work on your command. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693bcedc0c7b9.webp" length="63412" type="image/jpeg"/>
<pubDate>Thu, 11 Dec 2025 16:23:59 +0530</pubDate>
<dc:creator>flatline</dc:creator>
<media:keywords>Artificial Intelligence, MCP, Model Context Protocol, Agentic AI, Automation, Cybersecurity, Research, Analysis, AI Agents, Complex Tasks</media:keywords>
</item>

<item>
<title>Agentic AI: From LLMs to Autonomous Agents with MCP and Docker</title>
<link>https://blog.intelligencex.org/agentic-ai-from-llms-to-autonomous-agents-with-mcp-and-docker</link>
<guid>https://blog.intelligencex.org/agentic-ai-from-llms-to-autonomous-agents-with-mcp-and-docker</guid>
<description><![CDATA[ This blog explains how AI models are no able to use tools and automate tasks which seemed impossible a couple of years ago. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69391f1b10581.webp" length="66364" type="image/jpeg"/>
<pubDate>Wed, 10 Dec 2025 12:50:07 +0530</pubDate>
<dc:creator>flatline</dc:creator>
<media:keywords>Artificial Intelligence, MCP, Model Context Protocol, Agentic AI, Automation, Cybersecurity, Research, Analysis</media:keywords>
</item>

<item>
<title>Modern Cryptography, Part II &#45; Rise of Quantum Computers Pose Threat to Data Safety</title>
<link>https://blog.intelligencex.org/modern-cryptography-part-ii-rise-of-quantum-computers-pose-threat-to-data-safety</link>
<guid>https://blog.intelligencex.org/modern-cryptography-part-ii-rise-of-quantum-computers-pose-threat-to-data-safety</guid>
<description><![CDATA[ Quantum computers are set to break the encryption protecting today’s digital world. The previous part explained how current cryptography works and in this blog we&#039;ll know why quantum computing threatens it, and how quantum-resistant algorithms like Kyber and Dilithium are shaping the future of secure communication. A simple, clear guide to the next big shift in cybersecurity. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6936ca2cc2af8.webp" length="39002" type="image/jpeg"/>
<pubDate>Mon, 08 Dec 2025 18:13:31 +0530</pubDate>
<dc:creator>flatline</dc:creator>
<media:keywords>Quantum Computing, Cryptography, Cybersecurity, Encryption, Security, Research</media:keywords>
</item>

<item>
<title>Modern Cryptography, Part I</title>
<link>https://blog.intelligencex.org/modern-cryptography-part-i</link>
<guid>https://blog.intelligencex.org/modern-cryptography-part-i</guid>
<description><![CDATA[ This article portrays the importance of Cryptographic Algorithms and how the modern age digital eco-systems are being protected. Understanding what algorithms are being used now and what&#039;s about to happen in near future. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6936609780462.webp" length="37598" type="image/jpeg"/>
<pubDate>Thu, 04 Dec 2025 15:34:26 +0530</pubDate>
<dc:creator>flatline</dc:creator>
<media:keywords>Cryptography, Cybersecurity, Encryption, Security</media:keywords>
</item>

</channel>
</rss>