
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[ The Cloudflare Blog ]]></title>
        <description><![CDATA[ Get the latest news on how products at Cloudflare are built, technologies used, and join the teams helping to build a better Internet. ]]></description>
        <link>https://blog.cloudflare.com</link>
        <atom:link href="https://blog.cloudflare.com/" rel="self" type="application/rss+xml"/>
        <language>en-us</language>
        <image>
            <url>https://blog.cloudflare.com/favicon.png</url>
            <title>The Cloudflare Blog</title>
            <link>https://blog.cloudflare.com</link>
        </image>
        <lastBuildDate>Sat, 04 Apr 2026 23:56:26 GMT</lastBuildDate>
        <item>
            <title><![CDATA[Protect against identity-based attacks by sharing Cloudflare user risk scores with Okta]]></title>
            <link>https://blog.cloudflare.com/protect-against-identity-based-attacks-by-sharing-cloudflare-user-risk-with-okta/</link>
            <pubDate>Tue, 15 Oct 2024 13:00:00 GMT</pubDate>
            <description><![CDATA[ Uphold Zero Trust principles and protect against identity-based attacks by sharing Cloudflare user risk scores with Okta. Learn how this new integration allows your organization to mitigate risk in real time, make informed access decisions, and free up security resources with automation. ]]></description>
            <content:encoded><![CDATA[ <p>Cloudflare One, our <a href="https://www.cloudflare.com/learning/access-management/what-is-sase/"><u>secure access service edge (SASE)</u></a> platform, is introducing a new integration with Okta, the <a href="https://www.cloudflare.com/learning/access-management/what-is-identity-and-access-management/"><u>identity and access management (IAM)</u></a> vendor, to share risk indicators in real-time and simplify how organizations can dynamically manage their security posture in response to changes across their environments.</p><p>For many organizations, it is becoming increasingly challenging and inefficient to adapt to risks across their growing <a href="https://www.cloudflare.com/learning/security/what-is-an-attack-surface/"><u>attack surface</u></a>. In particular, security teams struggle with multiple siloed tools that fail to share risk data effectively with each other, leading to excessive manual effort to extract signals from the noise. To address this complexity, Cloudflare launched <a href="https://blog.cloudflare.com/unified-risk-posture/"><u>risk posture management capabilities</u></a> earlier this year to make it easier for organizations to accomplish three key jobs on one platform: </p><ol><li><p>Evaluating risk posed by people by using first-party <a href="https://www.cloudflare.com/learning/security/what-is-ueba/"><u>user entity and behavior analytics (UEBA)</u></a> models</p></li><li><p>Exchanging risk telemetry with best-in-class security tools, and</p></li><li><p>Enforcing risk controls based on those dynamic first- and third-party risk scores.</p></li></ol><p>Today’s announcement builds on these capabilities (particularly job #2) and <a href="https://www.cloudflare.com/partners/technology-partners/okta/"><u>our partnership with Okta</u></a> by enabling organizations to share Cloudflare’s real-time <a href="https://blog.cloudflare.com/cf1-user-risk-score/"><u>user risk scores</u></a> with Okta, which can then automatically enforce policies based on that user’s risk. In this way, organizations can adapt to evolving risks in less time with less manual effort.</p>
    <div>
      <h2>Cloudflare’s user risk scoring</h2>
      <a href="#cloudflares-user-risk-scoring">
        
      </a>
    </div>
    <p><a href="https://blog.cloudflare.com/cf1-user-risk-score/"><u>Introduced earlier this year</u></a>, Cloudflare’s user risk scoring analyzes real-time telemetry of user activities and behaviors and assigns a risk score of high, medium, or low. For example, if Cloudflare detects risky or suspicious activity from a user — such as impossible travel, where a user logs in from multiple geographically dispersed locations within a short time frame, data loss prevention (DLP) detections, or endpoint detections suggesting that the device is infected — the user’s risk score will increase. The activity leading to that scoring is logged for analysis.</p><p>Cloudflare includes <a href="https://developers.cloudflare.com/cloudflare-one/insights/risk-score/"><u>predefined risk behaviors</u></a> to help you get started. Administrators can create policies based on specific risk behaviors and adjust the risk level for each behavior based on their company’s tolerance.</p>
    <div>
      <h2>Share risk scores with Okta and take action automatically</h2>
      <a href="#share-risk-scores-with-okta-and-take-action-automatically">
        
