<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>ricanwarfare | Cyber &amp; Lab</title>
    <link>https://ricanwarfare.com/</link>
    <description>Recent content on ricanwarfare | Cyber &amp; Lab</description>
    <image>
      <title>ricanwarfare | Cyber &amp; Lab</title>
      <url>https://github.com/ricanwarfare.png</url>
      <link>https://github.com/ricanwarfare.png</link>
    </image>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Mon, 13 Apr 2026 20:05:21 -0500</lastBuildDate>
    <atom:link href="https://ricanwarfare.com/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Hardening Proxmox: The Complete Guide</title>
      <link>https://ricanwarfare.com/labs/proxmox-hardening/</link>
      <pubDate>Sun, 15 Mar 2026 10:00:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/labs/proxmox-hardening/</guid>
      <description>From fresh install to production-ready. A comprehensive guide to securing your Proxmox homelab.</description>
    </item>
    <item>
      <title>UnDefend — Windows Defender Denial-of-Service Without Admin Rights</title>
      <link>https://ricanwarfare.com/posts/undefend-windows-defender-dos/</link>
      <pubDate>Mon, 13 Apr 2026 19:00:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/posts/undefend-windows-defender-dos/</guid>
      <description>New tool from the BlueHammer researcher disables Windows Defender signature updates — or the entire engine — from a standard user account. No admin required.</description>
    </item>
    <item>
      <title>BlueHammer — Windows Defender LPE Zero-Day (CVE Pending)</title>
      <link>https://ricanwarfare.com/cve/bluehammer-windows-defender-lpe/</link>
      <pubDate>Sun, 12 Apr 2026 10:00:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/cve/bluehammer-windows-defender-lpe/</guid>
      <description>Unpatched local privilege escalation in Windows Defender&amp;#39;s signature update mechanism. 7-stage chain from standard user to SYSTEM. No CVE assigned.</description>
    </item>
    <item>
      <title>BlueHammer Week Two: Still Unpatched, Reimplemented, and Evading Detection</title>
      <link>https://ricanwarfare.com/posts/bluehammer-week-two-still-unpatched/</link>
      <pubDate>Sun, 12 Apr 2026 10:00:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/posts/bluehammer-week-two-still-unpatched/</guid>
      <description>Nine days after public disclosure, BlueHammer remains unpatched. The SNEK reimplementation has 67&#43; stars, only 8 of 72 vendors detect the PoC, and MSRC&amp;#39;s disclosure breakdown reveals a deeper problem.</description>
    </item>
    <item>
      <title>Self-Improving Agent Systems: Weekly Trio Reports and Automated Audits</title>
      <link>https://ricanwarfare.com/posts/self-improving-agents-weekly-trio/</link>
      <pubDate>Sun, 12 Apr 2026 09:00:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/posts/self-improving-agents-weekly-trio/</guid>
      <description>How a three-agent team autonomously audits, consolidates, and hardens its own infrastructure every week — with real results from the latest cycle.</description>
    </item>
    <item>
      <title>BlueHammer Deep Dive: Windows Defender&#39;s Update Mechanism Weaponized</title>
      <link>https://ricanwarfare.com/posts/bluehammer-deep-dive-update/</link>
      <pubDate>Thu, 09 Apr 2026 07:08:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/posts/bluehammer-deep-dive-update/</guid>
      <description>A technical deep-dive into BlueHammer&amp;#39;s 7-stage exploit chain that weaponizes Windows Defender&amp;#39;s own update workflow to achieve SYSTEM privileges.</description>
    </item>
    <item>
      <title>BlueHammer: Unpatched Windows LPE Zero-Day Dropped by Frustrated Researcher</title>
      <link>https://ricanwarfare.com/posts/bluehammer-windows-zero-day/</link>
      <pubDate>Tue, 07 Apr 2026 22:00:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/posts/bluehammer-windows-zero-day/</guid>
