<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/rss/stylesheet/" type="text/xsl"?>
<rss xmlns:content='http://purl.org/rss/1.0/modules/content/' xmlns:taxo='http://purl.org/rss/1.0/modules/taxonomy/' xmlns:rdf='http://www.w3.org/1999/02/22-rdf-syntax-ns#' xmlns:itunes='http://www.itunes.com/dtds/podcast-1.0.dtd' xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:dc='http://purl.org/dc/elements/1.1/' xmlns:atom='http://www.w3.org/2005/Atom' xmlns:podbridge='http://www.podbridge.com/podbridge-ad.dtd' version='2.0'>
<channel>
  <title>Dragon Security Threat Intelligence Feed</title>
  <language>en-us</language>
  <generator>microfeed.org</generator>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <atom:link rel="self" href="https://dstif.pages.dev/rss/" type="application/rss+xml"/>
  <link>https://dstif.io</link>
  <description>
    <![CDATA[<p>The Dragon Security Threat Intelligence Feed project compiles a diverse set of RSS feeds from reputable sources in cybersecurity, threat intelligence, technology news, and other institutions. These feeds are intended for security professionals, researchers, and enthusiasts to stay informed on the latest security threats, vulnerabilities, industry trends, economic indicators, and policy changes.</p><p><br></p><p>We provide this service free of charge to promote the common knowledge of cyber and security.</p><p><br></p><p>Please be aware that the feed aggregator is an automated bot, and sometimes duplication happens. We apologise for it in advance. Should you wish to report any issues, such as duplication, or wish to request additional feeds be added to the aggregator, please let us know by opening an issue on <a href="https://github.com/DragonSecurity/dstif" rel="noopener noreferrer" target="_blank">https://github.com/DragonSecurity/dstif</a></p>]]>
  </description>
  <itunes:author>Dragon Security</itunes:author>
  <itunes:image href="https://cdn.dstif.io	/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png"/>
  <image>
    <title>Dragon Security Threat Intelligence Feed</title>
    <url>https://cdn.dstif.io	/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png</url>
    <link>https://dstif.io</link>
  </image>
  <copyright>©2024 Dragon Security</copyright>
  <itunes:category text="Business"/>
  <itunes:category text="Technology"/>
  <item>
    <title>📢 CVE-2020-22217 Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.</title>
    <guid>DXxUP29-HwY</guid>
    <pubDate>Wed, 18 Feb 2026 11:14:59 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-02-18T11:14:59<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-22217?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-22217?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2020-22217?utm_source=dstif.io</link>
  </item>
</channel>
</rss>