<?xml version="1.0" encoding="UTF-8"?>
    <rss version="2.0">
      <channel>
        <title>Trescudo Blog</title>
        <link>https://trescudo.inblog.io</link>
        <description>Explore the latest in cybersecurity with the Trescudo blog. Our experts provide in-depth analysis on threat intelligence, risk management, and compliance challenges in cloud, OT, and endpoint security. Additionally, you can find various guides, briefs and reports under the Resources menu item of our main website - https://trescudo.com</description>
        <pubDate>Tue, 15 Jul 2025 08:51:27 GMT</pubDate>
        <generator>inblog</generator>
        <lastBuildDate>Wed, 26 Nov 2025 14:08:41 GMT</lastBuildDate>
        <image>
          <url>https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Fog_image%2F2025-07-15T10%3A35%3A34.144Z-6dc956ae-7ea6-40fa-8e52-8154dcf07543&amp;w=1920&amp;q=85</url>
          <title>og image</title>
          <link>https://trescudo.inblog.io</link>
        </image>

        <item>
              <title>Fluent Bit Cloud Risks &amp; The Espionage Surge</title>
              <link>https://trescudo.inblog.io/fluent-bit-cloud-vulnerabilities-espionage-surge</link>
              <description>Critical Fluent Bit flaws expose cloud infrastructure. Plus, Russian espionage accelerates with COLDRIVER and npm supply chain attacks. </description>
              <pubDate>Wed, 26 Nov 2025 14:32:16 GMT</pubDate>
              <guid>https://trescudo.inblog.io/fluent-bit-cloud-vulnerabilities-espionage-surge</guid>
              <category>Threat Analysis</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-11-26T14%3A26%3A34.250Z-6d6dad5e-124a-4af1-87e8-6459d6e17b63&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Oracle EBS Extortion &amp; Nutanix Ransomware Risks</title>
              <link>https://trescudo.inblog.io/oracle-ebs-zero-day-virtualization-ransomware-analysis</link>
              <description>Oracle EBS zero-days are fueling a massive extortion campaign. Plus, ransomware groups Akira and Helldown pivot to virtualization. </description>
              <pubDate>Sat, 22 Nov 2025 14:05:02 GMT</pubDate>
              <guid>https://trescudo.inblog.io/oracle-ebs-zero-day-virtualization-ransomware-analysis</guid>
              <category>Threat Analysis</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-11-22T13%3A58%3A58.097Z-0a7079ca-719e-4903-b7af-0806d4489abc&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Kindness, Trust, and Zero-Trust</title>
              <link>https://trescudo.inblog.io/kindness-trust-zero-trust-human-centered-security-eu-nis2</link>
              <description>Human-centered security for EU/NIS2: how kindness, psychological safety, and zero-trust cut MTTR, boost phishing reporting, and strengthen breach communications.</description>
              <pubDate>Wed, 12 Nov 2025 11:16:21 GMT</pubDate>
              <guid>https://trescudo.inblog.io/kindness-trust-zero-trust-human-centered-security-eu-nis2</guid>
              <category>Cybersecurity Strategy</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-11-10T15%3A21%3A36.210Z-a28625ab-ac52-41a4-9864-8720bcac8536&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Rhysida Malvertising, KEV Patch-Now, EY &amp; Nikkei Breaches</title>
              <link>https://trescudo.inblog.io/weekly-cyber-brief-rhysida-malvertising-kev-ey-nikkei</link>
              <description>Rhysida fake Teams ads (OysterLoader/Latrodectus), new CISA KEV vulns, EY &amp; Nikkei breaches—actionable takeaways for EU/NIS2 teams.</description>
              <pubDate>Tue, 11 Nov 2025 10:30:18 GMT</pubDate>
              <guid>https://trescudo.inblog.io/weekly-cyber-brief-rhysida-malvertising-kev-ey-nikkei</guid>
              <category>Threat Analysis</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-11-10T16%3A10%3A10.283Z-980870ad-2cea-46d6-a89b-380c47c57eae&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>STEM to SecOps</title>
              <link>https://trescudo.inblog.io/stem-to-secops-evidence-driven-security-eu-healthcare-nis2</link>
              <description>Evidence-driven SecOps for EU healthcare: STEM mindset, NIS2 reporting, and 7 metrics (MTTR, restore success, KEV MTTR, supplier SLAs) that protect patients.</description>
              <pubDate>Tue, 04 Nov 2025 10:26:58 GMT</pubDate>
              <guid>https://trescudo.inblog.io/stem-to-secops-evidence-driven-security-eu-healthcare-nis2</guid>
              <category>Compliance &amp; Risk</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-11-03T16%3A44%3A58.090Z-958ebc0a-d291-4508-98dd-1be7fc7784d5&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>The Revolutionary Impact of Agentic AI</title>
