<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; : Offensive Security</title>
<link>https://blog.intelligencex.org/rss/category/offensive-security</link>
<description>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; : Offensive Security</description>
<dc:language>en</dc:language>
<dc:rights>© 2026 IntelligenceX Blog. All rights reserved.</dc:rights>

<item>
<title>A08:2025 &#45; Software or Data Integrity Failures: When Trusted Code Becomes a Trojan Horse</title>
<link>https://blog.intelligencex.org/owasp-a08-2025-software-data-integrity-failures-guide</link>
<guid>https://blog.intelligencex.org/owasp-a08-2025-software-data-integrity-failures-guide</guid>
<description><![CDATA[ Software or Data Integrity Failures occur when applications fail to maintain trust boundaries and verify integrity of software updates, serialized data, and critical artifacts within their own environment. Unlike supply chain attacks that compromise upstream dependencies, these failures manifest in how applications handle updates without signature verification, deserialize untrusted data without validation, and trust code from CDNs or external sources without integrity checks. This article examines why these vulnerabilities are particularly dangerous—they rarely cause functional errors, making detection incredibly difficult—explores real-world attacks including the SolarWinds Web Help Desk triple-patch-bypass saga and the groundbreaking 3CX cascading compromise, and provides comprehensive prevention strategies including digital signatures, secure CI/CD pipelines, and runtime verification through Dynamic Application Security Testing. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202602/image_870x580_698044d1cadec.webp" length="47836" type="image/jpeg"/>
<pubDate>Mon, 02 Feb 2026 12:03:37 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>OWASP Top 10 2025, software integrity failures, data integrity, insecure deserialization, CWE-502, unsigned updates, digital signatures, CI/CD security, supply chain security, SolarWinds vulnerability, 3CX attack, runtime verification, DAST, integrity verification, code signing, serialization vulnerabilities, trust boundaries, software updates, build pipeline security</media:keywords>
</item>

<item>
<title>A07:2025 &#45; Authentication Failures: The Identity Crisis Threatening Modern Applications</title>
<link>https://blog.intelligencex.org/owasp-a07-2025-authentication-failures-comprehensive-guide</link>
<guid>https://blog.intelligencex.org/owasp-a07-2025-authentication-failures-comprehensive-guide</guid>
<description><![CDATA[ Authentication failures occur when applications allow attackers to compromise passwords, keys, session tokens, or exploit implementation flaws to assume users&#039; identities. From credential stuffing and brute force attacks to session hijacking and weak password recovery mechanisms, these vulnerabilities enable unauthorized access that bypasses all other security controls. This article provides security professionals and development teams with an in-depth analysis of authentication attack vectors, the emerging threat of hybrid credential stuffing attacks, and the paradigm shift toward passwordless authentication using FIDO2 passkeys that achieve 30% higher sign-in success rates and 73% faster authentication times. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_697b3a1d67064.webp" length="42600" type="image/jpeg"/>
<pubDate>Thu, 29 Jan 2026 16:15:00 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>OWASP Top 10 2025, authentication failures, credential stuffing, password security, multi-factor authentication, MFA, passkeys, FIDO2, passwordless authentication, session management, brute force attacks, identity theft, phishing-resistant authentication, biometric authentication, adaptive MFA, password spray attacks, session hijacking, authentication best practices, hybrid credential stuffing</media:keywords>
</item>