      </a>
    </div>
    <p>Customers that opt in to this new integration will be able to share continually updated Cloudflare user risk scores with <a href="https://www.okta.com/products/identity-threat-protection/"><u>Identity Threat Protection with Okta AI</u></a>. If a user is deemed too risky, Okta will automatically take action to mitigate the risk, such as enforcing <a href="https://www.cloudflare.com/en-gb/learning/access-management/what-is-multi-factor-authentication/"><u>multi-factor authentication (MFA)</u></a> verification or universally logging the user out from all applications. </p><p>For example, a user has a low risk score from Cloudflare that was shared with Okta, but after exhibiting “impossible travel” behavior, the user’s risk level is raised to high. Cloudflare sends the updated score to Okta, which triggers a Universal Logout and an MFA challenge if the user attempts to log in again. Access to sensitive systems may be revoked completely until the user is verified. </p>
    <div>
      <h2>How it works: continuous risk evaluation and exchange</h2>
      <a href="#how-it-works-continuous-risk-evaluation-and-exchange">
        
      </a>
    </div>
    
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/79JiNwP0P5bbXpW6dy6ORQ/b0dc91943840b44bbcc8e447af64f392/image1.png" />
          </figure><p><sup><b><i>Figure 1.</i></b></sup><sup><i> Diagram showing risky behavior by a user, resulting in sign-out.</i></sup></p><p>We begin by detecting risky behavior from a user (such as an “impossible travel” event between two geographic locations). Instances of risky behavior are called Risk Events. We perform two actions when we observe a Risk Event: logging the event and evaluating whether further action is required. For customers that have enabled <a href="https://developers.cloudflare.com/cloudflare-one/insights/risk-score/#send-risk-score-to-okta"><u>Risk Score Sharing with Okta</u></a>, any change in Risk Score is transmitted to Okta’s Identity Threat Protection (ITP).</p><p>Upon receiving a new event, Okta evaluates the change in user risk against the organization's policies. These policies may include actions such as re-authenticating the user if they become high risk.</p><p>When we design new features, we aim for them to be extensible across the industry. For this reason, we chose the <a href="https://openid.net/specs/openid-sharedsignals-framework-1_0.html"><u>OpenID Shared Signals Framework Specification (SSF)</u></a> to be the foundation of our transmission format. By doing this, we are able to leverage current and future providers that support the standard. The core functionality of SSF revolves around sharing <a href="https://www.rfc-editor.org/rfc/rfc8417.html"><u>Security Event Tokens (SETs)</u></a>, a specialized version of a JSON Web Token (JWT). Providers can produce and consume Security Event Tokens, forming a “network” of shared user risk information between providers.</p>
          <figure>
          <img src="https://cf-assets.www.cloudflare.com/zkvhlag99gkb/SaWKy4UWPZfa8hf6rHcF8/571a08ddeab08b01b9a38e740ec89644/image2.png" />
          </figure><p><sup><b><i>Figure 2.</i></b></sup><sup><i> Diagram showing a Security Event Token being transmitted from Cloudflare to Okta.</i></sup></p><p>The diagram above (<b>Figure 2</b>) details the process of sharing risk. When sharing Risk Score changes with Okta, we bundle metadata about the risk event and user into the body of a Security Event Token. Following this, the JWT/SET is signed using our private key. This is an important step, as the signature is used to verify the sender's identity (cryptographic authenticity) and that the payload body has not been tampered with (cryptographic integrity). In plain terms, this signature is used by Okta to verify that the event is unaltered and was sent by Cloudflare.</p><p>Once Okta has verified the authenticity and integrity of the SET token, they may use the risk metadata within the body to execute Identity Threat Protection policies defined by the customer. These policies could include actions such as “if a high risk score is received from Cloudflare, sign out the offending user”.</p><p>Learn more about the Shared Signals Framework and CAEP in <a href="https://www.okta.com/blog/2024/08/identity-threat-protection-with-okta-ai/"><u>Okta’s announcement blog post</u></a>.</p>
    <div>
      <h2>Get started today</h2>
      <a href="#get-started-today">
        
