<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Red Hound InfoSec — Insights</title>
    <link>https://redhound.us/blog.html</link>
    <atom:link href="https://redhound.us/feed.xml" rel="self" type="application/rss+xml" />
    <description>Field-tested cybersecurity insights for SMBs from Red Hound InfoSec — offensive security, identity, compliance, and the CVE response playbooks no one else publishes.</description>
    <language>en-us</language>
    <copyright>Copyright (c) Red Hound InfoSec</copyright>
    <managingEditor>sales@redhound.us (Red Hound InfoSec)</managingEditor>
    <webMaster>sales@redhound.us (Red Hound InfoSec)</webMaster>
    <category>Cybersecurity</category>
    <category>Information Security</category>
    <ttl>1440</ttl>
    <image>
      <url>https://redhound.us/assets/logo-original.png</url>
      <title>Red Hound InfoSec</title>
      <link>https://redhound.us/</link>
    </image>

    <item>
      <title>Bluehammer + RedSun: Undefending Windows Defender (SMB Hardening Playbook)</title>
      <link>https://redhound.us/blog/bluehammer-redsun-undefend-windows-defender-smb-hardening.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/bluehammer-redsun-undefend-windows-defender-smb-hardening.html</guid>
      <pubDate>Wed, 13 May 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Windows Defender</category>
      <description>How Bluehammer + RedSun disable Windows Defender, and the SMB hardening steps that block them.</description>
    </item>

    <item>
      <title>Adaptavist "The Gentlemen": Atlassian Marketplace Risk — SMB Playbook</title>
      <link>https://redhound.us/blog/adaptavist-thegentlemen-atlassian-marketplace-smb-playbook.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/adaptavist-thegentlemen-atlassian-marketplace-smb-playbook.html</guid>
      <pubDate>Tue, 12 May 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Supply Chain</category>
      <description>The Adaptavist compromise, what it means for Atlassian Marketplace users, and a concrete SMB response playbook.</description>
    </item>

    <item>
      <title>Vercel + Context AI OAuth Supply Chain Breach — SMB Playbook</title>
      <link>https://redhound.us/blog/vercel-context-ai-oauth-supply-chain-smb-playbook.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/vercel-context-ai-oauth-supply-chain-smb-playbook.html</guid>
      <pubDate>Mon, 11 May 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>AI Security</category>
      <description>How the Vercel/Context AI OAuth breach happened and what SMBs need to verify in their own GitHub/SaaS OAuth grants.</description>
    </item>

    <item>
      <title>PAN-OS CVE-2026-0300: Captive Portal Pre-Patch Playbook</title>
      <link>https://redhound.us/blog/pan-os-cve-2026-0300-captive-portal-pre-patch-playbook.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/pan-os-cve-2026-0300-captive-portal-pre-patch-playbook.html</guid>
      <pubDate>Sun, 10 May 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>CVE Response</category>
      <description>What to do about PAN-OS CVE-2026-0300 captive portal vulnerability before the patch lands.</description>
    </item>

    <item>
      <title>Canvas/Instructure ShinyHunters Breach: SaaS Vendor Concentration Risk</title>
      <link>https://redhound.us/blog/canvas-instructure-shinyhunters-saas-vendor-concentration-risk.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/canvas-instructure-shinyhunters-saas-vendor-concentration-risk.html</guid>
      <pubDate>Sat, 09 May 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Supply Chain</category>
      <description>The Canvas/Instructure breach is a case study in SaaS vendor concentration risk for education and beyond.</description>
    </item>

    <item>
      <title>Entra Agent ID: Administrator Service Principal Takeover</title>
      <link>https://redhound.us/blog/entra-agent-id-administrator-service-principal-takeover.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/entra-agent-id-administrator-service-principal-takeover.html</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Identity</category>
      <description>New Entra Agent ID attack path: how administrator service principals are taken over and how to detect it.</description>
    </item>