              <link>https://trescudo.inblog.io/agentic-ai-unified-security-operations</link>
              <description>Agentic AI turns fragmented SOC tools into a unified defence mesh—cutting MTTR, automating playbooks, and producing NIS2/DORA-ready evidence.</description>
              <pubDate>Thu, 30 Oct 2025 10:24:33 GMT</pubDate>
              <guid>https://trescudo.inblog.io/agentic-ai-unified-security-operations</guid>
              <category>Products &amp; Solutions</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-10-30T10%3A21%3A57.041Z-e506ce83-66e6-4714-8304-75f46976f1f3&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>The AI Arms Race</title>
              <link>https://trescudo.inblog.io/ai-cybersecurity-arms-race</link>
              <description>The cybersecurity AI arms race is here. Nation-states and cybercriminals are using AI to supercharge attacks on critical infrastructure. Learn how to fight back with an automated, AI-powered defence.</description>
              <pubDate>Tue, 28 Oct 2025 16:42:09 GMT</pubDate>
              <guid>https://trescudo.inblog.io/ai-cybersecurity-arms-race</guid>
              <category>Products &amp; Solutions</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-10-28T16%3A38%3A26.877Z-10089b5b-9096-4a56-918c-4ab956f45b86&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>AWS Outage Aftermath</title>
              <link>https://trescudo.inblog.io/aws-outage-root-cause-costs-resilience-for-cisos</link>
              <description>Breakdown of the AWS US-EAST-1 DNS incident—timeline, cost modelling, concentration risk, DORA reporting timelines, and a 7-day engineering plan.</description>
              <pubDate>Mon, 27 Oct 2025 15:06:40 GMT</pubDate>
              <guid>https://trescudo.inblog.io/aws-outage-root-cause-costs-resilience-for-cisos</guid>
              <category>Threat Analysis</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-10-27T15%3A06%3A15.044Z-18c44505-c3a2-4594-8b37-aa483a8c832e&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>How to Report NIS2 to Your Board</title>
              <link>https://trescudo.inblog.io/how-to-report-nis2-to-your-board</link>
              <description>Tired of complex NIS2 compliance reports? Learn the 4 essential, board-ready metrics that translate technical risk (Art. 21/23) into business resilience, covering IR, recovery, and supply chain.</description>
              <pubDate>Tue, 21 Oct 2025 10:05:18 GMT</pubDate>
              <guid>https://trescudo.inblog.io/how-to-report-nis2-to-your-board</guid>
              <category>Compliance &amp; Risk</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-10-21T10%3A03%3A10.453Z-bd0120e5-ca67-40f5-b437-f78a2c2a08d4&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Critical Patches &amp; Breaches </title>
              <link>https://trescudo.inblog.io/critical-patches-breaches-oracle-ebs-goanywhere-salesforce</link>
              <description>Weekly threat analysis (Oct 7–14, 2025): Oracle EBS zero-days, Salesforce leaks, SimonMed breach, GoAnywhere CVE-2025-10035—priority actions for EU/UK teams.</description>
              <pubDate>Wed, 15 Oct 2025 09:25:46 GMT</pubDate>
              <guid>https://trescudo.inblog.io/critical-patches-breaches-oracle-ebs-goanywhere-salesforce</guid>
              <category>Threat Analysis</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-10-15T09%3A22%3A18.217Z-9a73e1da-6cf0-4ae0-9401-08454d3e5c28&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>The Ghost in the Machine - Legacy Systems</title>
              <link>https://trescudo.inblog.io/securing-legacy-systems-patchless-protection</link>
              <description>Legacy systems are everywhere—and risky. See how patchless protection blocks exploits when you can’t patch—WannaCry lessons, NIS2 obligations, and a modern IR plan.</description>
              <pubDate>Mon, 13 Oct 2025 15:32:01 GMT</pubDate>
              <guid>https://trescudo.inblog.io/securing-legacy-systems-patchless-protection</guid>
              <category>Products &amp; Solutions</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-10-13T15%3A29%3A53.057Z-3a8325a3-c6da-4b94-bd9e-c8d8dfe8267e&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>The Swedish Catastrophe</title>
              <link>https://trescudo.inblog.io/swedish-catastrophe-supply-chain-breach</link>
              <description>The Swedish Catastrophe: A single vendor breach exposed the data of 1.5 million people (15% of Sweden). Learn the urgent lessons on third-party risk and national security.</description>
