<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
 xmlns:content="http://purl.org/rss/1.0/modules/content/"
 xmlns:wfw="http://wellformedweb.org/CommentAPI/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:atom="http://www.w3.org/2005/Atom"
 xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
 xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
 >

<channel>
 <title>News Archives - 7ASecurity Blog</title>
 <atom:link href="https://7asecurity.com/blog/category/news/feed/" rel="self" type="application/rss+xml" />
 <link>https://7asecurity.com/blog/</link>
 <description>Stay ahead with top security tips, tools, and  insights from the official 7ASecurity blog.  Learn more from 7ASecurity now.</description>
 <lastBuildDate>Fri, 27 Mar 2026 16:15:13 +0000</lastBuildDate>
 <language>en-US</language>
 <sy:updatePeriod>
 hourly </sy:updatePeriod>
 <sy:updateFrequency>
 1 </sy:updateFrequency>


<image>
 <url>https://7asecurity.com/blog/contents/uploads/2019/06/favicon.ico</url>
 <title>News Archives - 7ASecurity Blog</title>
 <link>https://7asecurity.com/blog/</link>
 <width>32</width>
 <height>32</height>
</image> 
 <item>
  <title>7ASecurity’s Szymon Grzybowski Wins OSTIF’s 2025 Bug of the Year Award</title>
  <link>https://7asecurity.com/blog/2026/03/7asecurity-ostif-bug-of-the-year-award-2025/</link>

  <dc:creator><![CDATA[Admin]]></dc:creator>
  <pubDate>Fri, 27 Mar 2026 09:37:21 +0000</pubDate>
    <category><![CDATA[News]]></category>
  <category><![CDATA[7ASecurity]]></category>
  <category><![CDATA[Bug of the Year Award]]></category>
  <category><![CDATA[conda-forge]]></category>
  <category><![CDATA[CVE-2025-31484]]></category>
  <category><![CDATA[Open Source Security]]></category>
  <category><![CDATA[OSTIF]]></category>
  <category><![CDATA[Security Audit]]></category>
  <category><![CDATA[supply chain security]]></category>
  <category><![CDATA[Szymon Grzybowski]]></category>


     <description><![CDATA[<p>OSTIF selected CVE-2025-31484 from 7ASecurity’s conda-forge audit as its 2025 Bug of the Year, recognizing Szymon Grzybowski’s high-impact supply-chain finding.</p>
<p>The post <a rel="nofollow" href="https://7asecurity.com/blog/2026/03/7asecurity-ostif-bug-of-the-year-award-2025/">7ASecurity’s Szymon Grzybowski Wins OSTIF’s 2025 Bug of the Year Award</a> appeared first on <a rel="nofollow" href="https://7asecurity.com/blog/">7ASecurity Blog</a>.</p>
]]></description>



   </item>
  <item>
  <title>How 7ASecurity Audits Work: Interim Findings, Manual Testing, and Free Fix Verification</title>
  <link>https://7asecurity.com/blog/2026/02/how-7asecurity-audits-work/</link>

  <dc:creator><![CDATA[Admin]]></dc:creator>
  <pubDate>Fri, 06 Feb 2026 06:24:49 +0000</pubDate>
    <category><![CDATA[News]]></category>
  <category><![CDATA[Application Security]]></category>
  <category><![CDATA[Fix Verification]]></category>
  <category><![CDATA[Open Source Security]]></category>
  <category><![CDATA[OWASP]]></category>
  <category><![CDATA[OWASP ASVS]]></category>
  <category><![CDATA[OWASP Cheat Sheets]]></category>
  <category><![CDATA[OWASP Platinum]]></category>
  <category><![CDATA[OWASP Testing Guide]]></category>
  <category><![CDATA[Penetration Testing]]></category>
  <category><![CDATA[Pentest]]></category>
  <category><![CDATA[Secure Code Audit]]></category>
  <category><![CDATA[Secure Code Review]]></category>
  <category><![CDATA[Security Audit]]></category>
  <category><![CDATA[Threat modeling]]></category>
  <category><![CDATA[vulnerability management]]></category>


     <description><![CDATA[<p>A clear, practical walkthrough of the 7ASecurity audit process: threat-model driven scoping, a dedicated communication channel with interim findings, and free fix verification—so issues are fixed, not just reported.</p>
<p>The post <a rel="nofollow" href="https://7asecurity.com/blog/2026/02/how-7asecurity-audits-work/">How 7ASecurity Audits Work: Interim Findings, Manual Testing, and Free Fix Verification</a> appeared first on <a rel="nofollow" href="https://7asecurity.com/blog/">7ASecurity Blog</a>.</p>
]]></description>



   </item>
  <item>
  <title>What ‘Quality Pentests’ Really Mean: Interview with OWASP Executive Director Andrew van der Stock</title>
  <link>https://7asecurity.com/blog/2026/01/owasp-executive-director-interview-7asecurity/</link>