      </a>
    </div>
    <p>Cloudflare customers can easily <a href="https://developers.cloudflare.com/cloudflare-one/insights/risk-score/#send-risk-score-to-okta"><u>enable risk score sharing from the Cloudflare One SSO setup page</u></a>. This is available to customers whether you’ve already integrated with Okta or are setting up the integration for the first time. You will also be able to confirm that the feature was enabled in your audit logs.</p><p>If you’ve already integrated Okta within your Cloudflare One dashboard:</p><ol><li><p>As an admin, navigate to Settings &gt; Authentication and select the Okta login method.</p></li><li><p>Select “send risk score to Okta.”</p></li></ol><p>If you haven’t yet integrated Okta within your Cloudflare One dashboard:</p><ol><li><p>As an admin, navigate to Settings &gt; Authentication and select a new login method.</p></li><li><p>Follow the instructions to add Okta as an SSO.</p></li><li><p>Select “send risk score to Okta.”</p></li></ol><p>Now, whenever a user’s risk score changes within the organization, information is sent to Okta automatically and an audit log is documented.</p>
    <div>
      <h2>Uphold Zero Trust principles</h2>
      <a href="#uphold-zero-trust-principles">
        
      </a>
    </div>
    <p>In conclusion, the ability to incorporate rich context is essential for making accurate and informed access decisions. With vast amounts of data — including user logins, logouts, websites visited, and emails sent — human analysts would struggle to keep pace with modern security challenges. Cloudflare provides context in the form of a risk score, enabling Okta’s risk engine to make more informed policy decisions about users. This sharing of information powers the continuous evaluation required to enforce Zero Trust policies within your organization, ultimately strengthening your organization’s security posture.</p><p>Not yet a Cloudflare One customer? <a href="https://www.cloudflare.com/products/zero-trust/plans/enterprise/"><u>Reach out for a consultation</u></a> or contact your account manager.</p> ]]></content:encoded>
            <category><![CDATA[Cloudflare Zero Trust]]></category>
            <category><![CDATA[Okta]]></category>
            <category><![CDATA[Partners]]></category>
            <guid isPermaLink="false">7LZCXzvQgHwLVGoT4O4Pj6</guid>
            <dc:creator>Noelle Kagan</dc:creator>
            <dc:creator>Andrew Meyer</dc:creator>
            <dc:creator>James Chang</dc:creator>
            <dc:creator>Gavin Chen</dc:creator>
            <dc:creator>Matt Davis</dc:creator>
        </item>
        <item>
            <title><![CDATA[How Cloudflare mitigated yet another Okta compromise]]></title>
            <link>https://blog.cloudflare.com/how-cloudflare-mitigated-yet-another-okta-compromise/</link>
            <pubDate>Fri, 20 Oct 2023 21:39:13 GMT</pubDate>
            <description><![CDATA[ On Wednesday, October 18, 2023, we discovered attacks on our system that we were able to trace back to Okta. We have verified that no Cloudflare customer information or systems were impacted by this event because of our rapid response.  ]]></description>
            <content:encoded><![CDATA[ <p></p><p>On Wednesday, October 18, 2023, we discovered attacks on our system that we were able to trace back to Okta – threat actors were able to leverage an authentication token compromised at Okta to pivot into Cloudflare’s Okta instance. While this was a troubling security incident, our Security Incident Response Team’s (SIRT) real-time detection and prompt response enabled containment and minimized the impact to Cloudflare systems and data. We have verified that <b>no Cloudflare customer information or systems were impacted by this event</b> because of our rapid response. Okta has now released a <a href="https://sec.okta.com/harfiles">public statement</a> about this incident.</p><p>This is the second time Cloudflare has been impacted by a breach of Okta’s systems. In <a href="/cloudflare-investigation-of-the-january-2022-okta-compromise/">March 2022</a>, we blogged about our investigation on how a breach of Okta affected Cloudflare. In that incident, we concluded that there was no access from the threat actor to any of our systems or data – Cloudflare’s use of hard keys for multi-factor authentication stopped this attack.  </p><p>The key to mitigating this week’s incident was our team’s early detection and immediate response. In fact, we contacted Okta about the breach of their systems before they had notified us. The attacker used an open session from Okta, with Administrative privileges, and accessed our Okta instance. We were able to use our Cloudflare Zero Trust Access, Gateway, and Data Loss Prevention and our Cloudforce One threat research to validate the scope of the incident and contain it before the attacker could gain access to customer data, customer systems, or our production network. With this confidence, we were able to quickly mitigate the incident before the threat-actors were able to establish persistence.</p><p>According to Okta’s statement, the threat-actor accessed Okta’s customer support system and viewed files uploaded by certain Okta customers as part of recent support cases. It appears that in our case, the threat-actor was able to hijack a session token from a support ticket which was created by a Cloudflare employee. Using the token extracted from Okta, the threat-actor accessed Cloudflare systems on October 18. In this sophisticated attack, we observed that threat-actors compromised two separate Cloudflare employee accounts within the Okta platform. We detected this activity internally more than 24 hours before we were notified of the breach by Okta. Upon detection, our SIRT was able to engage quickly to identify the complete scope of compromise and contain the security incident. Cloudflare’s <a href="https://www.cloudflare.com/learning/security/glossary/what-is-zero-trust/">Zero Trust architecture</a> protects our production environment, which helped prevent any impact to our customers.</p>
    <div>
      <h2>Recommendations for Okta</h2>
      <a href="#recommendations-for-okta">
        