              <pubDate>Wed, 08 Oct 2025 13:54:47 GMT</pubDate>
              <guid>https://trescudo.inblog.io/swedish-catastrophe-supply-chain-breach</guid>
              <category>Threat Analysis</category><category>Breach Analyses</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-10-08T13%3A51%3A27.074Z-14a2c446-29a7-487a-a1a4-41a1d6f243bc&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>&quot;Who Had Access?&quot; Can Cost You Millions</title>
              <link>https://trescudo.inblog.io/who-had-access-privileged-access-management</link>
              <description>After a breach, regulators will ask, &quot;Who had access?&quot; Learn how Privileged Access Management (PAM) provides the definitive answer and protects your business from massive fines.</description>
              <pubDate>Tue, 07 Oct 2025 15:23:57 GMT</pubDate>
              <guid>https://trescudo.inblog.io/who-had-access-privileged-access-management</guid>
              <category>Products &amp; Solutions</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Finblog.ai%2Fapi%2Fog-custom%3Ftitle%3DWho%2BHad%2BAccess%253F%26tag%3DTemplate%2B1%26description%3DThe%2BRegulator%2527s%2BFirst%2BQuestion%2BCan%2BCost%2BYou%2BMillions.%2BHere%2527s%2BHow%2Bto%2BAnswer%2BIt.%26template%3D3%26backgroundImage%3Dhttps%253A%252F%252Fsource.inblog.dev%252Fog_image%252Fdefault.png%26bgStartColor%3D%2523d9d9d9%26bgEndColor%3D%252305c3de%26textColor%3D%2523000000%26tagColor%3D%2523000000%26descriptionColor%3D%2523000000%26logoUrl%3Dhttps%253A%252F%252Fsource.inblog.dev%252Flogo%252F2025-07-16T13%253A32%253A05.112Z-d711020e-1e21-4380-9eb4-d1921dff9cd0%26blogTitle%3DTrescudo%2BBlog&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Luxury Meets Liability: The Harrods Vendor Breach</title>
              <link>https://trescudo.inblog.io/cyber-weekly-harrods-breach</link>
              <description>Past-week roundup—Cisco ASA zero-days, Harrods data leak, airport disruption updates, ENISA trends, Google Drive ransomware detection.</description>
              <pubDate>Wed, 01 Oct 2025 09:48:54 GMT</pubDate>
              <guid>https://trescudo.inblog.io/cyber-weekly-harrods-breach</guid>
              <category>Threat Analysis</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-10-01T09%3A47%3A42.507Z-ff2e188b-bf4e-46e0-a7db-dea46713cda9&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Beat the Skills Gap with Automated IAM</title>
              <link>https://trescudo.inblog.io/cyber-skills-gap-iam</link>
              <description>Struggling with the cybersecurity skills gap in Europe? Discover why it&apos;s an identity problem at its core and how AI-powered JIT access helps secure critical infrastructure (NIS2/GDPR) without needing to hire more staff.</description>
              <pubDate>Tue, 30 Sep 2025 10:30:39 GMT</pubDate>
              <guid>https://trescudo.inblog.io/cyber-skills-gap-iam</guid>
              <category>Products &amp; Solutions</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-30T10%3A26%3A01.624Z-373f5654-611a-4126-a041-e4124d08e256&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Weekly Threat Analysis (September 16-23, 2025)</title>
              <link>https://trescudo.inblog.io/weekly-threat-analysis-mfa-bombing</link>
              <description>A critical Confluence zero-day and AI voice clone attacks (MFA Bombing) are this week&apos;s top threats. Our analysis breaks down these incidents and what they mean for your security posture</description>
              <pubDate>Wed, 24 Sep 2025 09:35:31 GMT</pubDate>
              <guid>https://trescudo.inblog.io/weekly-threat-analysis-mfa-bombing</guid>
              <category>Threat Analysis</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-24T09%3A33%3A05.190Z-a12f1a9c-07d3-4ad8-b9ed-5b246b288411&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Airport Cyber Attacks &amp; Incident Response</title>
              <link>https://trescudo.inblog.io/airport-cyber-attacks-incident-response-europe</link>
              <description>How airports can strengthen incident response after major cyberattacks—from Bristol FIDS ransomware to Brussels/Heathrow’s 2025 supply-chain outage.</description>
              <pubDate>Mon, 22 Sep 2025 09:58:16 GMT</pubDate>
              <guid>https://trescudo.inblog.io/airport-cyber-attacks-incident-response-europe</guid>
              <category>Breach Analyses</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-22T09%3A58%3A04.751Z-bc3083cf-44b5-4463-b7e7-ce51cdd9abf4&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>New Enterprise Attack Vector</title>
              <link>https://trescudo.inblog.io/voice-assistant-enterprise-attack-vector</link>