  <dc:creator><![CDATA[Admin]]></dc:creator>
  <pubDate>Fri, 23 Jan 2026 06:41:47 +0000</pubDate>
    <category><![CDATA[News]]></category>
  <category><![CDATA[AI security testing]]></category>
  <category><![CDATA[Andrew van der Stock]]></category>
  <category><![CDATA[Application Security]]></category>
  <category><![CDATA[Business Logic Vulnerabilities]]></category>
  <category><![CDATA[Fix Verification]]></category>
  <category><![CDATA[Open Source Security]]></category>
  <category><![CDATA[OWASP]]></category>
  <category><![CDATA[OWASP ASVS]]></category>
  <category><![CDATA[OWASP Cheat Sheets]]></category>
  <category><![CDATA[OWASP Platinum]]></category>
  <category><![CDATA[OWASP Testing Guide]]></category>
  <category><![CDATA[Penetration Testing]]></category>
  <category><![CDATA[Secure Code Audit]]></category>
  <category><![CDATA[Secure Code Review]]></category>
  <category><![CDATA[Threat modeling]]></category>


     <description><![CDATA[<p>OWASP Executive Director Andrew van der Stock interviews 7ASecurity CEO Abraham Aranguren on what “quality pentesting” really means: threat-model driven scoping, researcher-led testing, interim findings, and free fix verification.</p>
<p>The post <a rel="nofollow" href="https://7asecurity.com/blog/2026/01/owasp-executive-director-interview-7asecurity/">What ‘Quality Pentests’ Really Mean: Interview with OWASP Executive Director Andrew van der Stock</a> appeared first on <a rel="nofollow" href="https://7asecurity.com/blog/">7ASecurity Blog</a>.</p>
]]></description>



   </item>
  <item>
  <title>Security Weekly News 22 June 2011 - Summary</title>
  <link>https://7asecurity.com/blog/2011/06/security-weekly-news-22-june-2011/</link>

  <dc:creator><![CDATA[Admin]]></dc:creator>
  <pubDate>Wed, 22 Jun 2011 10:16:00 +0000</pubDate>
    <category><![CDATA[News]]></category>
  <category><![CDATA[Security News]]></category>


     <description><![CDATA[<p>In case you missed it, I put together a blog post last week on the OWASP AppSec EU Security Conference in Trinity College, Dublin, Ireland with slides, pictures and experience Feedback and/or contributions to make this better are appreciated and welcome Highlighted quotes of the week: "I would recommend to store at least half a &#8230;</p>
<p>The post <a rel="nofollow" href="https://7asecurity.com/blog/2011/06/security-weekly-news-22-june-2011/">Security Weekly News 22 June 2011 - Summary</a> appeared first on <a rel="nofollow" href="https://7asecurity.com/blog/">7ASecurity Blog</a>.</p>
]]></description>



   </item>
  <item>
  <title>Security Weekly News 22 June 2011 - Full List</title>
  <link>https://7asecurity.com/blog/2011/06/security-weekly-news-22-june-2011-full/</link>

  <dc:creator><![CDATA[Admin]]></dc:creator>
  <pubDate>Wed, 22 Jun 2011 10:03:00 +0000</pubDate>
    <category><![CDATA[News]]></category>
  <category><![CDATA[Security News]]></category>


     <description><![CDATA[<p>Category Index Hacking Incidents / Cybercrime Unpatched Vulnerabilities Software Updates Business Case for Security Web Technologies Network Security Cloud Security Crytography Privacy Security FAIL General Outrageous Funny / Hilarious Hacking Incidents / Cybercrime Document claims LulzSec has obtained 2011 UK Census records  [www.v3.co.uk] Infamous hacking group LulzSec is claiming to have obtained the entire 2011 &#8230;</p>
<p>The post <a rel="nofollow" href="https://7asecurity.com/blog/2011/06/security-weekly-news-22-june-2011-full/">Security Weekly News 22 June 2011 - Full List</a> appeared first on <a rel="nofollow" href="https://7asecurity.com/blog/">7ASecurity Blog</a>.</p>
]]></description>



   </item>
  <item>
  <title>Security Weekly News 17 June 2011 - Summary</title>
  <link>https://7asecurity.com/blog/2011/06/security-weekly-news-17-june-2011/</link>

  <dc:creator><![CDATA[Admin]]></dc:creator>
  <pubDate>Fri, 17 Jun 2011 06:12:00 +0000</pubDate>
    <category><![CDATA[News]]></category>
  <category><![CDATA[Security News]]></category>


     <description><![CDATA[<p>Smile! it's Friday! 🙂 In case you missed it I put together a blog post last week regarding my personal experience on the CISSP certification process, etc: CISSP exam, materials, preparation and experience Feedback and/or contributions to make this better are appreciated and welcome Highlighted quotes of the week: "A pen test should be a &#8230;</p>
<p>The post <a rel="nofollow" href="https://7asecurity.com/blog/2011/06/security-weekly-news-17-june-2011/">Security Weekly News 17 June 2011 - Summary</a> appeared first on <a rel="nofollow" href="https://7asecurity.com/blog/">7ASecurity Blog</a>.</p>
]]></description>



