<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; : Security Research &amp;amp; Analysis</title>
<link>https://blog.intelligencex.org/rss/category/security-research-analysis</link>
<description>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; : Security Research &amp;amp; Analysis</description>
<dc:language>en</dc:language>
<dc:rights>© 2026 IntelligenceX Blog. All rights reserved.</dc:rights>

<item>
<title>OWASP Top 10 2025 Complete Guide</title>
<link>https://blog.intelligencex.org/owasp-top-10-2025-vulnerabilities-complete-beginner-guide</link>
<guid>https://blog.intelligencex.org/owasp-top-10-2025-vulnerabilities-complete-beginner-guide</guid>
<description><![CDATA[ Comprehensive but easy-to-understand guide to all 10 OWASP Top 10 2025 vulnerabilities including Broken Access Control, Security Misconfiguration, Software Supply Chain Failures, Cryptographic Failures, Injection, Insecure Design, Authentication Failures, Data Integrity, Security Logging, and Exceptional Conditions with prevention steps. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_69618cf31d66f.webp" length="26768" type="image/jpeg"/>
<pubDate>Sat, 10 Jan 2026 04:49:38 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>OWASP Top 10 2025, web application vulnerabilities, security vulnerabilities explained, access control, SQL injection, authentication, cryptography, beginners guide, web security, application security</media:keywords>
</item>

<item>
<title>Fake WhatsApp API and Crypto Libraries Exposed</title>
<link>https://blog.intelligencex.org/fake-whatsapp-api-crypto-libraries-exposed</link>
<guid>https://blog.intelligencex.org/fake-whatsapp-api-crypto-libraries-exposed</guid>
<description><![CDATA[ Fake WhatsApp APIs and malicious crypto libraries are being used by attackers to steal sensitive data, API keys, and credentials. This article explains how these threats work, real-world risks, and how developers and organizations can protect themselves from supply-chain attacks. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_694a79ab22da6.webp" length="39890" type="image/jpeg"/>
<pubDate>Tue, 23 Dec 2025 16:52:03 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>Is Your Phone Really Safe?  The Uncomfortable Truth Nobody&amp;apos;s Telling You</title>
<link>https://blog.intelligencex.org/is-your-phone-really-safe-the-uncomfortable-truth-nobodys-telling-you</link>
<guid>https://blog.intelligencex.org/is-your-phone-really-safe-the-uncomfortable-truth-nobodys-telling-you</guid>
<description><![CDATA[ In this blog we are really going to dive deep into Mobile Security. Uncover what the companies won&#039;t actually tell you. It might sound a bit scary but it is what it is. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693f9fbe1ebfa.webp" length="59944" type="image/jpeg"/>
<pubDate>Mon, 15 Dec 2025 11:08:43 +0530</pubDate>
<dc:creator>flatline</dc:creator>
<media:keywords>Cybersecurity, Smartphones, Apple, Android, iOS, Graphene OS, Mobile Security, IoT, Research, Malware, Spyware, Pegasus, Truth</media:keywords>
</item>

<item>
<title>North Korea&#45;Linked Hackers Exploit React2Shell to Deploy New EtherRAT Malware</title>
<link>https://blog.intelligencex.org/north-korea-etherrat-react2shell-exploit</link>
<guid>https://blog.intelligencex.org/north-korea-etherrat-react2shell-exploit</guid>
<description><![CDATA[ North Korea-linked threat actors are exploiting the critical React2Shell vulnerability (CVE-2025-55182) in React Server Components to deploy a newly identified remote access trojan dubbed EtherRAT. EtherRAT stands out for using Ethereum smart contracts for command-and-control, deploying five independent Linux persistence mechanisms, and even pulling its own Node.js runtime from the official distribution site to remain portable and stealthy across targets. The activity is closely tied to the long-running “Contagious Interview” campaign, which targets Web3 and blockchain developers through fake job offers on platforms like LinkedIn, Upwork, and Fiverr, and now adds React2Shell exploitation and JavaScript-centric tooling to its arsenal. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6939e11e708ac.webp" length="16304" type="image/jpeg"/>
<pubDate>Thu, 11 Dec 2025 02:39:37 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>EtherRAT, React2Shell, CVE-2025-55182, North Korea-linked threat actors, DPRK malware, Ethereum C2, EtherHiding, Contagious Interview campaign, malicious npm packages, Web3 developer targeting, React Server Components RCE, Next.js vulnerability</media:keywords>
</item>

