<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"><channel><title>Yazoul Security - Learn</title><description>In-depth cybersecurity guides, cheat sheets, and reference materials.</description><link>https://www.yazoul.net/learn/</link><language>en-us</language><copyright>Copyright 2026 Yazoul Security - https://www.yazoul.net/learn</copyright><managingEditor>contact@yazoul.net (Yazoul Security)</managingEditor><webMaster>contact@yazoul.net (Yazoul Security)</webMaster><image><url>https://www.yazoul.net/learn/icon-128.png</url><title>Yazoul Security - Learn</title><link>https://www.yazoul.net/learn</link></image><atom:link href="https://www.yazoul.net/learn/rss.xml" rel="self" type="application/rss+xml" xmlns:atom="http://www.w3.org/2005/Atom"/><item><title>SQL Injection Attacks: Exploitation, Detection, and Modern Prevention Techniques</title><link>https://www.yazoul.net/learn/resource/sql-injection-attacks-exploitation-detection-modern-prevention-techniques</link><guid isPermaLink="true">https://www.yazoul.net/learn/resource/sql-injection-attacks-exploitation-detection-modern-prevention-techniques</guid><description>&lt;p&gt;&lt;strong&gt;GUIDE&lt;/strong&gt; - 30 min read&lt;/p&gt;
&lt;p&gt;Learn how SQL injection attacks work, how to detect them, and modern prevention techniques to secure your databases against this common web vulnerability.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/learn/resource/sql-injection-attacks-exploitation-detection-modern-prevention-techniques&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/learn&quot;&gt;Yazoul Security - Learn&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate><category>guide</category><category>Security</category><category>CyberSecurity</category><category>SQL injection</category><category>web security</category><category>database security</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>XSS Payload Cheat Sheet (Updated 2026 Edition)</title><link>https://www.yazoul.net/learn/resource/xss-payload-cheat-sheet</link><guid isPermaLink="true">https://www.yazoul.net/learn/resource/xss-payload-cheat-sheet</guid><description>&lt;p&gt;&lt;strong&gt;CHEAT-SHEET&lt;/strong&gt; - 19 min read&lt;/p&gt;
&lt;p&gt;Comprehensive updated XSS payload cheat sheet for penetration testers and developers. Includes modern payloads, bypass techniques, and security testing examples for 2026 web applications.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/learn/resource/xss-payload-cheat-sheet&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/learn&quot;&gt;Yazoul Security - Learn&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Wed, 01 Apr 2026 00:00:00 GMT</pubDate><category>cheat-sheet</category><category>Security</category><category>CyberSecurity</category><category>xss</category><category>web-security</category><category>penetration-testing</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>The OSI Model Explained for Security Engineers (Mapped to Modern Attack Techniques)</title><link>https://www.yazoul.net/learn/resource/osi-model-explained-for-security-engineers-mapped-to-modern-attack-techniques</link><guid isPermaLink="true">https://www.yazoul.net/learn/resource/osi-model-explained-for-security-engineers-mapped-to-modern-attack-techniques</guid><description>&lt;p&gt;&lt;strong&gt;GUIDE&lt;/strong&gt; - 28 min read&lt;/p&gt;
&lt;p&gt;Learn how the OSI model&apos;s 7 layers map to modern cybersecurity threats. Essential reading for security engineers to understand attack vectors and defense strategies.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/learn/resource/osi-model-explained-for-security-engineers-mapped-to-modern-attack-techniques&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/learn&quot;&gt;Yazoul Security - Learn&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Sun, 15 Mar 2026 00:00:00 GMT</pubDate><category>guide</category><category>Security</category><category>CyberSecurity</category><category>OSI Model</category><category>Network Security</category><category>Attack Techniques</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>Complete Guide to CVSS v3.1 and v4.0 Scoring (With Real CVE Case Studies)</title><link>https://www.yazoul.net/learn/resource/complete-guide-to-cvss-v3-1-and-v4-0-scoring-with-real-cve-case-studies</link><guid isPermaLink="true">https://www.yazoul.net/learn/resource/complete-guide-to-cvss-v3-1-and-v4-0-scoring-with-real-cve-case-studies</guid><description>&lt;p&gt;&lt;strong&gt;GUIDE&lt;/strong&gt; - 27 min read&lt;/p&gt;
&lt;p&gt;Learn CVSS v3.1 and v4.0 scoring with practical CVE case studies. Understand vulnerability severity metrics, scoring differences, and real-world application for cybersecurity professionals.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/learn/resource/complete-guide-to-cvss-v3-1-and-v4-0-scoring-with-real-cve-case-studies&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/learn&quot;&gt;Yazoul Security - Learn&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Sun, 01 Mar 2026 00:00:00 GMT</pubDate><category>guide</category><category>Security</category><category>CyberSecurity</category><category>CVSS</category><category>vulnerability-scoring</category><category>CVE</category><author>Yazoul Security (contact@yazoul.net)</author></item><item><title>How to Build an Effective Vulnerability Management Program</title><link>https://www.yazoul.net/learn/resource/how-to-build-effective-vulnerability-management-program</link><guid isPermaLink="true">https://www.yazoul.net/learn/resource/how-to-build-effective-vulnerability-management-program</guid><description>&lt;p&gt;&lt;strong&gt;GUIDE&lt;/strong&gt; - 24 min read&lt;/p&gt;
&lt;p&gt;Step-by-step guide to establishing a comprehensive vulnerability management program. Learn key components, implementation strategies, and best practices for continuous security improvement.&lt;/p&gt;
&lt;p&gt;&lt;a href=&quot;https://www.yazoul.net/learn/resource/how-to-build-effective-vulnerability-management-program&quot;&gt;Read the full article on Yazoul Security&lt;/a&gt;&lt;/p&gt;
&lt;hr/&gt;
&lt;p&gt;&lt;em&gt;Published by &lt;a href=&quot;https://www.yazoul.net/learn&quot;&gt;Yazoul Security - Learn&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description><pubDate>Thu, 19 Feb 2026 00:00:00 GMT</pubDate><category>guide</category><category>Security</category><category>CyberSecurity</category><category>vulnerability management</category><category>cybersecurity</category><category>risk management</category><author>Yazoul Security (contact@yazoul.net)</author></item></channel></rss>