<item>
<title>A06:2025 &#45; Insecure Design: Security Must Be Designed In, Not Bolted On</title>
<link>https://blog.intelligencex.org/owasp-a06-2025-insecure-design-complete-guide</link>
<guid>https://blog.intelligencex.org/owasp-a06-2025-insecure-design-complete-guide</guid>
<description><![CDATA[ Unlike implementation bugs that can be fixed with code changes, insecure design represents missing or ineffective control design at the architectural level. This article provides security professionals, software architects, and development teams with deep insights into business logic vulnerabilities, threat modeling methodologies including STRIDE and PASTA, and the emerging OWASP Business Logic Abuse Top 10 framework launching in 2025. Learn why 90% of online retailers lose money to business logic flaws, how the 2022 Coinbase API vulnerability nearly cost millions, and why automated scanners cannot detect these critical weaknesses. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_6979e5781a2a0.webp" length="41650" type="image/jpeg"/>
<pubDate>Wed, 28 Jan 2026 16:02:11 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>OWASP Top 10 2025, insecure design, secure by design, threat modeling, business logic vulnerabilities, STRIDE methodology, PASTA threat modeling, secure design patterns, architectural security flaws, design phase security, abuse cases, business logic abuse, application architecture security, threat modeling tools, secure SDLC, defense in depth, OWASP business logic top 10, secure development lifecycle, design-level vulnerabilities</media:keywords>
</item>

<item>
<title>A05:2025 &#45; Injection: The Persistent Threat That Continues to Plague Modern Applications</title>
<link>https://blog.intelligencex.org/owasp-a05-2025-injection-vulnerability-guide</link>
<guid>https://blog.intelligencex.org/owasp-a05-2025-injection-vulnerability-guide</guid>
<description><![CDATA[ Despite being a known vulnerability for over 25 years, injection attacks continue to compromise applications worldwide, leading to massive data breaches, financial losses, and system compromises. This in-depth article examines the current state of injection vulnerabilities in 2025, provides detailed technical explanations of attack vectors, showcases recent real-world exploits, and delivers actionable prevention strategies that development teams can implement immediately. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_6971fece4d33a.webp" length="24810" type="image/jpeg"/>
<pubDate>Thu, 22 Jan 2026 16:14:35 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>OWASP, Injection, SQL Injection, XSS, Command Injection, Application Security, Web Security, Secure Coding, Vulnerability Management, Penetration Testing, Security Testing, Input Validation</media:keywords>
</item>

<item>
<title>A04:2025 &#45; Cryptographic Failures: Protecting Your Data in Transit and at Rest</title>
<link>https://blog.intelligencex.org/owasp-a04-2025-cryptographic-failures-guide</link>
<guid>https://blog.intelligencex.org/owasp-a04-2025-cryptographic-failures-guide</guid>
<description><![CDATA[ Understanding and preventing cryptographic failures is essential for protecting sensitive user data, maintaining regulatory compliance, and building trust with your users. This article breaks down the technical aspects of cryptographic vulnerabilities, provides real-world examples, and offers practical implementation guidance for developers and security professionals. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_6970ca2a00c5a.webp" length="24798" type="image/jpeg"/>
<pubDate>Wed, 21 Jan 2026 18:17:11 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>OWASP Top 10 2025, cryptographic failures, data encryption, application security, sensitive data exposure, SSL/TLS, encryption best practices, data protection, security vulnerabilities, cryptography, AES encryption, secure coding, cybersecurity, HTTPS, data security, PKI, key management, secure communications</media:keywords>
</item>

<item>
<title>Software Supply Chain Failures (A03:2025): How One Compromised Dependency Can Destroy Your Organization</title>
<link>https://blog.intelligencex.org/software-supply-chain-failures-owasp-a03-2025-complete-guide</link>
<guid>https://blog.intelligencex.org/software-supply-chain-failures-owasp-a03-2025-complete-guide</guid>
<description><![CDATA[ In-depth analysis of Software Supply Chain Failures covering vulnerable and outdated components, malicious packages, compromised CI/CD pipelines, dependency confusion attacks, real-world breaches including SolarWinds (18K organizations), Bybit ($1.5B theft), and Shai-Hulud worm, with practical SBOM, dependency scanning, and supply chain hardening recommendations. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_696f4fc638780.webp" length="19660" type="image/jpeg"/>
<pubDate>Tue, 20 Jan 2026 15:20:05 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>software supply chain failures, OWASP A03, SolarWinds breach, Log4j vulnerability, vulnerable dependencies, malicious packages, SBOM, dependency scanning, npm security, supply chain security, vendor compromise</media:keywords>
</item>

