<?xml version="1.0" encoding="UTF-8"?>
<rss
    version="2.0"
    xmlns:atom="http://www.w3.org/2005/Atom"
>
    <channel>
        <atom:link
            type="application/rss+xml"
            href="https://alichisom.com/feed/posts"
            rel="self"
        />
        <title><![CDATA[Posts feed]]></title>
        <link><![CDATA[https://alichisom.com/feed/posts]]></link>
                <description><![CDATA[Latest posts from Ali Chisom]]></description>
        <language>en_US</language>
        <pubDate>2026-04-02T12:17:19+00:00</pubDate>

                    <item>
                <title><![CDATA[200+ ATTACKS. 0 BREACH. Here’s What I Found in 48 Hours of Threat Hunting…]]></title>
                <link>https://alichisom.com/200-attacks-0-breach-heres-what-i-found-in-48-hours-of-threat-hunting</link>
                <description><![CDATA[200+ ATTACKS. 0 BREACH. Here’s What I Found in 48 Hours of Threat Hunting…]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/200-attacks-0-breach-heres-what-i-found-in-48-hours-of-threat-hunting</guid>
                <pubDate>Thu, 02 Apr 2026 12:17:19 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/hh.png"
                    length="1479474"
                />
                                    <category>Personal Blog</category>
                            </item>
                    <item>
                <title><![CDATA[The Invisible Front Door: Is Your Azure Tenant Talking Too Much? Part 2]]></title>
                <link>https://alichisom.com/the-invisible-front-door-is-your-azure-tenant-talking-too-much-part-2</link>
                <description><![CDATA[The Invisible Front Door: Is Your Azure Tenant Talking Too Much? Part 2]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/the-invisible-front-door-is-your-azure-tenant-talking-too-much-part-2</guid>
                <pubDate>Wed, 25 Mar 2026 14:05:07 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/aad-username-enum-flow.png"
                    length="86076"
                />
                                    <category>Personal Blog</category>
                            </item>
                    <item>
                <title><![CDATA[The Invisible Front Door: Is Your Azure Tenant Talking Too Much? Part 1]]></title>
                <link>https://alichisom.com/the-invisible-front-door-is-your-azure-tenant-talking-too-much-part-1</link>
                <description><![CDATA[The Invisible Front Door: Is Your Azure Tenant Talking Too Much? Part 1]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/the-invisible-front-door-is-your-azure-tenant-talking-too-much-part-1</guid>
                <pubDate>Wed, 25 Mar 2026 13:05:07 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/aad-username-enum-flow.png"
                    length="86076"
                />
                                    <category>Personal Blog</category>
                            </item>
                    <item>
                <title><![CDATA[API Hooking]]></title>
                <link>https://alichisom.com/api-hooking</link>
                <description><![CDATA[In this article, we’ve explored API Hooking using Microsoft Detours. We discussed how to intercept a simple Windows API function (MessageBoxA), modify its parameters, and then restore the original behavior. The example, though minimal, demonstrates the core principles that underlie more complex hooking scenarios—such as monitoring file access, intercepting network calls etc.]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/api-hooking</guid>
                <pubDate>Tue, 17 Mar 2026 13:08:14 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/screenshot-from-2026-03-17-13-14-01.png"
                    length="110549"
                />
                                    <category>Open Source Contributions</category>
                            </item>
                    <item>
                <title><![CDATA[AGENTIC AI: EMPOWERMENT BY INNOVATION OR PERIL BY PRECIPITATION?]]></title>
                <link>https://alichisom.com/agentic-ai-empowerment-by-innovation-or-peril-by-precipitation</link>
                <description><![CDATA[AGENTIC AI: EMPOWERMENT BY INNOVATION OR PERIL BY PRECIPITATION?]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/agentic-ai-empowerment-by-innovation-or-peril-by-precipitation</guid>
                <pubDate>Mon, 16 Mar 2026 09:53:41 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/d.png"
                    length="1212182"
                />
                                    <category>Personal Blog</category>
                            </item>
                    <item>
                <title><![CDATA[The Future of Cybersecurity Engineers is Local AI]]></title>
                <link>https://alichisom.com/the-future-of-cybersecurity-engineers-is-local-ai</link>
                <description><![CDATA[The Future of Cybersecurity Engineers is Local AI]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/the-future-of-cybersecurity-engineers-is-local-ai</guid>
                <pubDate>Wed, 11 Mar 2026 15:38:07 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/screenshot-from-2026-03-11-16-25-04.png"
                    length="81861"
                />
                                    <category>Personal Blog</category>
                            </item>
                    <item>
                <title><![CDATA[WHEN THE DIGITAL LAND IS DEFILED — THE CODE ITSELF RISES IN REVOLT 🛡️.]]></title>
