<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Exposure Security — Executive Briefings</title>
    <link>https://www.exposuresecurity.com/briefings/</link>
    <description>Timely analysis of emerging threats, breaches, and security developments. Written for executives who need to understand business impact.</description>
    <language>en-us</language>
    <lastBuildDate>Mon, 06 Apr 2026 00:00:00 -0700</lastBuildDate>
    <atom:link href="https://www.exposuresecurity.com/briefings/feed.xml" rel="self" type="application/rss+xml"/>

    <item>
      <title>EU Cyber Resilience Act</title>
      <link>https://www.exposuresecurity.com/briefings/executive-briefing-eu-cra-vulnerability-reporting-v1-0.html</link>
      <guid>https://www.exposuresecurity.com/briefings/executive-briefing-eu-cra-vulnerability-reporting-v1-0.html</guid>
      <pubDate>Mon, 06 Apr 2026 00:00:00 -0700</pubDate>
      <category>Leadership Guide</category>
      <description>EU Vulnerability Reporting Deadline Hits September 2026, Not December 2027. If you sell software to EU customers, you have less than six months to operationalize 24-hour vulnerability reporting to ENISA.</description>
    </item>

    <item>
      <title>TeamPCP Supply Chain Attack</title>
      <link>https://www.exposuresecurity.com/briefings/executive-briefing-teampcp-supply-chain-attack-v3-0-web-version.html</link>
      <guid>https://www.exposuresecurity.com/briefings/executive-briefing-teampcp-supply-chain-attack-v3-0-web-version.html</guid>
      <pubDate>Fri, 03 Apr 2026 00:00:00 -0700</pubDate>
      <category>Threat Advisory</category>
      <description>In March 2026, attackers compromised four widely-used developer tools — Trivy, Checkmarx KICS, LiteLLM, and Telnyx — silently stealing credentials from an estimated 500,000+ machines. If your CI/CD pipelines ran any of these tools during the affected windows, your cloud credentials may already be at risk.</description>
    </item>

    <item>
      <title>Iran-Affiliated Cyber Threat Advisory</title>
      <link>https://www.exposuresecurity.com/briefings/iran-cyber-threat-advisory.html</link>
      <guid>https://www.exposuresecurity.com/briefings/iran-cyber-threat-advisory.html</guid>
      <pubDate>Wed, 04 Mar 2026 00:00:00 -0700</pubDate>
      <category>Threat Advisory</category>
      <description>Comprehensive analysis of Iran-affiliated cyber threats following Operation Epic Fury. Covers state-sponsored APT group mobilization, hacktivist surge with 60+ active groups, reduced federal cyber support, and 8 prioritized recommendations including SOC coordination, vulnerability patching, ICS/SCADA hardening, and identity controls.</description>
    </item>

    <item>
      <title>Security Risks in Claude Desktop Extensions</title>
      <link>https://www.exposuresecurity.com/briefings/claude-desktop-extensions-risk.html</link>
      <guid>https://www.exposuresecurity.com/briefings/claude-desktop-extensions-risk.html</guid>
      <pubDate>Mon, 09 Feb 2026 00:00:00 -0800</pubDate>
      <category>AI Security</category>
      <description>Attackers can take over a computer by sending a calendar invite to someone using Claude Desktop Extensions. This briefing covers which Claude products face exposure, IT team scanning recommendations, Anthropic&#x27;s response, and how to evaluate similar risks in other AI tools.</description>
    </item>

    <item>
      <title>ChatGPT Data Leakage via Shared Conversations</title>
      <link>https://www.exposuresecurity.com/briefings/chatgpt-data-leakage.html</link>
      <guid>https://www.exposuresecurity.com/briefings/chatgpt-data-leakage.html</guid>
      <pubDate>Fri, 01 Aug 2025 00:00:00 -0700</pubDate>
      <category>AI Security</category>
      <description>Publicly shared ChatGPT conversation links have been indexed by search engines, making sensitive business data discoverable via web searches. Covers detection methods, affected entities, and recommended AI usage policy updates.</description>
    </item>

    <item>
      <title>What to Look for in a Cloud Security Architect</title>
      <link>https://www.exposuresecurity.com/briefings/cloud-security-architect.html</link>
      <guid>https://www.exposuresecurity.com/briefings/cloud-security-architect.html</guid>
      <pubDate>Tue, 09 Jul 2024 00:00:00 -0700</pubDate>
      <category>Leadership Guide</category>
      <description>Key attributes and skills to evaluate when hiring a Cloud Security Architect. Covers business alignment, security architecture design, IAM, data protection, compliance, incident response, collaboration, and DevSecOps integration.</description>
    </item>

    <item>
      <title>Scattered Spider Breaches</title>
      <link>https://www.exposuresecurity.com/briefings/scattered-spider-breaches.html</link>
      <guid>https://www.exposuresecurity.com/briefings/scattered-spider-breaches.html</guid>
      <pubDate>Wed, 01 Nov 2023 00:00:00 -0800</pubDate>
      <category>Breach Analysis</category>
      <description>Analysis of the Scattered Spider (UNC3944) threat group&#x27;s attacks on MGM Resorts ($100M impact), Caesars Entertainment ($15M ransom), and Clorox. Covers social engineering tactics, helpdesk manipulation, ransomware deployment, and prioritized defense recommendations.</description>
    </item>

    <item>
      <title>Okta Breach — Customer Support System Compromise</title>
      <link>https://www.exposuresecurity.com/briefings/okta-breach-2023.html</link>
      <guid>https://www.exposuresecurity.com/briefings/okta-breach-2023.html</guid>
      <pubDate>Tue, 31 Oct 2023 00:00:00 -0700</pubDate>
      <category>Breach Analysis</category>
      <description>Analysis of the Okta customer support system breach, including the November 2023 scope expansion from 134 customers to all support system users. Covers HAR file exposure, session hijacking, identity provider manipulation, and detailed response actions for Okta administrators.</description>
    </item>

  </channel>
</rss>