<item>
<title>Security Misconfiguration (A02:2025): How Incorrect Settings Expose Your Entire Infrastructure</title>
<link>https://blog.intelligencex.org/security-misconfiguration-owasp-a02-2025-complete-guide</link>
<guid>https://blog.intelligencex.org/security-misconfiguration-owasp-a02-2025-complete-guide</guid>
<description><![CDATA[ In-depth analysis of Security Misconfiguration (A02:2025) covering default accounts, unnecessary features, missing security headers, open cloud buckets, verbose error messages, unremoved sample applications, real-world breaches, detection methods, and step-by-step hardening procedures for web applications and cloud services. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_696aa08b0fcf5.webp" length="32292" type="image/jpeg"/>
<pubDate>Sat, 17 Jan 2026 02:03:36 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>security misconfiguration, OWASP A02, default credentials, cloud misconfiguration, open bucket, security headers, configuration hardening, default accounts, vulnerable configurations, infrastructure security</media:keywords>
</item>

<item>
<title>Broken Access Control (A01:2025): The #1 OWASP TOP 10 Vulnerability &#45; Complete Guide</title>
<link>https://blog.intelligencex.org/broken-access-control-owasp-a01-2025-complete-guide</link>
<guid>https://blog.intelligencex.org/broken-access-control-owasp-a01-2025-complete-guide</guid>
<description><![CDATA[ In-depth analysis of Broken Access Control vulnerabilities covering insecure direct object references (IDOR), vertical and horizontal privilege escalation, parameter tampering, URL manipulation attacks, real case studies including Instagram, GitHub, and Optus breaches, testing methodologies, and comprehensive mitigation strategies. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_6969663a70754.webp" length="19824" type="image/jpeg"/>
<pubDate>Fri, 16 Jan 2026 03:42:18 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>broken access control, OWASP A01, IDOR, privilege escalation, authorization bypass, access control vulnerabilities, parameter tampering, URL manipulation, vertical escalation, horizontal escalation</media:keywords>
</item>

<item>
<title>Two&#45;Factor Authentication (2FA): Security Implications, Bypass Techniques, and Defense Strategies</title>
<link>https://blog.intelligencex.org/2fa-bypass-techniques-security-implications-2025</link>
<guid>https://blog.intelligencex.org/2fa-bypass-techniques-security-implications-2025</guid>
<description><![CDATA[ Comprehensive analysis of two-factor authentication vulnerabilities covering SMS OTP interception, phishing-resistant methods, SIM swapping, push notification abuse, MFA fatigue attacks, backup code theft, session hijacking, and implementation flaws with detailed examples and prevention strategies. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_696818b0a9198.webp" length="24302" type="image/jpeg"/>
<pubDate>Thu, 15 Jan 2026 03:59:20 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>2FA bypass, two-factor authentication, MFA vulnerabilities, SMS OTP, authenticator app, phishing, SIM swap, push notification, brute force, security implications</media:keywords>
</item>

<item>
<title>JWT Vulnerabilities: Complete Testing Guide</title>
<link>https://blog.intelligencex.org/jwt-vulnerabilities-testing-guide-2025-algorithm-confusion</link>
<guid>https://blog.intelligencex.org/jwt-vulnerabilities-testing-guide-2025-algorithm-confusion</guid>
<description><![CDATA[ Master JSON Web Token vulnerabilities with complete testing methodology covering algorithm confusion attacks, signature bypass, none algorithm exploitation, key injection, kid parameter attacks, and practical exploitation techniques with real-world examples. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_69602f0351f15.webp" length="23036" type="image/jpeg"/>
<pubDate>Fri, 09 Jan 2026 03:56:42 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>JWT vulnerabilities, algorithm confusion, RS256 to HS256, JWT testing, token forgery, signature bypass, none algorithm, key injection, jku parameter, kid parameter, BOLA, BFLA, JWT security testing, penetration testing</media:keywords>
</item>