                <link>https://alichisom.com/when-the-digital-land-is-defiled-the-code-itself-rises-in-revolt</link>
                <description><![CDATA[WHEN THE DIGITAL LAND IS DEFILED — THE CODE ITSELF RISES IN REVOLT 🛡️.]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/when-the-digital-land-is-defiled-the-code-itself-rises-in-revolt</guid>
                <pubDate>Mon, 09 Mar 2026 09:59:44 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/ff.png"
                    length="2092072"
                />
                                    <category>Personal Blog</category>
                            </item>
                    <item>
                <title><![CDATA[Phishing Campaign Alert – Targeting Business Emails]]></title>
                <link>https://alichisom.com/phishing-campaign-alert-targeting-business-emails</link>
                <description><![CDATA[Phishing Campaign Alert – Targeting Business Emails]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/phishing-campaign-alert-targeting-business-emails</guid>
                <pubDate>Thu, 26 Feb 2026 11:36:17 +0000</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://alichisom.com/storage/blog-image/untitled.jpeg"
                    length="11668"
                />
                                    <category>Cybersecurity</category>
                            </item>
                    <item>
                <title><![CDATA[The Brutal Truth About Real-World Hacking — Final/Part 3]]></title>
                <link>https://alichisom.com/the-brutal-truth-about-real-world-hacking-finalpart-3</link>
                <description><![CDATA[The Brutal Truth About Real-World Hacking — Final/Part 3]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/the-brutal-truth-about-real-world-hacking-finalpart-3</guid>
                <pubDate>Thu, 19 Feb 2026 17:09:58 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/part-3.png"
                    length="472465"
                />
                                    <category>Personal Blog</category>
                            </item>
                    <item>
                <title><![CDATA[The Brutal Truth About Real-World Hacking — Part 2]]></title>
                <link>https://alichisom.com/the-brutal-truth-about-real-world-hacking-part-2</link>
                <description><![CDATA[The Brutal Truth About Real-World Hacking — Part 2]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/the-brutal-truth-about-real-world-hacking-part-2</guid>
                <pubDate>Thu, 19 Feb 2026 15:39:30 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/part-2.png"
                    length="458915"
                />
                                    <category>Personal Blog</category>
                            </item>
                    <item>
                <title><![CDATA[The Brutal Truth About Real-World Hacking — Part 1]]></title>
                <link>https://alichisom.com/the-brutal-truth-about-real-world-hacking-part-1</link>
                <description><![CDATA[The Brutal Truth About Real-World Hacking — Part 1]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/the-brutal-truth-about-real-world-hacking-part-1</guid>
                <pubDate>Thu, 19 Feb 2026 14:10:53 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/part-1.png"
                    length="447803"
                />
                                    <category>Tutorials</category>
                            </item>
                    <item>
                <title><![CDATA[The Hacker's Mindset  Part 3 / Final]]></title>
                <link>https://alichisom.com/the-hackers-mindset-part-3-final</link>
                <description><![CDATA[The Hacker's Mindset  Part 3 / Final]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/the-hackers-mindset-part-3-final</guid>
                <pubDate>Sat, 14 Feb 2026 17:30:40 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/ssss.png"
                    length="309112"
                />
                                    <category>Tutorials</category>
                            </item>
                    <item>
                <title><![CDATA[The Hacker's Mindset  Part 2]]></title>
                <link>https://alichisom.com/the-hackers-mindset-part-2</link>
                <description><![CDATA[The Hacker's Mindset  Part 2]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/the-hackers-mindset-part-2</guid>
                <pubDate>Sat, 14 Feb 2026 16:49:16 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/sss.png"
                    length="296680"
                />
                                    <category>Tutorials</category>
                            </item>
                    <item>
                <title><![CDATA[The Hacker's Mindset  Part 1]]></title>
                <link>https://alichisom.com/the-hackers-mindset-part-1</link>
                <description><![CDATA[The Hacker's Mindset  Part 1]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/the-hackers-mindset-part-1</guid>
                <pubDate>Sat, 14 Feb 2026 16:22:15 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/ss.png"
                    length="286785"
                />
                                    <category>Tutorials</category>
                            </item>
                    <item>
                <title><![CDATA[Malware Analysis Deep Dive: GhostWeaver RAT (PowerShell Crypto-Infostealer)]]></title>