      </a>
    </div>
    <p>We urge Okta to consider implementing the following best practices, including:</p><ul><li><p>Take any report of compromise seriously and act immediately to limit damage; in this case Okta was first notified on October 2, 2023 by <a href="https://www.beyondtrust.com/blog/entry/okta-support-unit-breach">BeyondTrust</a> but the attacker still had access to their support systems at least until October 18, 2023.</p></li><li><p>Provide timely, responsible disclosures to your customers when you identify that a breach of your systems has affected them.</p></li><li><p>Require hardware keys to protect all systems, including third-party support providers.</p></li></ul><p>For a critical security service provider like Okta, we believe following these best practices is table stakes.</p>
    <div>
      <h2>Recommendations for Okta’s Customers</h2>
      <a href="#recommendations-for-oktas-customers">
        
      </a>
    </div>
    <p>If you are an Okta customer, we recommend that you reach out to them for further information regarding potential impact to your organization. We also advise the following actions:</p><ul><li><p>Enable Hardware MFA for all user accounts. Passwords alone do not offer the necessary level of protection against attacks. We strongly recommend the usage of hardware keys, as other methods of MFA can be vulnerable to phishing attacks.</p></li><li><p>Investigate and respond to:</p><ul><li><p>All unexpected password and MFA changes for your Okta instances.</p></li><li><p>Suspicious support-initiated events.</p></li><li><p>Ensure all password resets are valid and force a password reset for any under suspicion.</p></li><li><p>Any suspicious MFA-related events, ensuring only valid MFA keys are present in the user's account configuration.</p></li></ul></li><li><p>Monitor for:</p><ul><li><p>New Okta users created.</p></li><li><p>Reactivation of Okta users.</p></li><li><p>All sessions have proper authentication associated with it.</p></li><li><p>All Okta account and permission changes.</p></li><li><p>MFA policy overrides, MFA changes, and MFA removal.</p></li><li><p>Delegation of sensitive applications.</p></li><li><p>Supply chain providers accessing your tenants.</p></li></ul></li><li><p>Review session expiration policies to limit session hijack attacks.</p></li><li><p>Utilize tools to validate devices connected to your critical systems, such as Cloudflare Access Device Posture Check.</p></li><li><p>Practice defense in depth for your detection and monitoring strategies.</p></li></ul><p>Cloudflare’s Security and IT teams continue to remain vigilant after this compromise. If further information is disclosed by Okta or discovered through additional log analysis, we will publish an update to this post.</p><p><i>Cloudflare's Security Incident Response Team </i><a href="http://cloudflare.com/careers"><i>is hiring</i></a><i>.</i></p> ]]></content:encoded>
            <category><![CDATA[Okta]]></category>
            <category><![CDATA[Post Mortem]]></category>
            <category><![CDATA[1.1.1.1]]></category>
            <guid isPermaLink="false">3tmgWjRNgroPDMiiOZFXsq</guid>
            <dc:creator>Sourov Zaman</dc:creator>
            <dc:creator>Lucas Ferreira</dc:creator>
            <dc:creator>Kimberly Hall</dc:creator>
            <dc:creator>Grant Bourzikas</dc:creator>
        </item>
        <item>
            <title><![CDATA[Cloudflare’s investigation of the January 2022 Okta compromise]]></title>
            <link>https://blog.cloudflare.com/cloudflare-investigation-of-the-january-2022-okta-compromise/</link>
            <pubDate>Tue, 22 Mar 2022 16:57:44 GMT</pubDate>
            <description><![CDATA[ Today at 03:30 UTC we learnt of a compromise of Okta. We use Okta internally for employee identity as part of our authentication stack. We have investigated this compromise carefully and do not believe we have been compromised as a result ]]></description>
            <content:encoded><![CDATA[ <p>Today, March 22, 2022 at 03:30 UTC we learnt of a compromise of Okta. We use Okta internally for employee identity as part of our authentication stack. We have investigated this compromise carefully and do not believe we have been compromised as a result. We do not use Okta for customer accounts; customers do not need to take any action unless they themselves use Okta.</p>
    <div>
      <h3>Investigation and actions</h3>
      <a href="#investigation-and-actions">
        