<item>
<title>Google Dorking Mastery: From Passive OSINT to Finding Your Next $10,000 Bug Bounty</title>
<link>https://blog.intelligencex.org/google-dorking-bug-bounty-penetration-testing-osint-guide</link>
<guid>https://blog.intelligencex.org/google-dorking-bug-bounty-penetration-testing-osint-guide</guid>
<description><![CDATA[ Master Google dorking from basics to advanced techniques. Learn passive reconnaissance using 100+ search operators, discover exposed credentials and configurations, find hidden admin panels, and locate high-impact vulnerabilities without touching the target server. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_695ec9e33e2e5.webp" length="36940" type="image/jpeg"/>
<pubDate>Thu, 08 Jan 2026 02:33:19 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>Google dorking, Google hacking, OSINT, bug bounty reconnaissance, search operators, inurl, filetype, intitle, site operator, subdomain enumeration, exposed credentials, security testing, penetration testing dorks</media:keywords>
</item>

<item>
<title>Local File Inclusion (LFI) Vulnerabilities: The Tiny Parameter That Exposed Entire Infrastructures</title>
<link>https://blog.intelligencex.org/local-file-inclusion-lfi-vulnerabilities-complete-guide</link>
<guid>https://blog.intelligencex.org/local-file-inclusion-lfi-vulnerabilities-complete-guide</guid>
<description><![CDATA[ Master Local File Inclusion vulnerabilities with real-world case studies, exploitation techniques, bypass methods including PHP wrappers, test cases, detection strategies, and hardened defensive practices to prevent infrastructure exposure. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_695c3ce5dc224.webp" length="26974" type="image/jpeg"/>
<pubDate>Tue, 06 Jan 2026 04:07:08 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>local file inclusion, LFI vulnerability, directory traversal, path traversal, PHP wrappers, file inclusion bypass, web application security, penetration testing, OWASP top 10, vulnerability testing, security assessment</media:keywords>
</item>

<item>
<title>Complete Android Application Penetration Testing: Comprehensive Methodology for Identifying Critical Vulnerabilities</title>
<link>https://blog.intelligencex.org/android-application-penetration-testing-complete-guide-2025</link>
<guid>https://blog.intelligencex.org/android-application-penetration-testing-complete-guide-2025</guid>
<description><![CDATA[ Master Android app penetration testing with complete methodologies covering SSL pinning bypass, root detection evasion, insecure data storage, and advanced exploitation techniques. Includes OWASP MASTG standards, hardware requirements, tools, and practical command-line usage. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69541553affd1.webp" length="27392" type="image/jpeg"/>
<pubDate>Tue, 30 Dec 2025 23:39:40 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>Android penetration testing, Android security testing, SSL pinning bypass, root detection bypass, mobile app security, Frida, JADX, Burp Suite, insecure data storage, OWASP MASTG, MITRE ATT&amp;CK, Android vulnerability testing, mobile security assessment</media:keywords>
</item>

<item>
<title>NoSQL Injection Vulnerabilities: A Complete Testing and Exploitation Guide</title>
<link>https://blog.intelligencex.org/nosql-injection-vulnerabilities-complete-guide</link>
<guid>https://blog.intelligencex.org/nosql-injection-vulnerabilities-complete-guide</guid>
<description><![CDATA[ Master NoSQL injection testing and exploitation techniques. Learn to identify, test, and exploit NoSQL injection vulnerabilities in MongoDB, Redis, and other NoSQL databases with real-world examples and advanced attack strategies. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_694eced4c7cba.webp" length="23370" type="image/jpeg"/>
<pubDate>Fri, 26 Dec 2025 23:37:38 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>NoSQL injection, MongoDB injection, NoSQL security testing, database security, injection vulnerabilities, authentication bypass, NoSQL operators, query injection, web application security, database exploitation, MongoDB security</media:keywords>
</item>

