<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/rss/stylesheet/" type="text/xsl"?>
<rss xmlns:content='http://purl.org/rss/1.0/modules/content/' xmlns:taxo='http://purl.org/rss/1.0/modules/taxonomy/' xmlns:rdf='http://www.w3.org/1999/02/22-rdf-syntax-ns#' xmlns:itunes='http://www.itunes.com/dtds/podcast-1.0.dtd' xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:dc='http://purl.org/dc/elements/1.1/' xmlns:atom='http://www.w3.org/2005/Atom' xmlns:podbridge='http://www.podbridge.com/podbridge-ad.dtd' version='2.0'>
<channel>
  <title>Dragon Security Threat Intelligence Feed</title>
  <language>en-us</language>
  <generator>microfeed.org</generator>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <atom:link rel="self" href="https://dstif.pages.dev/rss/" type="application/rss+xml"/>
  <link>https://dstif.io</link>
  <description>
    <![CDATA[<p>The Dragon Security Threat Intelligence Feed project compiles a diverse set of RSS feeds from reputable sources in cybersecurity, threat intelligence, technology news, and other institutions. These feeds are intended for security professionals, researchers, and enthusiasts to stay informed on the latest security threats, vulnerabilities, industry trends, economic indicators, and policy changes.</p><p><br></p><p>We provide this service free of charge to promote the common knowledge of cyber and security.</p><p><br></p><p>Please be aware that the feed aggregator is an automated bot, and sometimes duplication happens. We apologise for it in advance. Should you wish to report any issues, such as duplication, or wish to request additional feeds be added to the aggregator, please let us know by opening an issue on <a href="https://github.com/DragonSecurity/dstif" rel="noopener noreferrer" target="_blank">https://github.com/DragonSecurity/dstif</a></p>]]>
  </description>
  <itunes:author>Dragon Security</itunes:author>
  <itunes:image href="https://cdn.dstif.io	/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png"/>
  <image>
    <title>Dragon Security Threat Intelligence Feed</title>
    <url>https://cdn.dstif.io	/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png</url>
    <link>https://dstif.io</link>
  </image>
  <copyright>©2024 Dragon Security</copyright>
  <itunes:category text="Business"/>
  <itunes:category text="Technology"/>
  <item>
    <title>📢 CVE-2021-20233 A flaw was found in grub2 in versions prior to 2.06. Setparam_prefix() in the menu rendering code performs a length calculation on the assumption that expressing a quoted single quote will require 3 characters while it actually requires 4 characters which allows an attacker to corrupt memory by one byte for each quote in the input. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.</title>
    <guid>DvdWoxwU7sr</guid>
    <pubDate>Thu, 26 Feb 2026 09:01:23 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-02-26T09:01:23<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-20233?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-20233?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2021-20233?utm_source=dstif.io</link>
  </item>
</channel>
</rss>