    <item>
      <title>Copy-Fail (CVE-2026-31431): Linux Kernel LPE Container Escape</title>
      <link>https://redhound.us/blog/copy-fail-cve-2026-31431-linux-kernel-lpe-container-escape.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/copy-fail-cve-2026-31431-linux-kernel-lpe-container-escape.html</guid>
      <pubDate>Thu, 07 May 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>CVE Response</category>
      <description>CVE-2026-31431 Copy-Fail: Linux kernel local privilege escalation and container escape — what to do today.</description>
    </item>

    <item>
      <title>cPanel CVE-2026-41940: CRLF Auth Bypass Mass Exploit in MSP Hosting</title>
      <link>https://redhound.us/blog/cpanel-cve-2026-41940-crlf-auth-bypass-msp-hosting-mass-exploit.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/cpanel-cve-2026-41940-crlf-auth-bypass-msp-hosting-mass-exploit.html</guid>
      <pubDate>Wed, 06 May 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>CVE Response</category>
      <description>cPanel CVE-2026-41940 CRLF auth bypass is being mass exploited in MSP hosting environments — emergency response.</description>
    </item>

    <item>
      <title>LiteLLM CVE-2026-42208: AI Gateway Pre-Auth SQLi</title>
      <link>https://redhound.us/blog/litellm-cve-2026-42208-ai-gateway-pre-auth-sqli.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/litellm-cve-2026-42208-ai-gateway-pre-auth-sqli.html</guid>
      <pubDate>Tue, 05 May 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>AI Security</category>
      <description>Pre-auth SQL injection in LiteLLM exposes AI gateways — what defenders need to patch and detect.</description>
    </item>

    <item>
      <title>CVE-2026-32202: APT28 NTLM Zero-Click — May 12 Deadline</title>
      <link>https://redhound.us/blog/cve-2026-32202-apt28-ntlm-zero-click-may-12-deadline.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/cve-2026-32202-apt28-ntlm-zero-click-may-12-deadline.html</guid>
      <pubDate>Mon, 04 May 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>CVE Response</category>
      <description>APT28 weaponized NTLM zero-click attacks — patch and harden ahead of the May 12 deadline.</description>
    </item>

    <item>
      <title>GitHub CVE-2026-3854: git push RCE</title>
      <link>https://redhound.us/blog/github-cve-2026-3854-git-push-rce.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/github-cve-2026-3854-git-push-rce.html</guid>
      <pubDate>Sat, 02 May 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>CVE Response</category>
      <description>GitHub CVE-2026-3854 enables RCE via crafted git push. Detection, mitigation, and SMB impact.</description>
    </item>

    <item>
      <title>Comment-and-Control: AI Coding Agent Prompt Injection</title>
      <link>https://redhound.us/blog/comment-and-control-ai-coding-agent-prompt-injection.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/comment-and-control-ai-coding-agent-prompt-injection.html</guid>
      <pubDate>Tue, 28 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>AI Security</category>
      <description>Comment-and-Control: an emerging prompt injection technique that turns AI coding agents into attacker infrastructure.</description>
    </item>

    <item>
      <title>SimpleHelp + DragonForce: MSP Supply Chain Attack</title>
      <link>https://redhound.us/blog/simplehelp-dragonforce-msp-supply-chain.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/simplehelp-dragonforce-msp-supply-chain.html</guid>
      <pubDate>Mon, 27 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Supply Chain</category>
      <description>SimpleHelp + DragonForce ransomware is hitting MSPs and cascading downstream. How SMB customers should respond.</description>
    </item>

    <item>
      <title>Deepfake Executive Impersonation: SMB Playbook</title>
      <link>https://redhound.us/blog/deepfake-executive-impersonation-smb-playbook.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/deepfake-executive-impersonation-smb-playbook.html</guid>
      <pubDate>Wed, 22 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Social Engineering</category>
      <description>Deepfake CEO/CFO impersonation is wire-fraud-grade now. The SMB defense playbook.</description>
    </item>