              <description>Voice assistants like Siri &amp; Alexa are a new enterprise attack vector. Our analysis covers the &quot;Dolphin Attack,&quot; malicious skills, and a CISO playbook for this emerging threat.</description>
              <pubDate>Fri, 19 Sep 2025 12:31:43 GMT</pubDate>
              <guid>https://trescudo.inblog.io/voice-assistant-enterprise-attack-vector</guid>
              <category>Cybersecurity Strategy</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-18T14%3A25%3A42.455Z-4fa97e9b-0465-4a8f-bb15-cb542fbeedb4&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Weekly Threat Analysis (Sep 9–16, 2025)</title>
              <link>https://trescudo.inblog.io/weekly-threat-analysis-threat-detection-2025-09-16</link>
              <description>JLR production halt, critical VMware vCenter flaws, and a surge in QR-code phishing. See what your threat detection must catch—and what to fix in 48 hours.</description>
              <pubDate>Tue, 16 Sep 2025 12:35:41 GMT</pubDate>
              <guid>https://trescudo.inblog.io/weekly-threat-analysis-threat-detection-2025-09-16</guid>
              <category>Threat Analysis</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-16T12%3A35%3A29.747Z-3059bd29-f831-4e0f-9e7b-6f09522f88df&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>FEMA Cybersecurity Case Study</title>
              <link>https://trescudo.inblog.io/fema-cybersecurity-failure-case-study</link>
              <description>A deep-dive into the FEMA cybersecurity scandal. Discover the &apos;four embarrassing failures&apos; that led to a mass firing and the urgent lessons for government agencies worldwide.</description>
              <pubDate>Mon, 15 Sep 2025 10:10:07 GMT</pubDate>
              <guid>https://trescudo.inblog.io/fema-cybersecurity-failure-case-study</guid>
              <category>Breach Analyses</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-15T10%3A09%3A38.795Z-e85d1f3d-9755-42f0-823e-cd878e4bcf7f&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>The Jaguar Land Rover Breach</title>
              <link>https://trescudo.inblog.io/cybersecurity-governance-jlr-breach</link>
              <description>Analysis of the Jaguar Land Rover breach, a stark lesson in cybersecurity governance. See how the attack shut down assembly lines, costing millions daily, and the implications for NIS2.</description>
              <pubDate>Thu, 11 Sep 2025 10:36:01 GMT</pubDate>
              <guid>https://trescudo.inblog.io/cybersecurity-governance-jlr-breach</guid>
              <category>Breach Analyses</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-11T10%3A32%3A12.872Z-806ce6c8-5232-474c-a992-44a8108ac5d8&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Weekly Threat Analysis (September 2-9, 2025)</title>
              <link>https://trescudo.inblog.io/threat-analysis-salesloft-supply-chain-breach</link>
              <description>Trescudo&apos;s analysis of the Salesloft supply chain breach &amp; Sitecore zero-day. Learn the lessons from this week&apos;s top cyber threats for Benelux businesses under NIS2.</description>
              <pubDate>Wed, 10 Sep 2025 09:24:26 GMT</pubDate>
              <guid>https://trescudo.inblog.io/threat-analysis-salesloft-supply-chain-breach</guid>
              <category>Threat Analysis</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T16%3A00%3A24.701Z-6ace0ed1-e0ef-4133-b921-0812fbcde056&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>The Whopper of All Vulnerabilities</title>
              <link>https://trescudo.inblog.io/whopper-vulnerability-analysis</link>
              <description>Analysis of the Burger King hack. Discover how a Broken Object Level Authorisation (BOLA) flaw in their API exposed customer data and what it teaches us about app security.</description>
              <pubDate>Mon, 08 Sep 2025 16:31:35 GMT</pubDate>
              <guid>https://trescudo.inblog.io/whopper-vulnerability-analysis</guid>
              <category>Breach Analyses</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T14%3A54%3A08.066Z-000bae2a-7730-4d19-a70e-7559ee8cec30&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>NIST CSF&apos;s Blueprint for AI Security</title>
              <link>https://trescudo.inblog.io/nist-csf-ai-security-blueprint</link>
              <description>NIST&apos;s new concept paper outlines a framework for AI security using the NIST CSF. Discover the new AI attack surface and the gold standard for securing your innovative assets.</description>
              <pubDate>Mon, 08 Sep 2025 09:11:33 GMT</pubDate>