                <link>https://alichisom.com/malware-analysis-deep-dive-ghostweaver-rat-powershell-crypto-infostealer</link>
                <description><![CDATA[In-depth analysis of a highly obfuscated PowerShell-based infostealer I’ve classified as GhostWeaver RAT.]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/malware-analysis-deep-dive-ghostweaver-rat-powershell-crypto-infostealer</guid>
                <pubDate>Wed, 11 Feb 2026 08:58:34 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/aa-1.png"
                    length="464598"
                />
                                    <category>Open Source Contributions</category>
                            </item>
                    <item>
                <title><![CDATA[Beyond Day One: Navigating the Challenges of Day One Hundred and Beyond]]></title>
                <link>https://alichisom.com/beyond-day-one-navigating-the-challenges-of-day-one-hundred-and-beyond</link>
                <description><![CDATA[The journey “Beyond Day One” is where vision meets reality. It is a testament to the foresight embedded in the original design and the adaptability of the team that shepherds it.]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/beyond-day-one-navigating-the-challenges-of-day-one-hundred-and-beyond</guid>
                <pubDate>Thu, 22 Jan 2026 08:33:20 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/aa.png"
                    length="633148"
                />
                                    <category>Open Source Contributions</category>
                            </item>
                    <item>
                <title><![CDATA[What is Bug Bounty Hunting? The Ethical Hacker’s Modern Gold Rush]]></title>
                <link>https://alichisom.com/what-is-bug-bounty-hunting-the-ethical-hackers-modern-gold-rush</link>
                <description><![CDATA[A deep dive into why open source matters to me, how it helped me grow as a developer, and why every developer should contribute to open source.]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/what-is-bug-bounty-hunting-the-ethical-hackers-modern-gold-rush</guid>
                <pubDate>Sat, 27 Dec 2025 07:52:26 +0000</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://alichisom.com/storage/blog-image/1743012221276.jpeg"
                    length="64163"
                />
                                    <category>Cybersecurity</category>
                            </item>
                    <item>
                <title><![CDATA[NEW RELEASE: Digital Forensics Playbook — Beyond National Defense Standards]]></title>
                <link>https://alichisom.com/new-release-digital-forensics-playbook-beyond-national-defense-standards</link>
                <description><![CDATA[This playbook represents a significant evolution in digital forensics, moving beyond isolated examination to an integrated, automated, and intelligence-driven discipline.]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/new-release-digital-forensics-playbook-beyond-national-defense-standards</guid>
                <pubDate>Sat, 27 Dec 2025 14:10:26 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/gemini-generated-image-2efvzo2efvzo2efv.png"
                    length="1641448"
                />
                                    <category>Personal Blog</category>
                            </item>
                    <item>
                <title><![CDATA[Real-World Incident Response: From Server Artifacts to Confirmed Compromise]]></title>
                <link>https://alichisom.com/real-world-incident-response-from-server-artifacts-to-confirmed-compromise</link>
                <description><![CDATA[A critical reminder that devastating breaches often stem from foundational security failures rather than exotic exploits.]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/real-world-incident-response-from-server-artifacts-to-confirmed-compromise</guid>
                <pubDate>Sun, 28 Dec 2025 17:39:27 +0000</pubDate>
                <enclosure
                    type="image/png"
                    url="http://alichisom.com/storage/blog-image/gemini-generated-image-q1aihyq1aihyq1ai.png"
                    length="104313"
                />
                                    <category>Personal Blog</category>
                            </item>
                    <item>
                <title><![CDATA[The MITRE ATT&amp;CK Framework Explained: A Cyber Defender’s Secret Weapon]]></title>
                <link>https://alichisom.com/the-mitre-attck-framework-explained-a-cyber-defenders-secret-weapon</link>
                <description><![CDATA[MITRE ATT&amp;CK shifts security from reactive to proactive by enabling defenders to master the adversary’s playbook and build resilient, threat-informed defenses.]]></description>
                                    <author><![CDATA[Ali Chisom <alichisom5@gmail.com>]]></author>
                                <guid>https://alichisom.com/the-mitre-attck-framework-explained-a-cyber-defenders-secret-weapon</guid>
                <pubDate>Fri, 26 Dec 2025 22:02:56 +0000</pubDate>
                <enclosure
                    type="image/jpeg"
                    url="http://alichisom.com/storage/blog-image/1742238312036.jpeg"
                    length="22856"
                />
                                    <category>Cybersecurity</category>
                            </item>
            </channel>
</rss>
