<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Mohammed Alrashid — Notebook</title>
    <link>https://malrashid.com/notebook</link>
    <description>Technical security articles on zero-trust architecture, offensive security, cloud hardening, and more.</description>
    <language>en-us</language>
    <lastBuildDate>Wed, 20 May 2026 18:33:38 GMT</lastBuildDate>
    <atom:link href="https://malrashid.com/feed.xml" rel="self" type="application/rss+xml"/>
    <item>
      <title>Securing AI Agents and the Dangers of OpenClaw</title>
      <link>https://malrashid.com/notebook/securing-ai-agents-dangers-of-openclaw</link>
      <guid isPermaLink="true">https://malrashid.com/notebook/securing-ai-agents-dangers-of-openclaw</guid>
      <description>Autonomous AI agents are being deployed with tool access, memory, and decision-making authority. OpenClaw and similar frameworks make this dangerously easy — here&apos;s why the security model is broken.</description>
      <pubDate>Sat, 10 May 2025 00:00:00 GMT</pubDate>
      <category>AI SECURITY</category>
      <category>ARCHITECTURE</category>
      <category>RED TEAM</category>
    </item>
    <item>
      <title>CAN Bus Hacking: Attacking and Defending the Automotive Backbone</title>
      <link>https://malrashid.com/notebook/canbus-hacking-automotive-security</link>
      <guid isPermaLink="true">https://malrashid.com/notebook/canbus-hacking-automotive-security</guid>
      <description>A deep dive into the CAN bus protocol — how it works, why it&apos;s vulnerable, and what happens when attackers gain access to the backbone of every modern vehicle.</description>
      <pubDate>Sat, 12 Apr 2025 00:00:00 GMT</pubDate>
      <category>RED TEAM</category>
      <category>IOT</category>
      <category>AUTOMOTIVE</category>
    </item>
    <item>
      <title>Zero Trust Networking and SASE: Collapsing the Perimeter</title>
      <link>https://malrashid.com/notebook/zero-trust-networking-and-sase</link>
      <guid isPermaLink="true">https://malrashid.com/notebook/zero-trust-networking-and-sase</guid>
      <description>Traditional VPNs and perimeter firewalls are failing. SASE and zero trust networking merge identity, policy, and connectivity into a single fabric — here&apos;s how the architecture actually works.</description>
      <pubDate>Tue, 18 Mar 2025 00:00:00 GMT</pubDate>
      <category>NETWORKING</category>
      <category>ARCHITECTURE</category>
      <category>ZERO-TRUST</category>
    </item>
    <item>
      <title>Zero Trust Architecture in Industrial IoT</title>
      <link>https://malrashid.com/notebook/zero-trust-architecture-industrial-iot</link>
      <guid isPermaLink="true">https://malrashid.com/notebook/zero-trust-architecture-industrial-iot</guid>
      <description>How Zero Trust Architecture reshapes the security posture of industrial environments by eliminating implicit trust at every layer of the stack.</description>
      <pubDate>Thu, 24 Oct 2024 00:00:00 GMT</pubDate>
      <category>ARCHITECTURE</category>
      <category>IOT</category>
      <category>ZERO-TRUST</category>
    </item>
  </channel>
</rss>