    <item>
      <title>Apache ActiveMQ CVE-2026-34197 RCE</title>
      <link>https://redhound.us/blog/apache-activemq-cve-2026-34197-rce.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/apache-activemq-cve-2026-34197-rce.html</guid>
      <pubDate>Tue, 21 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>CVE Response</category>
      <description>Apache ActiveMQ CVE-2026-34197 RCE — what to patch, hunt, and block.</description>
    </item>

    <item>
      <title>axios npm Supply Chain Attack: Lessons for SMBs</title>
      <link>https://redhound.us/blog/axios-npm-supply-chain-attack-lessons.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/axios-npm-supply-chain-attack-lessons.html</guid>
      <pubDate>Mon, 20 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Supply Chain</category>
      <description>The axios npm compromise and what SMB engineering teams must do about node-modules supply chain risk.</description>
    </item>

    <item>
      <title>MCP Server Security for AI Agents</title>
      <link>https://redhound.us/blog/mcp-server-security-ai-agents.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/mcp-server-security-ai-agents.html</guid>
      <pubDate>Sun, 19 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>AI Security</category>
      <description>Securing Model Context Protocol (MCP) servers — the next-gen attack surface for AI agent deployments.</description>
    </item>

    <item>
      <title>Windows Defender Zero-Day: Bluehammer + RedSun</title>
      <link>https://redhound.us/blog/windows-defender-zero-day-bluehammer-redsun.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/windows-defender-zero-day-bluehammer-redsun.html</guid>
      <pubDate>Sat, 18 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Endpoint</category>
      <description>The Bluehammer + RedSun Windows Defender zero-day chain explained.</description>
    </item>

    <item>
      <title>AI Packet Analyzer: Open-Source PCAP Analysis</title>
      <link>https://redhound.us/blog/ai-packet-analyzer-open-source-pcap-analysis.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/ai-packet-analyzer-open-source-pcap-analysis.html</guid>
      <pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Tools</category>
      <description>Our open-source AI Packet Analyzer for network connectivity and security analysis.</description>
    </item>

    <item>
      <title>AI-Assisted DFIR with Claude Code and SIFT Workstation</title>
      <link>https://redhound.us/blog/ai-dfir-claude-code-sift-workstation.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/ai-dfir-claude-code-sift-workstation.html</guid>
      <pubDate>Fri, 03 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>DFIR</category>
      <description>Speeding up DFIR investigations with Claude Code agents and the SIFT Workstation.</description>
    </item>

    <item>
      <title>Domain Controller Hardening Checklist</title>
      <link>https://redhound.us/blog/dc-hardening-checklist.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/dc-hardening-checklist.html</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Active Directory</category>
      <description>Battle-tested DC hardening checklist from 20 years inside Fortune 500 enterprises.</description>
    </item>

    <item>
      <title>Attack &amp; Test Your Domain Controllers</title>
      <link>https://redhound.us/blog/attack-test-domain-controllers.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/attack-test-domain-controllers.html</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Active Directory</category>
      <description>How to attack-test your own domain controllers before an adversary does.</description>
    </item>

    <item>
      <title>AD CS Attack Surface</title>
      <link>https://redhound.us/blog/ad-cs-attack-surface.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/ad-cs-attack-surface.html</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Active Directory</category>
      <description>Active Directory Certificate Services: the attack surface most enterprises ignore.</description>
    </item>

    <item>
      <title>Entra ID Hardening Settings</title>
      <link>https://redhound.us/blog/entra-id-hardening-settings.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/entra-id-hardening-settings.html</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Identity</category>
      <description>The Entra ID hardening settings that actually move the needle.</description>
    </item>

    <item>
      <title>Entra ID Threat Hunting</title>
      <link>https://redhound.us/blog/entra-id-threat-hunting.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/entra-id-threat-hunting.html</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Identity</category>
      <description>Threat hunting queries and detections for Entra ID environments.</description>
    </item>