<item>
<title>Modern Cryptography, Part II &#45; Rise of Quantum Computers Pose Threat to Data Safety</title>
<link>https://blog.intelligencex.org/modern-cryptography-part-ii-rise-of-quantum-computers-pose-threat-to-data-safety</link>
<guid>https://blog.intelligencex.org/modern-cryptography-part-ii-rise-of-quantum-computers-pose-threat-to-data-safety</guid>
<description><![CDATA[ Quantum computers are set to break the encryption protecting today’s digital world. The previous part explained how current cryptography works and in this blog we&#039;ll know why quantum computing threatens it, and how quantum-resistant algorithms like Kyber and Dilithium are shaping the future of secure communication. A simple, clear guide to the next big shift in cybersecurity. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6936ca2cc2af8.webp" length="39002" type="image/jpeg"/>
<pubDate>Mon, 08 Dec 2025 18:13:31 +0530</pubDate>
<dc:creator>flatline</dc:creator>
<media:keywords>Quantum Computing, Cryptography, Cybersecurity, Encryption, Security, Research</media:keywords>
</item>

<item>
<title>Modern Cryptography, Part I</title>
<link>https://blog.intelligencex.org/modern-cryptography-part-i</link>
<guid>https://blog.intelligencex.org/modern-cryptography-part-i</guid>
<description><![CDATA[ This article portrays the importance of Cryptographic Algorithms and how the modern age digital eco-systems are being protected. Understanding what algorithms are being used now and what&#039;s about to happen in near future. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6936609780462.webp" length="37598" type="image/jpeg"/>
<pubDate>Thu, 04 Dec 2025 15:34:26 +0530</pubDate>
<dc:creator>flatline</dc:creator>
<media:keywords>Cryptography, Cybersecurity, Encryption, Security</media:keywords>
</item>

<item>
<title>System Architecture</title>
<link>https://blog.intelligencex.org/system-architecture</link>
<guid>https://blog.intelligencex.org/system-architecture</guid>
<description><![CDATA[ A clear overview of Windows internal architecture: user mode vs kernel mode, executive services, HAL, hypervisor, subsystem DLLs, and how Windows achieves portability across x86, x64, and ARM. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693013c33c3db.webp" length="23754" type="image/jpeg"/>
<pubDate>Wed, 03 Dec 2025 16:11:53 +0530</pubDate>
<dc:creator>Mindflare</dc:creator>
<media:keywords>Windows architecture, kernel mode, user mode, ntoskrnl.exe, HAL, Win32k.sys, hypervisor, subsystem DLLs, Windows portability, ring 0, ring 3, system calls, NtCreateFile</media:keywords>
</item>

<item>
<title>Zero Trust Architecture: Stop Assuming, Start Verifying Everything</title>
<link>https://blog.intelligencex.org/zero-trust-architecture-stop-assuming-start-verifying-everything</link>
<guid>https://blog.intelligencex.org/zero-trust-architecture-stop-assuming-start-verifying-everything</guid>
<description><![CDATA[ Explore the essentials of Zero Trust Architecture in this in-depth guide. Learn why organizations must stop assuming trust and start verifying every user, device, and access request. Discover the key principles, practical benefits, and step-by-step strategies for implementing a zero trust security model that reduces cyber risk, supports remote work, and protects sensitive assets in today’s evolving cyber threat landscape. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6915c49fca515.webp" length="18220" type="image/jpeg"/>
<pubDate>Thu, 13 Nov 2025 18:19:45 +0530</pubDate>
<dc:creator>noddy</dc:creator>
<media:keywords></media:keywords>
</item>