   </item>
  <item>
  <title>Security Weekly News 17 June 2011 - Full List</title>
  <link>https://7asecurity.com/blog/2011/06/security-weekly-news-17-june-2011-full/</link>

  <dc:creator><![CDATA[Admin]]></dc:creator>
  <pubDate>Fri, 17 Jun 2011 04:53:00 +0000</pubDate>
    <category><![CDATA[News]]></category>
  <category><![CDATA[Security News]]></category>


     <description><![CDATA[<p>Category Index Hacking Incidents / Cybercrime Unpatched vulnerabilities Software Updates Business Case for Security Web Technologies Network Security Forensics / Reverse Engineering Cryptography Wireless Security Mobile Security Cloud Security Privacy / Censorship Security FAIL Off Topic Funny Hacking Incidents / Cybercrime Incident Analysis: Million Dollars Lost In A Minute  [carnal0wnage.attackresearch.com] Dudes, I and two other &#8230;</p>
<p>The post <a rel="nofollow" href="https://7asecurity.com/blog/2011/06/security-weekly-news-17-june-2011-full/">Security Weekly News 17 June 2011 - Full List</a> appeared first on <a rel="nofollow" href="https://7asecurity.com/blog/">7ASecurity Blog</a>.</p>
]]></description>



   </item>
  <item>
  <title>Security Weekly News 3 June 2011 - Summary</title>
  <link>https://7asecurity.com/blog/2011/06/security-weekly-news-3-june-2011/</link>

  <dc:creator><![CDATA[Admin]]></dc:creator>
  <pubDate>Fri, 03 Jun 2011 07:39:00 +0000</pubDate>
    <category><![CDATA[News]]></category>
  <category><![CDATA[Security News]]></category>


     <description><![CDATA[<p>Thanks to Tadek and Shaun for contributing to this security bulletin NOTE: I am still trying to catch up, some news items are a bit dated but worth mentioning, I tried to put newer items at the top of each section so that if you see something dated you already saw you can skip the &#8230;</p>
<p>The post <a rel="nofollow" href="https://7asecurity.com/blog/2011/06/security-weekly-news-3-june-2011/">Security Weekly News 3 June 2011 - Summary</a> appeared first on <a rel="nofollow" href="https://7asecurity.com/blog/">7ASecurity Blog</a>.</p>
]]></description>



   </item>
  <item>
  <title>Security Weekly News 3 June 2011 - Full List</title>
  <link>https://7asecurity.com/blog/2011/06/security-weekly-news-3-june-2011-full/</link>

  <dc:creator><![CDATA[Admin]]></dc:creator>
  <pubDate>Fri, 03 Jun 2011 07:14:00 +0000</pubDate>
    <category><![CDATA[News]]></category>
  <category><![CDATA[Security News]]></category>


     <description><![CDATA[<p>Category Index Hacking Incidents / Cybercrime Unpatched vulnerabilities Software Updates Business Case for Security Web Technologies Network Security Database Security Mobile Security Cloud Security Privacy / Censorship General Security FAIL Funny Hacking Incidents / Cybercrime Bank of America data leak destroys trust  [www.latimes.com] The far-reaching fraud serves as a cautionary tale for all consumers who &#8230;</p>
<p>The post <a rel="nofollow" href="https://7asecurity.com/blog/2011/06/security-weekly-news-3-june-2011-full/">Security Weekly News 3 June 2011 - Full List</a> appeared first on <a rel="nofollow" href="https://7asecurity.com/blog/">7ASecurity Blog</a>.</p>
]]></description>



   </item>
  <item>
  <title>Security Weekly News 13 May 2011 - Summary</title>
  <link>https://7asecurity.com/blog/2011/05/security-weekly-news-13-may-2011/</link>

  <dc:creator><![CDATA[Admin]]></dc:creator>
  <pubDate>Fri, 13 May 2011 18:05:00 +0000</pubDate>
    <category><![CDATA[News]]></category>
  <category><![CDATA[Security News]]></category>


     <description><![CDATA[<p>Feedback and/or contributions to make this better are appreciated and welcome For those interested, there was also a technical article posted over the weekend: SSH Service: How to set it up in Backtrack without getting pwned Remember, sometimes the funny section has some food for thought 🙂 Highlighted quotes of the week: '"You have won &#8230;</p>
<p>The post <a rel="nofollow" href="https://7asecurity.com/blog/2011/05/security-weekly-news-13-may-2011/">Security Weekly News 13 May 2011 - Summary</a> appeared first on <a rel="nofollow" href="https://7asecurity.com/blog/">7ASecurity Blog</a>.</p>
]]></description>



   </item>
 </channel>
</rss>
