<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Jacob Soo &#8211; Cerbero Blog</title>
	<atom:link href="https://blog.cerbero.io/author/jacob/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.cerbero.io</link>
	<description></description>
	<lastBuildDate>Sat, 23 Jul 2016 14:07:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://blog.cerbero.io/wp-content/uploads/2023/09/cropped-pro_icon_512-32x32.png</url>
	<title>Jacob Soo &#8211; Cerbero Blog</title>
	<link>https://blog.cerbero.io</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">184292133</site>	<item>
		<title>Extracting C&#038;C from Android Malware</title>
		<link>https://blog.cerbero.io/extracting-cc-from-android-malware/</link>
					<comments>https://blog.cerbero.io/extracting-cc-from-android-malware/#respond</comments>
		
		<dc:creator><![CDATA[Jacob Soo]]></dc:creator>
		<pubDate>Sat, 23 Jul 2016 14:07:33 +0000</pubDate>
				<category><![CDATA[Suite Standard]]></category>
		<category><![CDATA[Android]]></category>
		<category><![CDATA[C&C]]></category>
		<guid isPermaLink="false">http://cerbero-blog.com/?p=1633</guid>

					<description><![CDATA[Even though AndroRat (http://www.symantec.com/connect/blogs/remote-access-tool-takes-aim-android-apk-binder) had been around for eons and the source code was made available (https://github.com/DesignativeDave/androrat) but there are many new ones popping out everyday. Today I will go through with you on how we can make Profiler work extra hard for us.  I will try to fill in required information about where to &#8230; <a href="https://blog.cerbero.io/extracting-cc-from-android-malware/" class="more-link">Continue reading<span class="screen-reader-text"> "Extracting C&#038;C from Android Malware"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/extracting-cc-from-android-malware/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1633</post-id>	</item>
		<item>
		<title>Malware in a MSG</title>
		<link>https://blog.cerbero.io/malware-in-a-msg/</link>
					<comments>https://blog.cerbero.io/malware-in-a-msg/#comments</comments>
		
		<dc:creator><![CDATA[Jacob Soo]]></dc:creator>
		<pubDate>Fri, 13 May 2016 06:08:04 +0000</pubDate>
				<category><![CDATA[Suite Standard]]></category>
		<category><![CDATA[Email]]></category>
		<category><![CDATA[Malware]]></category>
		<category><![CDATA[msg]]></category>
		<category><![CDATA[Outlook]]></category>
		<guid isPermaLink="false">http://cerbero-blog.com/?p=1625</guid>

					<description><![CDATA[Even though sending malware via zipped attachments in spam emails is nothing new and had been around for eons but many people are still puzzled at how it works. Thus, I will go through with you on how to do it with Profiler. I will try to fill in required information about where to look &#8230; <a href="https://blog.cerbero.io/malware-in-a-msg/" class="more-link">Continue reading<span class="screen-reader-text"> "Malware in a MSG"</span></a>]]></description>
		
					<wfw:commentRss>https://blog.cerbero.io/malware-in-a-msg/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1625</post-id>	</item>
	</channel>
</rss>
