<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Debasis Biswas Blog</title>
    <link>https://blog.debasisbiswas.in</link>
    <description>Cybersecurity insights, development tutorials, and tech exploration by Debasis Biswas</description>
    <language>en</language>
    <lastBuildDate>Sun, 10 May 2026 08:38:59 GMT</lastBuildDate>
    <atom:link href="https://blog.debasisbiswas.in/rss.xml" rel="self" type="application/rss+xml"/>
    
    <item>
      <title>Copy Fail (CVE-2026-31431): A Universal Linux Privilege Escalation Vulnerability</title>
      <link>https://blog.debasisbiswas.in/blog/copy-fail-cve-2026-31431</link>
      <description>A technical breakdown of Copy Fail (CVE-2026-31431): the kernel root cause, high-level exploitation flow, why it’s unusually reliable across distros, and what defenders can do to reduce risk.</description>
      <pubDate>Sat, 02 May 2026 00:00:00 GMT</pubDate>
      <guid>https://blog.debasisbiswas.in/blog/copy-fail-cve-2026-31431</guid>
      <category>security</category>
      <category>linux</category>
      <category>kernel</category>
      <category>cve</category>
      <category>privilege-escalation</category>
      <category>devsecops</category>
      <category>kubernetes</category>
    </item>
    <item>
      <title>Getting Started with Ansible: Infrastructure Automation for DevSecOps ⚙️</title>
      <link>https://blog.debasisbiswas.in/blog/getting-started-with-ansible-devsecops</link>
      <description>A practical, beginner-friendly introduction to Ansible—inventory, playbooks, modules, and a real-world server hardening example you can adapt for DevSecOps.</description>
      <pubDate>Fri, 10 Apr 2026 00:00:00 GMT</pubDate>
      <guid>https://blog.debasisbiswas.in/blog/getting-started-with-ansible-devsecops</guid>
      <category>ansible</category>
      <category>devsecops</category>
      <category>infrastructure</category>
      <category>automation</category>
      <category>security</category>
      <category>linux</category>
    </item>
    <item>
      <title>How a Single Pull Request Can Turn Your CI/CD Pipeline Against You🚨</title>
      <link>https://blog.debasisbiswas.in/blog/why-self-hosted-ci-runners-can-turn-prs-into-a-security-nightmare</link>
      <description>Self-hosted CI runners execute untrusted PR code inside your network perimeter—turning a routine contribution workflow into a high-leverage compromise path.</description>
      <pubDate>Tue, 03 Feb 2026 00:00:00 GMT</pubDate>
      <guid>https://blog.debasisbiswas.in/blog/why-self-hosted-ci-runners-can-turn-prs-into-a-security-nightmare</guid>
      <category>security</category>
      <category>devsecops</category>
      <category>ci-cd</category>
      <category>github-actions</category>
      <category>supply-chain</category>
      <category>self-hosted</category>
      <category>vps</category>
    </item>
    <item>
      <title>React2Shell CVE (CVE-2025-55182): From React Frontend Bug to Remote Shell (RCE)</title>
      <link>https://blog.debasisbiswas.in/blog/react2shell-cve</link>
      <description>How abusing a React frontend vulnerability (CVE-2025-55182) can lead to remote code execution (RCE) and full server compromise.</description>
      <pubDate>Wed, 31 Dec 2025 00:00:00 GMT</pubDate>
      <guid>https://blog.debasisbiswas.in/blog/react2shell-cve</guid>
      <category>security</category>
      <category>cve</category>
      <category>react2shell</category>
      <category>vulnerability</category>
      <category>root access</category>
      <category>vps</category>
    </item>
    <item>
      <title>Introduction to Cloud Computing and Cybersecurity: A Beginner&apos;s Guide</title>
      <link>https://blog.debasisbiswas.in/blog/introduction-to-cloud</link>
      <description>A beginner-friendly overview of cloud computing and cybersecurity fundamentals.</description>
      <pubDate>Fri, 04 Jul 2025 00:00:00 GMT</pubDate>
      <guid>https://blog.debasisbiswas.in/blog/introduction-to-cloud</guid>
      <category>cloud</category>
      <category>cybersecurity</category>
      <category>beginner</category>
      <category>technology</category>
    </item>
    <item>
      <title>How to Use VM, VPS, and Docker Together for a Secure Cloud Workflow</title>
      <link>https://blog.debasisbiswas.in/blog/vm-vps-docker</link>
      <description>Learn how to combine virtual machines, VPS, and Docker for a robust and secure cloud development workflow.</description>
      <pubDate>Fri, 04 Jul 2025 00:00:00 GMT</pubDate>
      <guid>https://blog.debasisbiswas.in/blog/vm-vps-docker</guid>
      <category>cloud</category>
      <category>vm</category>
      <category>vps</category>
      <category>docker</category>
      <category>security</category>
    </item>
  </channel>
</rss>