<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Isaac's cool blog website</title><link>https://iw-sec.github.io/</link><description>Recent content on Isaac's cool blog website</description><generator>Hugo -- 0.147.2</generator><language>en-us</language><lastBuildDate>Sun, 15 Jun 2025 00:00:00 +0000</lastBuildDate><atom:link href="https://iw-sec.github.io/index.xml" rel="self" type="application/rss+xml"/><item><title>T-Pot Honeypot on Azure</title><link>https://iw-sec.github.io/posts/azure-tpot/</link><pubDate>Sun, 15 Jun 2025 00:00:00 +0000</pubDate><guid>https://iw-sec.github.io/posts/azure-tpot/</guid><description>A guide for deploying Telekom&amp;rsquo;s awesome multi-honeypot T-Pot on Azure.</description></item><item><title>Malware Campaign Exploits Microsoft Dev Tunnels</title><link>https://iw-sec.github.io/posts/devtunnels-advisory/</link><pubDate>Fri, 28 Mar 2025 00:00:00 +0000</pubDate><guid>https://iw-sec.github.io/posts/devtunnels-advisory/</guid><description>Activity surrounding a new malware campaign&amp;rsquo;s use of the Microsoft&amp;rsquo;s Dev tunnels service and the implications it has on the evolving threat landscape.</description></item><item><title>SparkRAT: A Multi-Platform Remote Access Tool</title><link>https://iw-sec.github.io/posts/sparkrat-advisory/</link><pubDate>Mon, 03 Feb 2025 00:00:00 +0000</pubDate><guid>https://iw-sec.github.io/posts/sparkrat-advisory/</guid><description>A brief analysis of the tool and its resurgence in a recent North Korean espionage campaign targeting macOS devices and government officials.</description></item><item><title>First Post</title><link>https://iw-sec.github.io/posts/first-post/</link><pubDate>Thu, 01 Jan 1970 00:00:00 +0000</pubDate><guid>https://iw-sec.github.io/posts/first-post/</guid><description>&lt;p>hi&lt;/p></description></item></channel></rss>