<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; Root</title>
<link>https://blog.intelligencex.org/rss/author/root</link>
<description>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; Root</description>
<dc:language>en</dc:language>
<dc:rights>© 2026 IntelligenceX Blog. All rights reserved.</dc:rights>

<item>
<title>Cloud Reconnaissance: How to Gather Intelligence from Cloud Services</title>
<link>https://blog.intelligencex.org/cloud-reconnaissance-gather-intelligence-from-cloud-services</link>
<guid>https://blog.intelligencex.org/cloud-reconnaissance-gather-intelligence-from-cloud-services</guid>
<description><![CDATA[ Cloud services often expose valuable intelligence through misconfigurations, metadata, and publicly accessible endpoints. This article explains how attackers and OSINT researchers perform cloud reconnaissance to identify assets, services, and potential security risks across major cloud platforms. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6942a30ce3a28.webp" length="62320" type="image/jpeg"/>
<pubDate>Wed, 17 Dec 2025 18:02:47 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords>cloud reconnaissance, cloud osint, cloud security, aws reconnaissance, azure reconnaissance, gcp reconnaissance, cloud asset discovery, cloud misconfiguration, osint cloud services, cloud attack surface</media:keywords>
</item>

<item>
<title>Using OSINT and Reconnaissance to Strengthen Malware Analysis</title>
<link>https://blog.intelligencex.org/osint-reconnaissance-malware-analysis</link>
<guid>https://blog.intelligencex.org/osint-reconnaissance-malware-analysis</guid>
<description><![CDATA[ Discover how cybersecurity analysts leverage OSINT (Open Source Intelligence) and reconnaissance techniques to uncover the story behind malware. Learn how open data, domain research, and threat intelligence transform static malware indicators into actionable insights for defense and attribution. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926bc2d000ba.webp" length="48944" type="image/jpeg"/>
<pubDate>Fri, 07 Nov 2025 02:26:00 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords>OSINT, malware analysis, cyber threat intelligence, reconnaissance, IOC enrichment, malware research, threat hunting, cybersecurity blog, MITRE ATT&amp;CK</media:keywords>
</item>

<item>
<title>&amp;quot;Isn’t OSINT Just Glorified Googling?&amp;quot;</title>
<link>https://blog.intelligencex.org/osint-more-than-googling</link>
<guid>https://blog.intelligencex.org/osint-more-than-googling</guid>
<description><![CDATA[ Many people think OSINT (Open-Source Intelligence) is just “fancy Googling,” but it’s much more than that. OSINT is a structured way of gathering and analyzing information from many sources — not just Google. It covers the surface web, social media, public records, the deep web, and even parts of the dark web. Unlike casual searching, OSINT involves careful verification, spotting patterns, connecting dots, and using advanced tools like Maltego or SpiderFoot. This makes it a powerful method for investigations such as cybercrime, human rights, and war crimes. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e767e7aef81.webp" length="58106" type="image/jpeg"/>
<pubDate>Fri, 29 Aug 2025 17:03:34 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords>“OSINT isn’t just glorified Googling — it uses deep, systematic methods, verification, and advanced tools to uncover intelligence across the surface, deep, and dark web.”</media:keywords>
</item>

<item>
<title>How I Found Multiple Bugs On Dell Technology Using Reconnaissance (OSINT)</title>
<link>https://blog.intelligencex.org/dell-reconnaissance-osint-bug-bounty</link>
<guid>https://blog.intelligencex.org/dell-reconnaissance-osint-bug-bounty</guid>
<description><![CDATA[ A detailed bug bounty write-up on how I discovered multiple vulnerabilities in Dell by leveraging reconnaissance and OSINT techniques. This article explains the methodology, tools, and thought process behind identifying exposed assets, misconfigurations, and sensitive information during recon. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e76474ae174.webp" length="45534" type="image/jpeg"/>
<pubDate>Thu, 28 Aug 2025 17:33:27 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Salesloft OAuth Breach via Drift AI Chat Agent Exposes Salesforce Customer Data</title>
<link>https://blog.intelligencex.org/salesloft-oauth-breach-drift-ai-chat-agent-exposes-salesforce-data</link>
<guid>https://blog.intelligencex.org/salesloft-oauth-breach-drift-ai-chat-agent-exposes-salesforce-data</guid>
<description><![CDATA[ A sophisticated cyberattack leveraging compromised OAuth tokens from the Salesloft Drift AI chat agent has allowed threat actors—tracked as UNC6395—to access numerous Salesforce customer environments. Between August 8 and 18, 2025, they exfiltrated highly sensitive credentials including AWS access keys, passwords, and Snowflake tokens before being cut off by Salesloft and Salesforce. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e65632b38bf.webp" length="43172" type="image/jpeg"/>
<pubDate>Wed, 27 Aug 2025 18:01:46 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords>Salesloft breach, Drift AI chat agent, OAuth tokens, Salesforce data exfiltration, UNC6395, AWS access keys, Snowflake tokens, OAuth compromise, third-party SaaS risk</media:keywords>
</item>

<item>
<title>Critical Wing FTP Server Vulnerability (CVE&#45;2025&#45;47812) Actively Being Exploited in the Wild</title>
<link>https://blog.intelligencex.org/critical-wing-ftp-server-vulnerability-cve-2025-47812-exploited</link>
<guid>https://blog.intelligencex.org/critical-wing-ftp-server-vulnerability-cve-2025-47812-exploited</guid>
<description><![CDATA[ CVE-2025-47812 is a maximum-severity remote code execution vulnerability in Wing FTP Server versions before 7.4.4, allowing unauthenticated attackers to execute arbitrary Lua code via null byte injection—resulting in full system compromise. Actively exploited since early July, this critical flaw underscores the urgent need for patching and monitoring. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e6463d0dbb5.webp" length="10354" type="image/jpeg"/>
<pubDate>Wed, 27 Aug 2025 17:50:47 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords>CVE-2025-47812, Wing FTP Server, remote code execution, RCE, null byte injection, Lua injection, active exploitation, patch now</media:keywords>
</item>

</channel>
</rss>