<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>nefariousplan.com</title>
    <link>https://nefariousplan.com</link>
    <description>Security research by Kevlar</description>
    <language>en-us</language>
    <atom:link href="https://nefariousplan.com/rss.xml" rel="self" type="application/rss+xml" />
    <item>
      <title><![CDATA[RedSun: How Windows Defender's Remediation Became a SYSTEM File Write]]></title>
      <link>https://nefariousplan.com/posts/redsun-windows-defender-system-write</link>
      <guid>https://nefariousplan.com/posts/redsun-windows-defender-system-write</guid>
      <description><![CDATA[A technical teardown of the RedSun zero-day — the second Defender escalation in two weeks from the same researcher — grounded in the actual source code.]]></description>
      <pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[The Trust Inversion]]></title>
      <link>https://nefariousplan.com/posts/the-trust-inversion</link>
      <guid>https://nefariousplan.com/posts/the-trust-inversion</guid>
      <description><![CDATA[Six supply chain attacks. One method. The attack surface isn't your systems anymore — it's the tools and credentials that authorize access to them.]]></description>
      <pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[SAP NetWeaver CVE-2025-31324: When CVSS 10.0 Means What It Says]]></title>
      <link>https://nefariousplan.com/posts/sap-netweaver-cvss-10-upload-to-webroot</link>
      <guid>https://nefariousplan.com/posts/sap-netweaver-cvss-10-upload-to-webroot</guid>
      <description><![CDATA[An unauthenticated file upload to webroot in one of the world's most critical business platforms. The attack is simple. The exposure is not.]]></description>
      <pubDate>Sat, 11 Apr 2026 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Axios, Sapphire Sleet, and 70 Million Weekly Installs]]></title>
      <link>https://nefariousplan.com/posts/axios-sapphire-sleet-70-million-installs</link>
      <guid>https://nefariousplan.com/posts/axios-sapphire-sleet-70-million-installs</guid>
      <description><![CDATA[North Korea compromised the most-used HTTP client in the JavaScript ecosystem. The mechanism was a single compromised npm account.]]></description>
      <pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[TeamPCP Came for the Scanners]]></title>
      <link>https://nefariousplan.com/posts/teampcp-they-came-for-the-scanners</link>
      <guid>https://nefariousplan.com/posts/teampcp-they-came-for-the-scanners</guid>
      <description><![CDATA[The March 2026 supply chain campaign didn't just compromise popular packages. It compromised Trivy and Checkmarx — the tools you use to detect supply chain compromises.]]></description>
      <pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Oracle Cloud: The Breach They Technically Didn't Deny]]></title>
      <link>https://nefariousplan.com/posts/oracle-cloud-the-breach-they-technically-didnt-deny</link>
      <guid>https://nefariousplan.com/posts/oracle-cloud-the-breach-they-technically-didnt-deny</guid>
      <description><![CDATA[Six million records, three weeks of denial, and a lesson in how large vendors parse their own security commitments.]]></description>
      <pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Prompt Injection Is a Supply Chain Attack]]></title>
      <link>https://nefariousplan.com/posts/prompt-injection-is-a-supply-chain-attack</link>
      <guid>https://nefariousplan.com/posts/prompt-injection-is-a-supply-chain-attack</guid>
      <description><![CDATA[AI agents execute tool calls based on content from external sources. That content is attacker-controlled. The security industry hasn't caught up.]]></description>
      <pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[MCP Servers: The New npm Left-Pad]]></title>
      <link>https://nefariousplan.com/posts/mcp-servers-the-new-npm-left-pad</link>
      <guid>https://nefariousplan.com/posts/mcp-servers-the-new-npm-left-pad</guid>
