<?xml version='1.0' encoding='UTF-8'?>
<?xml-stylesheet href="/rss/stylesheet/" type="text/xsl"?>
<rss xmlns:content='http://purl.org/rss/1.0/modules/content/' xmlns:taxo='http://purl.org/rss/1.0/modules/taxonomy/' xmlns:rdf='http://www.w3.org/1999/02/22-rdf-syntax-ns#' xmlns:itunes='http://www.itunes.com/dtds/podcast-1.0.dtd' xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:dc='http://purl.org/dc/elements/1.1/' xmlns:atom='http://www.w3.org/2005/Atom' xmlns:podbridge='http://www.podbridge.com/podbridge-ad.dtd' version='2.0'>
<channel>
  <title>Dragon Security Threat Intelligence Feed</title>
  <language>en-us</language>
  <generator>microfeed.org</generator>
  <itunes:type>episodic</itunes:type>
  <itunes:explicit>false</itunes:explicit>
  <atom:link rel="self" href="https://dstif.pages.dev/rss/" type="application/rss+xml"/>
  <link>https://dstif.io</link>
  <description>
    <![CDATA[<p>The Dragon Security Threat Intelligence Feed project compiles a diverse set of RSS feeds from reputable sources in cybersecurity, threat intelligence, technology news, and other institutions. These feeds are intended for security professionals, researchers, and enthusiasts to stay informed on the latest security threats, vulnerabilities, industry trends, economic indicators, and policy changes.</p><p><br></p><p>We provide this service free of charge to promote the common knowledge of cyber and security.</p><p><br></p><p>Please be aware that the feed aggregator is an automated bot, and sometimes duplication happens. We apologise for it in advance. Should you wish to report any issues, such as duplication, or wish to request additional feeds be added to the aggregator, please let us know by opening an issue on <a href="https://github.com/DragonSecurity/dstif" rel="noopener noreferrer" target="_blank">https://github.com/DragonSecurity/dstif</a></p>]]>
  </description>
  <itunes:author>Dragon Security</itunes:author>
  <itunes:image href="https://cdn.dstif.io	/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png"/>
  <image>
    <title>Dragon Security Threat Intelligence Feed</title>
    <url>https://cdn.dstif.io	/dstif/production/images/channel-284526edcd0e85af770b91aaa7a2129c.png</url>
    <link>https://dstif.io</link>
  </image>
  <copyright>©2024 Dragon Security</copyright>
  <itunes:category text="Business"/>
  <itunes:category text="Technology"/>
  <item>
    <title>📢 CVE-2022-32206 curl &lt; 7.84.0 supports &quot;chained&quot; HTTP compression algorithms meaning that a serverresponse can be compressed multiple times and potentially with different algorithms. The number of acceptable &quot;links&quot; in this &quot;decompression chain&quot; was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps.The use of such a decompression chain could result in a &quot;malloc bomb&quot; makingcurl end up spending enormous amounts of allocated heap memory or trying toand returning out of memory errors.</title>
    <guid>nyHYvvhL9B1</guid>
    <pubDate>Sat, 21 Feb 2026 11:57:20 GMT</pubDate>
    <itunes:explicit>false</itunes:explicit>
    <description>
      <![CDATA[Date: 2026-02-21T11:57:20<br/>Source:<b> MSRC Security Updates</b><br/>Read more: <a href=https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32206?utm_source=dstif.io>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32206?utm_source=dstif.io</a><br/>]]>
    </description>
    <link>https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-32206?utm_source=dstif.io</link>
  </item>
</channel>
</rss>