      </a>
    </div>
    <p>Our <a href="https://twitter.com/toddmckinnon/status/1506184721922859010">understanding</a> is that during January 2022, hackers outside Okta had access to an Okta support employee’s account and were able to take actions as if they were that employee. In a screenshot shared on social media, a Cloudflare employee’s email address was visible, along with a popup indicating the hacker was posing as an Okta employee and could have initiated a password reset.</p><p>We learnt of this incident via Cloudflare’s internal SIRT. SIRT is our Security Incident Response Team and any employee at Cloudflare can alert SIRT to a potential problem. At exactly 03:30 UTC, a Cloudflare employee emailed SIRT with a link to a <a href="https://twitter.com/_MG_/status/1506109152665382920">tweet</a> that had been sent at 03:22 UTC. The tweet indicated that Okta had potentially been breached. Multiple other Cloudflare employees contacted SIRT over the following two hours.</p><p>The following timeline outlines the major steps we took following that initial 03:30 UTC email to SIRT.</p>
    <div>
      <h4>Timeline (times in UTC)</h4>
      <a href="#timeline-times-in-utc">
        
      </a>
    </div>
    <p>03:30 - SIRT receives the first warning of the existence of the tweets.</p><p>03:38 - SIRT sees that the tweets contain information about Cloudflare (logo, user information).</p><p>03:41 - SIRT creates an incident room to start the investigation and starts gathering the necessary people.</p><p>03:50 - SIRT concludes that there were no relevant audit log events (such as password changes) for the user that appears in the screenshot mentioned above.</p><p>04:13 - Reached out to Okta directly asking for detailed information to help our investigation.</p><p>04:23 - All Okta logs that we ingest into our Security Information and Event Management (SIEM) system are reviewed for potential suspicious activities, including password resets over the past three months.</p><p>05:03 - SIRT suspends accounts of users that could have been affected.</p><p>We temporarily suspended access for the Cloudflare employee whose email address appeared in the hacker’s screenshots.</p><p>05:06 - SIRT starts an investigation of access logs (IPs, locations, multifactor methods) for the affected users.</p><p>05:38 - First <a href="https://twitter.com/eastdakota/status/1506143353544478724">tweet</a> from Matthew Prince acknowledging the issue.</p><p>Because it appeared that an Okta support employee with access to do things like force a password reset on an Okta customer account had been compromised, we decided to look at every employee who had reset their password or modified their Multi-Factor Authentication (MFA) in any way since December 1 up until today. Since Dec. 1, 2021, 144 Cloudflare employees had reset their password or modified their MFA. We forced a password reset for them all and let them know of the change.</p><p>05:44 - A list of all users that changed their password in the last three months is finalized. All accounts were required to go through a password reset.</p><p>06:40 - <a href="https://twitter.com/eastdakota/status/1506158901078618118">Tweet</a> from Matthew Prince about the password reset.</p><p>07:57 - We received confirmation from Okta that there were no relevant events that may indicate malicious activity in their support console for Cloudflare instances.</p>
    <div>
      <h3>How Cloudflare uses Okta</h3>
      <a href="#how-cloudflare-uses-okta">
        