      <description>A disgruntled researcher publicly released exploit code for BlueHammer, an unpatched Windows local privilege escalation zero-day. No patch available.</description>
    </item>
    <item>
      <title>CVE-2026-35616: Fortinet FortiClient EMS Zero-Day</title>
      <link>https://ricanwarfare.com/cve/cve-2026-35616/</link>
      <pubDate>Tue, 07 Apr 2026 15:00:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/cve/cve-2026-35616/</guid>
      <description>Critical improper access control vulnerability in FortiClient EMS. Actively exploited before disclosure.</description>
    </item>
    <item>
      <title>Fortinet Zero-Day Under Active Exploitation: What You Need to Know</title>
      <link>https://ricanwarfare.com/posts/fortinet-zero-day-cve-2026-35616/</link>
      <pubDate>Tue, 07 Apr 2026 15:00:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/posts/fortinet-zero-day-cve-2026-35616/</guid>
      <description>CISA has added CVE-2026-35616 to its Known Exploited Vulnerabilities catalog. Here&amp;#39;s what offensive and defensive teams need to know.</description>
    </item>
    <item>
      <title>OAuth Gateway Migration and Voice Responses: Making AI Assistants More Natural</title>
      <link>https://ricanwarfare.com/posts/oauth-gateway-voice-tts/</link>
      <pubDate>Tue, 07 Apr 2026 14:00:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/posts/oauth-gateway-voice-tts/</guid>
      <description>Migrating from manual OAuth token refresh to Maton gateway, and adding voice responses for messaging platforms.</description>
    </item>
    <item>
      <title>Claude Code: AI-Powered Development in the Terminal</title>
      <link>https://ricanwarfare.com/posts/claude-code-review/</link>
      <pubDate>Tue, 31 Mar 2026 17:00:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/posts/claude-code-review/</guid>
      <description>A practical look at Claude Code (claude.ai/code) for terminal-based AI development, comparing it to other coding assistants and how to integrate it into a homelab workflow.</description>
    </item>
    <item>
      <title>OpenClaw: Building a Personal AI Assistant the Lobster Way</title>
      <link>https://ricanwarfare.com/posts/openclaw-personal-ai-assistant/</link>
      <pubDate>Tue, 31 Mar 2026 16:55:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/posts/openclaw-personal-ai-assistant/</guid>
      <description>How I use OpenClaw to run Clawd, a hierarchical AI assistant that manages my homelab, coordinates subagents, and maintains memory across sessions.</description>
    </item>
    <item>
      <title>Running Local LLMs with Ollama: A Homelab Guide</title>
      <link>https://ricanwarfare.com/posts/local-llm-ollama-guide/</link>
      <pubDate>Tue, 31 Mar 2026 16:50:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/posts/local-llm-ollama-guide/</guid>
      <description>How to set up, optimize, and integrate Ollama for running local language models in your homelab infrastructure.</description>
    </item>
    <item>
      <title>Automating with Clawd: Building an AI Assistant for Homelab</title>
      <link>https://ricanwarfare.com/posts/automating-with-clawd/</link>
      <pubDate>Fri, 20 Mar 2026 12:00:00 -0500</pubDate>
      <guid>https://ricanwarfare.com/posts/automating-with-clawd/</guid>
      <description>How I built Clawd, a hierarchical AI assistant system to automate homelab operations, security monitoring, and daily workflows.</description>
    </item>
    <item>
      <title>ToolShell (CVE-2025-53770): The SharePoint Apocalypse</title>
      <link>https://ricanwarfare.com/posts/toolshell-sharepoint-apocalypse/</link>
      <pubDate>Wed, 04 Mar 2026 19:30:00 -0600</pubDate>
      <guid>https://ricanwarfare.com/posts/toolshell-sharepoint-apocalypse/</guid>
      <description>Microsoft dropped CVE-2025-53770 on a Saturday. By the time many teams saw the advisory, attackers were already inside. Here&amp;#39;s what you need to know about ToolShell.</description>
    </item>
    <item>