      <description><![CDATA[AI agents install MCP servers to gain tools. The MCP server ecosystem has no code signing, no security audit, and no mechanism to verify a server does what it claims. We've been here before.]]></description>
      <pubDate>Wed, 28 Jan 2026 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Shai-Hulud: The First npm Worm]]></title>
      <link>https://nefariousplan.com/posts/shai-hulud-the-npm-worm</link>
      <guid>https://nefariousplan.com/posts/shai-hulud-the-npm-worm</guid>
      <description><![CDATA[A self-replicating worm tore through the npm ecosystem in September 2025. The mechanism was almost embarrassingly simple.]]></description>
      <pubDate>Mon, 15 Sep 2025 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[xrpl.js: The Official Package Was the Threat]]></title>
      <link>https://nefariousplan.com/posts/xrpl-npm-the-official-package-was-the-threat</link>
      <guid>https://nefariousplan.com/posts/xrpl-npm-the-official-package-was-the-threat</guid>
      <description><![CDATA[Versions 4.2.1 through 4.2.4 of the official XRP Ledger JavaScript library exfiltrated wallet seed phrases. 4.2M weekly downloads. Discovered by accident.]]></description>
      <pubDate>Fri, 25 Apr 2025 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[CLFS: Ransomware's Favorite Kernel Driver]]></title>
      <link>https://nefariousplan.com/posts/clfs-ransomwares-favorite-kernel-driver</link>
      <guid>https://nefariousplan.com/posts/clfs-ransomwares-favorite-kernel-driver</guid>
      <description><![CDATA[CVE-2025-29824 is the fifth exploited-in-wild LPE from the Windows Common Log File System driver. The driver has a design problem. The patch cycle hasn't addressed it.]]></description>
      <pubDate>Thu, 24 Apr 2025 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[CrushFTP CVE-2025-31161: MFT Is the Target Now]]></title>
      <link>https://nefariousplan.com/posts/crushftp-pre-auth-mft-is-the-target</link>
      <guid>https://nefariousplan.com/posts/crushftp-pre-auth-mft-is-the-target</guid>
      <description><![CDATA[A pre-auth authentication bypass in CrushFTP. The vulnerability is interesting. Why MFT products keep showing up as primary targets is more interesting.]]></description>
      <pubDate>Sat, 29 Mar 2025 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[tj-actions: Mutable Tags Were Always a Lie]]></title>
      <link>https://nefariousplan.com/posts/tj-actions-mutable-tags-were-always-a-lie</link>
      <guid>https://nefariousplan.com/posts/tj-actions-mutable-tags-were-always-a-lie</guid>
      <description><![CDATA[The GitHub Actions supply chain attack that exposed CI secrets for 23,000 repositories wasn't sophisticated. It was inevitable.]]></description>
      <pubDate>Sat, 15 Mar 2025 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Bybit: $1.5B via a JavaScript Injection Nobody Was Looking For]]></title>
      <link>https://nefariousplan.com/posts/bybit-safe-ui-poisoning-fifteen-hundred-million</link>
      <guid>https://nefariousplan.com/posts/bybit-safe-ui-poisoning-fifteen-hundred-million</guid>
      <description><![CDATA[Lazarus poisoned the Safe{Wallet} front end. Hardware wallets signed exactly what they were told. The security model worked perfectly. The trust model had a hole.]]></description>
      <pubDate>Sun, 23 Feb 2025 00:00:00 GMT</pubDate>
    </item>
    <item>
      <title><![CDATA[Ivanti: The Vulnerability Subscription]]></title>
      <link>https://nefariousplan.com/posts/ivanti-the-vulnerability-subscription</link>
      <guid>https://nefariousplan.com/posts/ivanti-the-vulnerability-subscription</guid>
      <description><![CDATA[CVE-2025-0282 was exploited for at least 12 days before Ivanti disclosed it. Chinese APT had access to targeted networks while the patch was still being written. This is the third time in 12 months.]]></description>
      <pubDate>Fri, 17 Jan 2025 00:00:00 GMT</pubDate>
    </item>
  </channel>
</rss>