<item>
<title>Cloud Reconnaissance: How to Gather Intelligence from Cloud Services</title>
<link>https://blog.intelligencex.org/cloud-reconnaissance-gather-intelligence-from-cloud-services</link>
<guid>https://blog.intelligencex.org/cloud-reconnaissance-gather-intelligence-from-cloud-services</guid>
<description><![CDATA[ Cloud services often expose valuable intelligence through misconfigurations, metadata, and publicly accessible endpoints. This article explains how attackers and OSINT researchers perform cloud reconnaissance to identify assets, services, and potential security risks across major cloud platforms. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6942a30ce3a28.webp" length="62320" type="image/jpeg"/>
<pubDate>Wed, 17 Dec 2025 18:02:47 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords>cloud reconnaissance, cloud osint, cloud security, aws reconnaissance, azure reconnaissance, gcp reconnaissance, cloud asset discovery, cloud misconfiguration, osint cloud services, cloud attack surface</media:keywords>
</item>

<item>
<title>TALES FROM THE WAF | Attacking Web Application Firewalls From a Real World Perspective</title>
<link>https://blog.intelligencex.org/tales-from-the-waf-attacking-web-application-firewalls-from-a-real-world-perspective</link>
<guid>https://blog.intelligencex.org/tales-from-the-waf-attacking-web-application-firewalls-from-a-real-world-perspective</guid>
<description><![CDATA[ In this article we are going to shed some light on what WAFs are, how they work and how hackers actually bypass them. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_694103fcd70a9.webp" length="88478" type="image/jpeg"/>
<pubDate>Tue, 16 Dec 2025 12:33:15 +0530</pubDate>
<dc:creator>flatline</dc:creator>
<media:keywords>Web Application Firewall, WAF, WAF Bypass, Hacking, Offensive Security, Payloads, Penetration Testing</media:keywords>
</item>

<item>
<title>0&#45;Day Hunting Guide: Recon Techniques Nobody Talks About</title>
<link>https://blog.intelligencex.org/zero-day-hunting-advanced-recon-techniques-2025</link>
<guid>https://blog.intelligencex.org/zero-day-hunting-advanced-recon-techniques-2025</guid>
<description><![CDATA[ Master zero-day vulnerability hunting through advanced reconnaissance techniques that elite bug bounty hunters use but rarely share: JavaScript mining, ASN enumeration, cloud bucket discovery, GitHub secret scanning, and behavioral anomaly detection, the underground methods separating the top 1% from everyone else. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693b4c10f0d7f.webp" length="24268" type="image/jpeg"/>
<pubDate>Fri, 12 Dec 2025 04:26:31 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>zero-day hunting, advanced recon techniques, bug bounty recon, JavaScript endpoint discovery, ASN enumeration, cloud bucket hunting, GitHub secrets, behavioral detection, OSINT techniques, vulnerability discovery</media:keywords>
</item>

<item>
<title>React2Shell Ultimate &#45; The First Autonomous Scanner for Next.js RSC RCE (CVE&#45;2025&#45;66478)</title>
<link>https://blog.intelligencex.org/react2shell-ultimate-nextjs-rce-scanner-cve-2025-66478</link>
<guid>https://blog.intelligencex.org/react2shell-ultimate-nextjs-rce-scanner-cve-2025-66478</guid>
<description><![CDATA[ React2Shell Ultimate is a red-team-grade scanner built to detect and validate the critical Next.js React Server Components remote code execution vulnerability (CVE-2025-66478). This article breaks down how the exploit works, how the tool operates, and why it matters for engineering, DevSecOps, and offensive security teams. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69346563e06f3.webp" length="51678" type="image/jpeg"/>
<pubDate>Sat, 06 Dec 2025 22:49:08 +0530</pubDate>
<dc:creator>Jack Barlow</dc:creator>
<media:keywords>Next.js, React, RCE, CVE-2025-66478, Offensive Security, Red Team Tools, RSC Vulnerability, JS Security, Scanners</media:keywords>
</item>