<item>
<title>CVE&#45;2025&#45;61882: Deep Dive into the Oracle E&#45;Business Suite Zero&#45;Day Exploited</title>
<link>https://blog.intelligencex.org/cve-2025-61882-oracle-zero-day-exploit-analysis</link>
<guid>https://blog.intelligencex.org/cve-2025-61882-oracle-zero-day-exploit-analysis</guid>
<description><![CDATA[ Deep dive into CVE-2025-61882: Critical Oracle E-Business Suite zero-day exploited by Cl0p ransomware. Learn the 5-stage attack chain, IOCs, and defense strategies. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68f0891bc77d7.webp" length="33414" type="image/jpeg"/>
<pubDate>Thu, 16 Oct 2025 11:09:32 +0530</pubDate>
<dc:creator>Mindflare</dc:creator>
<media:keywords>CVE-2025-61882  Oracle E-Business Suite vulnerability Oracle EBS zero-day  Cl0p ransomware Oracle EBS RCE</media:keywords>
</item>

<item>
<title>CPU Ring Architecture: Security Implications from Ring 3 to Ring &#45;1</title>
<link>https://blog.intelligencex.org/cpu-privilege-levels-user-kernel-hypervisor-security</link>
<guid>https://blog.intelligencex.org/cpu-privilege-levels-user-kernel-hypervisor-security</guid>
<description><![CDATA[ Explore the fundamental security architecture of modern CPUs through user mode, kernel mode, and hypervisor mode. Learn how attackers exploit privilege boundaries, understand real-world vulnerabilities, and discover practical security implications with hands-on examples and code demonstrations. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202508/image_870x580_68b036f23b55d.jpg" length="82223" type="image/jpeg"/>
<pubDate>Thu, 28 Aug 2025 16:31:15 +0530</pubDate>
<dc:creator>Mindflare</dc:creator>
<media:keywords>CPU privilege levels, user mode, kernel mode, hypervisor mode, ring 0, ring 3, privilege escalation, system security, virtualization security, kernel vulnerabilities, VM escape, CPU rings, operating system security, malware analysis, exploit development</media:keywords>
</item>

<item>
<title>Inside Windows Process Creation: What Really Happens After You Double&#45;Click an EXE</title>
<link>https://blog.intelligencex.org/inside-windows-process-creation</link>
<guid>https://blog.intelligencex.org/inside-windows-process-creation</guid>
<description><![CDATA[ Ever wondered what happens when you double-click an executable in Windows? In this guide, we trace the journey from CreateProcess to running code, exploring how the Windows kernel creates processes, maps memory, loads DLLs, and jumps to your program’s entry point — with hands-on experiments you can try at home. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202508/image_870x580_68af15e14753f.jpg" length="39074" type="image/jpeg"/>
<pubDate>Wed, 27 Aug 2025 21:13:04 +0530</pubDate>
<dc:creator>Mindflare</dc:creator>
<media:keywords>windows internals process creation  CreateProcess explained  NtCreateProcess windows  windows kernel process  process hollowing internals  malware analysis windows process</media:keywords>
</item>

<item>
<title>How Rust Protects Against Memory Leaks and Memory Corruption</title>
<link>https://blog.intelligencex.org/rust-memory-safety-protection</link>
<guid>https://blog.intelligencex.org/rust-memory-safety-protection</guid>
<description><![CDATA[ Rust is redefining systems programming with built-in memory safety guarantees. Learn how Rust’s ownership model, borrow checker, and lifetimes prevent memory leaks, use-after-free, and null pointer dereferences—issues that plague languages like C and C++. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202508/image_870x580_68aefbeacc3bf.jpg" length="88619" type="image/jpeg"/>
<pubDate>Wed, 27 Aug 2025 18:19:36 +0530</pubDate>
<dc:creator>Mindflare</dc:creator>
<media:keywords>Rust memory safety, Rust memory leaks, Rust use after free, Rust vs C++, Rust borrow checker, Rust null pointer safety</media:keywords>
</item>

</channel>
</rss>