      <title>Your Firewall Is Not Safe: The Network-Edge Device Crisis</title>
      <link>https://ricanwarfare.com/posts/network-edge-device-crisis/</link>
      <pubDate>Wed, 04 Mar 2026 19:15:00 -0600</pubDate>
      <guid>https://ricanwarfare.com/posts/network-edge-device-crisis/</guid>
      <description>In 2024-2025, over 20 zero-day exploits targeted network-edge devices. Here&amp;#39;s why your perimeter is under siege and what to do about it.</description>
    </item>
    <item>
      <title>React2Shell (CVE-2025-55182): The New Log4Shell?</title>
      <link>https://ricanwarfare.com/posts/react2shell-log4shell-2025/</link>
      <pubDate>Wed, 04 Mar 2026 19:00:00 -0600</pubDate>
      <guid>https://ricanwarfare.com/posts/react2shell-log4shell-2025/</guid>
      <description>React2Shell (CVE-2025-55182) emerged as a critical RCE vulnerability affecting React Server Components. Here&amp;#39;s what you need to know about detection, remediation, and lessons learned.</description>
    </item>
    <item>
      <title>Homelab Audit Q1 2026: Security Hardening &amp; Hardware Reality</title>
      <link>https://ricanwarfare.com/posts/homelab-audit-q1-2026/</link>
      <pubDate>Wed, 25 Feb 2026 20:15:00 -0600</pubDate>
      <guid>https://ricanwarfare.com/posts/homelab-audit-q1-2026/</guid>
      <description>Quarterly homelab audit covering Signal alert migration, centralized automation, Proxmox disk health findings, and model failover validation for resilience.</description>
    </item>
    <item>
      <title>Bash Scripting: A High-Tier Syntax Guide</title>
      <link>https://ricanwarfare.com/posts/bash-scripting-syntax/</link>
      <pubDate>Sun, 15 Feb 2026 19:40:00 +0000</pubDate>
      <guid>https://ricanwarfare.com/posts/bash-scripting-syntax/</guid>
      <description>A concise reference for essential Bash scripting syntax, from variables to functions.</description>
    </item>
    <item>
      <title>OSINT for the Blue Team: Monitoring Your Own Attack Surface</title>
      <link>https://ricanwarfare.com/posts/defensive-osint/</link>
      <pubDate>Thu, 12 Feb 2026 21:20:00 +0000</pubDate>
      <guid>https://ricanwarfare.com/posts/defensive-osint/</guid>
      <description>How defenders can use open-source intelligence to find leaked credentials and shadow IT before attackers do.</description>
    </item>
    <item>
      <title>Exploiting Local LLMs: Prompt Injection in the Lab</title>
      <link>https://ricanwarfare.com/posts/local-llm-exploitation/</link>
      <pubDate>Thu, 12 Feb 2026 21:15:00 +0000</pubDate>
      <guid>https://ricanwarfare.com/posts/local-llm-exploitation/</guid>
      <description>Analyzing the security risks of self-hosted AI stacks and how to defend against indirect prompt injection.</description>
    </item>
    <item>
      <title>AI in the Shadows: The Rise of Offensive LLMs</title>
      <link>https://ricanwarfare.com/posts/offensive-ai/</link>
      <pubDate>Thu, 12 Feb 2026 21:00:00 +0000</pubDate>
      <guid>https://ricanwarfare.com/posts/offensive-ai/</guid>
      <description>How Large Language Models are changing the game for red teams and threat actors alike.</description>
    </item>
    <item>
      <title>Zero Trust: Why Your Network Perimeter is a Lie</title>
      <link>https://ricanwarfare.com/posts/zero-trust-mindset/</link>
      <pubDate>Thu, 12 Feb 2026 20:50:00 +0000</pubDate>
      <guid>https://ricanwarfare.com/posts/zero-trust-mindset/</guid>
      <description>Moving beyond the castle-and-moat mentality in modern cybersecurity.</description>
    </item>
    <item>
      <title>Homelab Security: Hardening Proxmox and LXCs</title>
      <link>https://ricanwarfare.com/posts/hardening-proxmox/</link>
      <pubDate>Thu, 12 Feb 2026 20:45:00 +0000</pubDate>
      <guid>https://ricanwarfare.com/posts/hardening-proxmox/</guid>
      <description>A guide on securing your Proxmox virtual environment and containerized workloads.</description>
    </item>
  </channel>
</rss>