<item>
<title>Using OSINT and Reconnaissance to Strengthen Malware Analysis</title>
<link>https://blog.intelligencex.org/osint-reconnaissance-malware-analysis</link>
<guid>https://blog.intelligencex.org/osint-reconnaissance-malware-analysis</guid>
<description><![CDATA[ Discover how cybersecurity analysts leverage OSINT (Open Source Intelligence) and reconnaissance techniques to uncover the story behind malware. Learn how open data, domain research, and threat intelligence transform static malware indicators into actionable insights for defense and attribution. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926bc2d000ba.webp" length="48944" type="image/jpeg"/>
<pubDate>Fri, 07 Nov 2025 02:26:00 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords>OSINT, malware analysis, cyber threat intelligence, reconnaissance, IOC enrichment, malware research, threat hunting, cybersecurity blog, MITRE ATT&amp;CK</media:keywords>
</item>

<item>
<title>OAuth Misconfiguration Vulnerabilities: The Silent Killer of Modern Authentication Systems</title>
<link>https://blog.intelligencex.org/oauth-misconfiguration-vulnerabilities-attacks-prevention-guide</link>
<guid>https://blog.intelligencex.org/oauth-misconfiguration-vulnerabilities-attacks-prevention-guide</guid>
<description><![CDATA[ A comprehensive guide to OAuth misconfiguration vulnerabilities covering OAuth fundamentals, common implementation flaws, real-world attack vectors including redirect URI manipulation, state parameter bypasses, and token leakage, with practical prevention strategies for developers and security professionals. Complete guide to OAuth security vulnerabilities and misconfigurations. Learn OAuth 2.0 fundamentals, common attack vectors like redirect URI manipulation, authorization code interception, CSRF attacks, and PKCE bypasses with real-world examples and prevention strategies. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926be9b671b7.webp" length="20448" type="image/jpeg"/>
<pubDate>Fri, 07 Nov 2025 02:22:27 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>OAuth misconfiguration, OAuth 2.0 security, redirect URI vulnerability, authorization code interception, OAuth CSRF attack, PKCE bypass, implicit flow vulnerabilities, OAuth token leakage, authentication security, API security</media:keywords>
</item>

<item>
<title>&amp;quot;Isn’t OSINT Just Glorified Googling?&amp;quot;</title>
<link>https://blog.intelligencex.org/osint-more-than-googling</link>
<guid>https://blog.intelligencex.org/osint-more-than-googling</guid>
<description><![CDATA[ Many people think OSINT (Open-Source Intelligence) is just “fancy Googling,” but it’s much more than that. OSINT is a structured way of gathering and analyzing information from many sources — not just Google. It covers the surface web, social media, public records, the deep web, and even parts of the dark web. Unlike casual searching, OSINT involves careful verification, spotting patterns, connecting dots, and using advanced tools like Maltego or SpiderFoot. This makes it a powerful method for investigations such as cybercrime, human rights, and war crimes. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e767e7aef81.webp" length="58106" type="image/jpeg"/>
<pubDate>Fri, 29 Aug 2025 17:03:34 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords>“OSINT isn’t just glorified Googling — it uses deep, systematic methods, verification, and advanced tools to uncover intelligence across the surface, deep, and dark web.”</media:keywords>
</item>

<item>
<title>How I Found Multiple Bugs On Dell Technology Using Reconnaissance (OSINT)</title>
<link>https://blog.intelligencex.org/dell-reconnaissance-osint-bug-bounty</link>
<guid>https://blog.intelligencex.org/dell-reconnaissance-osint-bug-bounty</guid>
<description><![CDATA[ A detailed bug bounty write-up on how I discovered multiple vulnerabilities in Dell by leveraging reconnaissance and OSINT techniques. This article explains the methodology, tools, and thought process behind identifying exposed assets, misconfigurations, and sensitive information during recon. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e76474ae174.webp" length="45534" type="image/jpeg"/>
<pubDate>Thu, 28 Aug 2025 17:33:27 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords></media:keywords>
</item>

</channel>
</rss>