<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Zero Day Logs]]></title><description><![CDATA[We investigate the untold stories behind the world's most devastating cyberattacks. From state-sponsored espionage and billion-dollar bank heists to the social engineering hacks that brought down global corporations.]]></description><link>https://www.zerodaylogs.com</link><image><url>https://substackcdn.com/image/fetch/$s_!Ie9I!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff971c425-da54-4ba0-93f5-3cddb49e4b35_559x559.jpeg</url><title>Zero Day Logs</title><link>https://www.zerodaylogs.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 22 Apr 2026 22:20:40 GMT</lastBuildDate><atom:link href="https://www.zerodaylogs.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Zero Day Logs]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[zerodaylogs@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[zerodaylogs@substack.com]]></itunes:email><itunes:name><![CDATA[Zero Day Logs]]></itunes:name></itunes:owner><itunes:author><![CDATA[Zero Day Logs]]></itunes:author><googleplay:owner><![CDATA[zerodaylogs@substack.com]]></googleplay:owner><googleplay:email><![CDATA[zerodaylogs@substack.com]]></googleplay:email><googleplay:author><![CDATA[Zero Day Logs]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Episode 03: The SolarWinds Attack — Technical Breakdown]]></title><description><![CDATA[They didn't break in. They were invited. By a software update every security system confirmed was legitimate.]]></description><link>https://www.zerodaylogs.com/p/episode-03-the-solarwinds-attack</link><guid isPermaLink="false">https://www.zerodaylogs.com/p/episode-03-the-solarwinds-attack</guid><dc:creator><![CDATA[Zero Day Logs]]></dc:creator><pubDate>Wed, 15 Apr 2026 21:42:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ie9I!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff971c425-da54-4ba0-93f5-3cddb49e4b35_559x559.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is the companion technical breakdown for Zero Day Logs Episode 03.</p><p>In 2020, a foreign intelligence service walked through the front doors of the US Treasury, the Department of Homeland Security, and parts of the Department of Defense. They were invited by a software update that every security check confirmed was completely legitimate. Because it was.</p><p>The full technical breakdown covers the SUNBURST backdoor architecture &#8212; the build pipeline compromise, the 12-14 day sandbox evasion, DNS covert command-and-control, and the selective activation of approximately 100 of 18,000 infected networks. It documents how FireEye&#8217;s investigation of its own breach exposed one of the largest intelligence operations in history, the three missing controls and what each would and would not have stopped against a nation-state adversary, and the formal attribution to APT29 and the Russian SVR.</p><p>It also covers what changed after &#8212; from Executive Order 14028 mandating software bills of materials, to the SEC case against SolarWinds that was dismissed in November 2025.</p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Zerodaylogs Ep03 Solarwinds Technicalbreakdown</div><div class="file-embed-details-h2">48.7KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.zerodaylogs.com/api/v1/file/b8827d2f-ea76-4787-8e2d-117757d70937.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.zerodaylogs.com/api/v1/file/b8827d2f-ea76-4787-8e2d-117757d70937.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p> </p>]]></content:encoded></item><item><title><![CDATA[Episode 02: The Okta Breaches — Technical Breakdown]]></title><description><![CDATA[Breached twice. Twenty months apart. Same underlying problem.]]></description><link>https://www.zerodaylogs.com/p/episode-02-the-okta-breaches-technical</link><guid isPermaLink="false">https://www.zerodaylogs.com/p/episode-02-the-okta-breaches-technical</guid><dc:creator><![CDATA[Zero Day Logs]]></dc:creator><pubDate>Wed, 15 Apr 2026 21:35:16 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ie9I!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff971c425-da54-4ba0-93f5-3cddb49e4b35_559x559.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is the companion technical breakdown for Zero Day Logs Episode 02.</p><p>Okta processes billions of authentication requests per month for over eighteen thousand organisations. It is the invisible gatekeeper sitting between employees and every system they log into &#8212; at governments, banks, and technology companies across the globe. It was breached in 2022. Twenty months later, it was breached again.</p><p>The full technical breakdown covers both breaches: the 2022 Lapsus$ contractor compromise and the 2023 HAR file session cookie theft, including the November 29th expanded disclosure revealing the full customer contact list harvest. It documents the three missing controls, the downstream impact on Cloudflare, 1Password, and BeyondTrust, and how a service account credential moved outside every corporate security control through Chrome&#8217;s password sync.</p><p>It also covers what good vendor accountability looks like &#8212; contractual disclosure timelines, independent verification over self-reported questionnaires, and why the vendors trusted most deeply are structurally the highest-risk link in the chain.</p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Zerodaylogs Ep02 Okta Technicalbreakdown</div><div class="file-embed-details-h2">46.5KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.zerodaylogs.com/api/v1/file/edd30818-875e-4a2a-86f3-fc13e367b97c.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.zerodaylogs.com/api/v1/file/edd30818-875e-4a2a-86f3-fc13e367b97c.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p> </p>]]></content:encoded></item><item><title><![CDATA[Episode 01: The MGM Resorts Breach — Technical Breakdown]]></title><description><![CDATA[How a ten-minute phone call dismantled one of the largest casino operations on Earth]]></description><link>https://www.zerodaylogs.com/p/episode-01-the-mgm-resorts-breach</link><guid isPermaLink="false">https://www.zerodaylogs.com/p/episode-01-the-mgm-resorts-breach</guid><dc:creator><![CDATA[Zero Day Logs]]></dc:creator><pubDate>Wed, 15 Apr 2026 21:23:29 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Ie9I!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Ff971c425-da54-4ba0-93f5-3cddb49e4b35_559x559.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is the companion technical breakdown for Zero Day Logs Episode 01.</p><p>In September 2023, a group of attackers brought MGM Resorts to a standstill. No software vulnerability was exploited. No sophisticated malware was deployed. The public record shows a single phone call to an IT help desk.</p><p>The full technical breakdown covers the complete attack timeline, the step-by-step attack chain from LinkedIn reconnaissance through SAML token forgery to ESXi ransomware deployment, the three missing controls that would each have independently broken the chain, and what the post-breach remediation confirms about what was absent.</p><p>Written for two audiences: security practitioners who want the precise technical record, and everyone else who wants to understand what this breach means for them personally.</p><div class="file-embed-wrapper" data-component-name="FileToDOM"><div class="file-embed-container-reader"><div class="file-embed-container-top"><image class="file-embed-thumbnail-default" src="https://substackcdn.com/image/fetch/$s_!0Cy0!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack.com%2Fimg%2Fattachment_icon.svg"></image><div class="file-embed-details"><div class="file-embed-details-h1">Zerodaylogs Ep01 Mgm Technicalbreakdown</div><div class="file-embed-details-h2">35.2KB &#8729; PDF file</div></div><a class="file-embed-button wide" href="https://www.zerodaylogs.com/api/v1/file/a23c22cd-36da-46ac-9576-ffc28e859660.pdf"><span class="file-embed-button-text">Download</span></a></div><a class="file-embed-button narrow" href="https://www.zerodaylogs.com/api/v1/file/a23c22cd-36da-46ac-9576-ffc28e859660.pdf"><span class="file-embed-button-text">Download</span></a></div></div><p> </p>]]></content:encoded></item></channel></rss>