<?xml version="1.0" encoding="UTF-8"?>
<!--
from datetime import datetime
from email.utils import format_datetime
print(format_datetime(datetime.fromisoformat("2024-01-25T10:02:21+02:00")))
-->
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Security monitoring and cyber risk</title>
    <link>https://www.catmouse.dev/</link>
    <atom:link href="https://www.catmouse.dev/feed.xml" rel="self" type="application/rss+xml" />
    <description>Security monitoring and cyber risk</description>
    <language>en</language>

    <item>
      <title>Minimization and contamination</title>
      <link>https://www.catmouse.dev/minimisation-and-contamination.html</link>
      <guid>https://www.catmouse.dev/minimisation-and-contamination.html</guid>
      <pubDate>Thu, 25 Jan 2024 10:02:21 +0200</pubDate>
      <description>Today is my birthday, and that's because from now on, I no longer identify with my biological age of ██ but with my social-emotional age of 19.</description>
    </item>

    <item>
      <title>Offensive Cyber Operations</title>
      <link>https://www.catmouse.dev/offensive-cyber-operations.html</link>
      <guid>https://www.catmouse.dev/offensive-cyber-operations.html</guid>
      <pubDate>Fri, 04 Nov 2022 08:43:36 +0200</pubDate>
      <description>Cyberwar is bullshit. That is what the author, Daniel Moore, almost could have said. Offensive Cyber Operations is his Ph.D. work escalated into a page-turner.</description>
    </item>

    <item>
      <title>Carbanak+FIN7: MITRE EDR evaluations round 3</title>
      <link>https://www.catmouse.dev/detecting-carbanak-fin7-mitre-edr-evaluations-round-3.html</link>
      <guid>https://www.catmouse.dev/detecting-carbanak-fin7-mitre-edr-evaluations-round-3.html</guid>
      <pubDate>Fri, 31 Dec 2021 10:36:41 +0200</pubDate>
      <description>What do the evaluation results and vendor marketing really tell you? A dive into Monday mornings, noise generators and end-to-end information loss.</description>
    </item>

    <item>
      <title>Detecting APT29: MITRE EDR evaluations round 2</title>
      <link>https://www.catmouse.dev/detecting-apt29-mitre-edr-evaluations-round-2.html</link>
      <guid>https://www.catmouse.dev/detecting-apt29-mitre-edr-evaluations-round-2.html</guid>
      <pubDate>Tue, 28 Apr 2020 12:04:59 +0200</pubDate>
      <description>Which EDR vendor detects most APT29 steps? Based on MITRE's set of EDR evaluation results, I used Splunk to analyze their data.</description>
    </item>

    <item>
      <title>Comparing MITRE EDR evaluation results for APT3</title>
      <link>https://www.catmouse.dev/detecting-apt3-mitre-edr-evals-round-1.html</link>
      <guid>https://www.catmouse.dev/detecting-apt3-mitre-edr-evals-round-1.html</guid>
      <pubDate>Thu, 15 Aug 2019 13:04:55 +0200</pubDate>
      <description>Which EDR vendor detects most APT3 steps? This is an analysis using Python and Splunk of the data MITRE published.</description>
    </item>

  </channel>
</rss>