    <item>
      <title>Hybrid Identity Security</title>
      <link>https://redhound.us/blog/hybrid-identity-security.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/hybrid-identity-security.html</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Identity</category>
      <description>Securing hybrid AD + Entra ID environments end-to-end.</description>
    </item>

    <item>
      <title>Splunk Log Volume Optimization</title>
      <link>https://redhound.us/blog/splunk-log-volume-optimization.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/splunk-log-volume-optimization.html</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>SIEM</category>
      <description>Cutting Splunk ingest spend without losing detection coverage.</description>
    </item>

    <item>
      <title>Splunk Detection Library</title>
      <link>https://redhound.us/blog/splunk-detection-library.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/splunk-detection-library.html</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>SIEM</category>
      <description>The Splunk detections you should have running today.</description>
    </item>

    <item>
      <title>AI Agent Compliance Testing</title>
      <link>https://redhound.us/blog/ai-agent-compliance-testing.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/ai-agent-compliance-testing.html</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>AI Security</category>
      <description>How to test AI agents against compliance frameworks like SOC2, HIPAA, and PCI.</description>
    </item>

    <item>
      <title>AI Agents in SOC Automation</title>
      <link>https://redhound.us/blog/ai-agents-soc-automation.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/ai-agents-soc-automation.html</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>SOC</category>
      <description>Practical AI agent patterns for SOC automation in 2026.</description>
    </item>

    <item>
      <title>Ransomware Response: The First 48 Hours</title>
      <link>https://redhound.us/blog/ransomware-response-first-48-hours.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/ransomware-response-first-48-hours.html</guid>
      <pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Incident Response</category>
      <description>What to do in the first 48 hours of a ransomware incident — minute-by-minute.</description>
    </item>

    <item>
      <title>MFA Bypass Attacks &amp; Defense</title>
      <link>https://redhound.us/blog/mfa-bypass-attacks-defense.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/mfa-bypass-attacks-defense.html</guid>
      <pubDate>Mon, 23 Mar 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Identity</category>
      <description>The MFA bypass techniques attackers are using now, and the controls that actually stop them.</description>
    </item>

    <item>
      <title>5 Active Directory Misconfigurations We See in Every Engagement</title>
      <link>https://redhound.us/blog/active-directory-misconfigurations.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/active-directory-misconfigurations.html</guid>
      <pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Active Directory</category>
      <description>The same five Active Directory misconfigurations show up in nearly every assessment we run.</description>
    </item>

    <item>
      <title>Fortune 500 Vendor Security Requirements</title>
      <link>https://redhound.us/blog/fortune-500-vendor-security-requirements.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/fortune-500-vendor-security-requirements.html</guid>
      <pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Enterprise Readiness</category>
      <description>What Fortune 500 procurement actually wants to see in your vendor security review.</description>
    </item>

    <item>
      <title>SIEM Alert Optimization</title>
      <link>https://redhound.us/blog/siem-alert-optimization.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/siem-alert-optimization.html</guid>
      <pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>SIEM</category>
      <description>How to tune SIEM alerts to eliminate noise and surface real threats.</description>
    </item>

    <item>
      <title>Penetration Test Report Quality</title>
      <link>https://redhound.us/blog/penetration-test-report-quality.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/penetration-test-report-quality.html</guid>
      <pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Offensive Security</category>
      <description>What separates a great pentest report from a useless one.</description>
    </item>

    <item>
      <title>Azure AD Conditional Access Mistakes</title>
      <link>https://redhound.us/blog/azure-ad-conditional-access-mistakes.html</link>
      <guid isPermaLink="true">https://redhound.us/blog/azure-ad-conditional-access-mistakes.html</guid>
      <pubDate>Fri, 20 Mar 2026 00:00:00 GMT</pubDate>
      <dc:creator>Red Hound InfoSec</dc:creator>
      <category>Identity</category>
      <description>The Azure AD / Entra ID Conditional Access mistakes that put your tenant at risk.</description>
    </item>

  </channel>
</rss>
