<?xml version="1.0" encoding="UTF-8" ?>
<rss version="2.0">
    <channel>
      <title>Nethound</title>
      <link>https://garden.nethound.sh</link>
      <description>Last 10 notes on Nethound</description>
      <generator>Nethound -- garden.nethound.sh</generator>
      <item>
    <title>About</title>
    <link>https://garden.nethound.sh/about</link>
    <guid>https://garden.nethound.sh/about</guid>
    <description><![CDATA[ How Nethound is built — the automated pipeline, dark-server hosting architecture, and contact. ]]></description>
    <pubDate>Sun, 15 Mar 2026 01:40:36 GMT</pubDate>
  </item><item>
    <title>Cyber News Digest — 2026-03-14</title>
    <link>https://garden.nethound.sh/news/news-2026-03-14</link>
    <guid>https://garden.nethound.sh/news/news-2026-03-14</guid>
    <description><![CDATA[ Cyber News Digest — 2026-03-14 Auto-generated by the nethound.sh news pipeline. 60 articles summarized. ]]></description>
    <pubDate>Sat, 14 Mar 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>scope-recon: A Rust-Based Multi-Source IP Threat Intelligence Tool</title>
    <link>https://garden.nethound.sh/scope-recon-revamped</link>
    <guid>https://garden.nethound.sh/scope-recon-revamped</guid>
    <description><![CDATA[ scope-recon is a Rust binary that queries 12 threat intelligence sources in parallel and renders verdicts in a terminal UI, with optional LLM-synthesized threat assessments. ]]></description>
    <pubDate>Mon, 09 Mar 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>scope-recon: A Rust-Based Multi-Source IP Threat Intelligence Tool</title>
    <link>https://garden.nethound.sh/scope-recon</link>
    <guid>https://garden.nethound.sh/scope-recon</guid>
    <description><![CDATA[ A detailed technical walkthrough of scope-recon, a Rust tool that aggregates IP threat intelligence from 11 concurrent API sources, including its async architecture, TUI design, verdict logic, cache system, and API key security practices. ]]></description>
    <pubDate>Sun, 08 Mar 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>News Roundups</title>
    <link>https://garden.nethound.sh/news/</link>
    <guid>https://garden.nethound.sh/news/</guid>
    <description><![CDATA[ Auto-generated CTI news digests, summarized and scored by the nethound.sh pipeline. ]]></description>
    <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Cyber News Digest — 2026-03-05</title>
    <link>https://garden.nethound.sh/news/news-2026-03-05</link>
    <guid>https://garden.nethound.sh/news/news-2026-03-05</guid>
    <description><![CDATA[ Cyber News Digest — 2026-03-05 Auto-generated by the nethound.sh news pipeline. 57 articles summarized. ]]></description>
    <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Sovereign Dark Server: Zero Inbound Exposure VPS Architecture</title>
    <link>https://garden.nethound.sh/the-dark-server-guide</link>
    <guid>https://garden.nethound.sh/the-dark-server-guide</guid>
    <description><![CDATA[ A structured implementation guide for building a VPS with no publicly reachable inbound ports, using kernel hardening, localhost service binding, and Cloudflare Tunnel as the sole ingress path. ]]></description>
    <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Operational Security (OPSEC): Fundamentals, Countermeasures, and Case Study</title>
    <link>https://garden.nethound.sh/basic-opsec</link>
    <guid>https://garden.nethound.sh/basic-opsec</guid>
    <description><![CDATA[ A comprehensive reference covering the OPSEC process, cryptographic controls, physical security, secure communications architecture, and a forensic breakdown of OPSEC failures in the BreachForums case. ]]></description>
    <pubDate>Wed, 04 Mar 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Cyber Attack Frameworks: The Kill Chain, Diamond Model, and MITRE ATT&amp;CK</title>
    <link>https://garden.nethound.sh/cti-frameworks</link>
    <guid>https://garden.nethound.sh/cti-frameworks</guid>
    <description><![CDATA[ A structured reference covering the Lockheed Martin Cyber Kill Chain, the Diamond Model of Intrusion Analysis, and MITRE ATT&CK, illustrated with real-world case studies and adversary examples. ]]></description>
    <pubDate>Wed, 04 Mar 2026 00:00:00 GMT</pubDate>
  </item><item>
    <title>Building a Pocket-Sized CTI Hypervisor: Fedora, KVM, and 12TB NVMe on the Minisforum MS-A2</title>
    <link>https://garden.nethound.sh/lab-setup</link>
    <guid>https://garden.nethound.sh/lab-setup</guid>
    <description><![CDATA[ A setup guide for deploying a bare-metal Fedora KVM hypervisor on the Minisforum MS-A2 mini PC, covering hardware selection, Btrfs storage pool configuration, SELinux policy, and libvirt integration as the foundation for a CTI and malware analysis lab. ]]></description>
    <pubDate>Wed, 04 Mar 2026 00:00:00 GMT</pubDate>
  </item>
    </channel>
  </rss>