<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Rust on FTRCRP</title><link>https://ftrcrp.org/tags/rust/</link><description>Recent content in Rust on FTRCRP</description><generator>Hugo</generator><language>en-us</language><copyright>2026 FTRCRP</copyright><lastBuildDate>Sun, 05 Apr 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://ftrcrp.org/tags/rust/index.xml" rel="self" type="application/rss+xml"/><item><title>MuddyWater Follow-Up: April 2026</title><link>https://ftrcrp.org/investigations/muddywater-follow-up-april-2026/</link><pubDate>Sat, 04 Apr 2026 00:00:00 +0000</pubDate><guid>https://ftrcrp.org/investigations/muddywater-follow-up-april-2026/</guid><description>A lot changed in four weeks. MuddyWater rebuilt their toolkit in Rust, started using AI to write malware, compromised US banks and airports, and picked up new attack vectors including RDP and Ethereum-based C2. This is the follow-up.</description></item></channel></rss>