Subscribe via RSS

Get every SCW post delivered to your favorite feed reader โ€” no algorithms, no missed updates.

What is RSS?

RSS lets you subscribe to websites and get new posts delivered automatically โ€” like email, but without the spam. You choose a feed reader app, add our feed URL, and every new SCW post appears there instantly.

No account needed on our site. No tracking. No algorithms deciding what you see.

Feed Schema for Integrators

SCW uses the scw: XML namespace (https://shimiscyberworld.com/ns/1.0) to expose structured threat intelligence alongside standard Atom fields. All fields are consistent across post types.

Classification

ElementValuesAlways Present
<scw:severity>CRITICAL, HIGH, MEDIUM, LOWYes
<scw:cvss>Attributes: score (float), severity, vectorNVD posts only
<scw:event_type>vulnerability, data-breach, ransomware, espionage, fraud, supply-chain, defacement, advisory, tool-release, research, otherYes
<scw:section>vulnerabilities, live-feedYes
<scw:tlp>TLP:CLEAR (default), TLP:GREEN, TLP:AMBERYes

Source Attribution

ElementAttributes
<scw:source>name โ€” generalized source name: "National Vulnerability Database", "SCW Curated Intelligence", or "SCW Daily Digest"
channel โ€” feed channel type: NVD, OSINT, or Digest

Source URLs and direct links are not included in the public feed. Full attribution is available on each post's page.

Vulnerability Data

ElementDescription
<scw:cwe>CWE weakness identifier (e.g., CWE-79, CWE-89). Multiple elements per entry.

Entities

ElementAttributes / Values
<scw:organization>name โ€” organization name
domain โ€” domain name (when known)
role โ€” victim, vendor, threat-actor, or other
<scw:threat_actor>Named threat group (e.g., APT28, LockBit, Handala)
<scw:malware>Malware family name (e.g., BlackCat, QakBot)
<scw:country>ISO 3166-1 alpha-2 code (e.g., US, IL, CN)

Indicators of Compromise

ElementAttributes
<scw:ioc>type โ€” ipv4, ipv6, domain, url, md5, sha1, sha256, email, affected-product
indicator โ€” the IOC value

Note: Generic stub IOCs (CVE IDs and CWE IDs repeated as indicators) are excluded from the feed. Only actionable IOCs are emitted.

MITRE ATT&CK

ElementAttributes
<scw:mitre>id โ€” technique ID (e.g., T1190, T1059.001)
name โ€” technique name
tactic โ€” tactic name (e.g., Initial Access, Execution)

Detection

ElementAttributes
<scw:detection>rules โ€” total detection rule count
free โ€” number of free/open rules

Tags (Atom <category>)

Standard Atom <category term="..."> elements. Tags follow a controlled vocabulary:

CategoryTags
Severitycritical, high-severity, medium-severity
Typevulnerability, cve, malware, ransomware, data-breach, phishing, threat-intel
Domaincloud, microsoft, identity, ai-security, tools
Weaknesscwe-79, cwe-89, etc.
VendorSlugified vendor names from affected products (e.g., wordpress, cisco)

Example Entry

<entry>
  <title>Critical RCE in Apache Struts</title>
  <published>2026-04-16T08:00:00Z</published>
  <category term="vulnerability" />
  <category term="cve" />
  <category term="critical" />
  <category term="cwe-94" />
  <category term="apache" />
  <scw:severity>CRITICAL</scw:severity>
  <scw:cvss score="9.8" severity="CRITICAL" vector="CVSS:3.1/..." />
  <scw:event_type>vulnerability</scw:event_type>
  <scw:section>vulnerabilities</scw:section>
  <scw:tlp>TLP:CLEAR</scw:tlp>
  <scw:source name="National Vulnerability Database" channel="NVD" />
  <scw:cwe>CWE-94</scw:cwe>
  <scw:organization name="Apache" domain="apache.org" role="vendor" />
  <scw:mitre id="T1190" name="Exploit Public-Facing Application" tactic="Initial Access" />
  <scw:detection rules="3" free="1" />
</entry>