      </a>
    </div>
    <p>Cloudflare uses Okta internally as our identity provider, integrated with Cloudflare Access to guarantee that our users can safely access internal resources. In previous blog posts, we described <a href="/dogfooding-from-home/">how we use Access to protect internal resources</a> and <a href="/securing-cloudflare-using-cloudflare/">how we integrated hardware tokens to make our user authentication process more resilient</a> and <a href="/account-compromise-security-overview/">prevent account takeovers</a>.</p><p>In the case of the Okta compromise, it would not suffice to just change a user's password. The attacker would also need to change the hardware (FIDO) token configured for the same user. As a result it would be easy to spot compromised accounts based on the associated hardware keys.</p><p>Even though logs are available in the Okta console, we also store them in our own systems. This adds an extra layer of security as we are able to store logs longer than what is available in the Okta console. That also ensures that a compromise in the Okta platform cannot alter evidence we have already collected and stored.</p><p>Okta is not used for customer authentication on our systems, and we do not store any customer data in Okta. It is only used for managing the accounts of our employees.</p><p>The main actions we took during this incident were:</p><ol><li><p>Reach out to Okta to gather more information on what is known about the attack.</p></li><li><p>Suspend the one Cloudflare account visible in the screenshots.</p></li><li><p>Search the <a href="https://developer.okta.com/docs/reference/api/system-log/">Okta System logs</a> for any signs of compromise (password changes, hardware token changes, etc.). Cloudflare reads the system Okta logs every five minutes and stores these in our SIEM so that if we were to experience an incident such as this one, we can look back further than the 90 days provided in the Okta dashboard. Some event types within Okta that we searched for are: <code>user.account.reset_password</code>, <code>user.mfa.factor.update</code>, <code>system.mfa.factor.deactivate</code>, <code>user.mfa.attempt_bypass</code>, and <code>user.session.impersonation.initiate</code>. It’s unclear from communications we’ve received from Okta so far who we would expect the <a href="https://developer.okta.com/docs/reference/api/system-log/#actor-object">System Log Actor</a> to be from the compromise of an Okta support employee.</p></li><li><p>Search <a href="https://support.google.com/a/answer/11479100?ref_topic=11479095">Google Workplace email logs</a> to view password resets. We confirmed password resets matched the Okta System logs using a separate source from Okta considering they were breached, and we were not sure how reliable their logging would be.</p></li><li><p>Compile a list of Cloudflare employee accounts that changed their passwords in the last three months and require a new password reset for all of them. As part of their account recovery, each user will join a video call with the Cloudflare IT team to verify their identity prior to having their account re-enabled.</p></li></ol>
    <div>
      <h3>What to do if you are an Okta customer</h3>
      <a href="#what-to-do-if-you-are-an-okta-customer">
        
      </a>
    </div>
    <p>If you are also an Okta customer, you should reach out to them for further information. We advise the following actions:</p><ol><li><p>Enable MFA for all user accounts. Passwords alone do not offer the necessary level of protection against attacks. We strongly recommend the usage of hard keys, as other methods of MFA can be vulnerable to phishing attacks.</p></li><li><p>Investigate and respond:a. Check all password and MFA changes for your Okta instances.b. Pay special attention to support initiated events.c. Make sure all password resets are valid or just assume they are all under suspicion and force a new password reset.d. If you find any suspicious MFA-related events, make sure only valid MFA keys are present in the user's account configuration.</p></li><li><p>Make sure you have other security layers to provide extra security in case one of them fails.</p></li></ol>
    <div>
      <h3>Conclusion</h3>
      <a href="#conclusion">
        
      </a>
    </div>
    <p>Cloudflare’s Security and IT teams are continuing to work on this compromise. If further information comes to light that indicates compromise beyond the January timeline we will publish further posts detailing our findings and actions.</p><p>We are also in contact with Okta with a number of requests for additional logs and information. If anything comes to light that alters our assessment of the situation we will update the blog or write further posts.</p> ]]></content:encoded>
            <category><![CDATA[Okta]]></category>
            <category><![CDATA[Security]]></category>
            <category><![CDATA[Post Mortem]]></category>
            <guid isPermaLink="false">2adIs12PUMYCgRU2zfLCJs</guid>
            <dc:creator>John Graham-Cumming</dc:creator>
            <dc:creator>Lucas Ferreira</dc:creator>
            <dc:creator>Daniel Stinson-Diess</dc:creator>
        </item>
    </channel>
</rss>