              <guid>https://trescudo.inblog.io/nist-csf-ai-security-blueprint</guid>
              <category>Products &amp; Solutions</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T14%3A55%3A26.595Z-bebb021f-481f-4e48-9d02-18f4dfd7051c&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Anatomy of a Healthcare Breach</title>
              <link>https://trescudo.inblog.io/netherlands-cervical-screening-breach</link>
              <description>Deep-dive analysis of the Dutch cervical cancer screening breach. Trescudo covers the third-party risk, Nova RaaS tactics, and the lessons for Benelux businesses.</description>
              <pubDate>Tue, 02 Sep 2025 15:30:41 GMT</pubDate>
              <guid>https://trescudo.inblog.io/netherlands-cervical-screening-breach</guid>
              <category>Breach Analyses</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T14%3A56%3A21.617Z-64f15589-9b15-46f0-8a99-cdd4532f422c&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>What Your Threat Detection Must Catch</title>
              <link>https://trescudo.inblog.io/threat-detection-2025-09-01</link>
              <description>This week: Nevada ransomware, TransUnion 4.4M breach, Citrix NetScaler zero-day, and WhatsApp zero-click—plus a 48-hour threat detection plan.</description>
              <pubDate>Mon, 01 Sep 2025 15:18:03 GMT</pubDate>
              <guid>https://trescudo.inblog.io/threat-detection-2025-09-01</guid>
              <category>Threat Analysis</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T14%3A57%3A24.610Z-6118fcd8-6853-4d51-9846-15c94acf74a3&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Weekly Threat Analysis (Aug 19–26, 2025)</title>
              <link>https://trescudo.inblog.io/threat-analysis-weekly-2025-08-26</link>
              <description>Weekly threat analysis: Orange Belgium breach, OAuth/Salesforce campaign, Cisco FMC CVE-2025-20265, Apple zero-day—plus a 48-hour CISO playbook and hunt tips.</description>
              <pubDate>Tue, 26 Aug 2025 15:07:19 GMT</pubDate>
              <guid>https://trescudo.inblog.io/threat-analysis-weekly-2025-08-26</guid>
              <category>Threat Analysis</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T14%3A58%3A22.754Z-45ada606-661a-4893-a07b-f0b1328a47a9&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Threat Analysis: The Triple Threat Landscape</title>
              <link>https://trescudo.inblog.io/threat-analysis-triple-threat-Benelux</link>
              <description>Benelux threat detection briefing: Orange Belgium breach, Russian “Static Tundra” Cisco exploits, and an Apple zero‑day—actions boards can take in 48 hours.</description>
              <pubDate>Fri, 22 Aug 2025 09:09:22 GMT</pubDate>
              <guid>https://trescudo.inblog.io/threat-analysis-triple-threat-Benelux</guid>
              <category>Threat Analysis</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T14%3A59%3A14.383Z-ed62821a-bc31-444d-8ea4-0fb9f6fdd117&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Cybersecurity History</title>
              <link>https://trescudo.inblog.io/history-of-cybersecurity</link>
              <description>From a college prank that shut down the internet to AI-powered defences, discover the fascinating history of cybersecurity and what it means for your business today.</description>
              <pubDate>Thu, 21 Aug 2025 10:34:46 GMT</pubDate>
              <guid>https://trescudo.inblog.io/history-of-cybersecurity</guid>
              
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T15%3A00%3A11.024Z-16754446-2989-4378-9d33-5e0da5f2f398&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Dutch Cervical Cancer Screening Breach (2025)</title>
              <link>https://trescudo.inblog.io/dutch-cervical-cancer-data-breach-analysis</link>
              <description>Nearly 485,000 women affected in a Dutch cervical screening data breach tied to a lab supplier. What was exposed, timeline, GDPR/NIS2 angle, and next steps.</description>
              <pubDate>Mon, 11 Aug 2025 20:15:58 GMT</pubDate>
              <guid>https://trescudo.inblog.io/dutch-cervical-cancer-data-breach-analysis</guid>
              <category>Breach Analyses</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T15%3A00%3A57.551Z-c550a94c-af2d-4510-9f0f-e8ff5f8ab08f&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>WinRAR Zero-Day Exploited by RomCom</title>
              <link>https://trescudo.inblog.io/winrar-zero-day-romcom-threat-analysis</link>
              <description>RomCom (Storm-0978) weaponised a WinRAR zero-day to plant backdoors. See TTPs, NIS2 exposure, and a patch-first detection plan tailored for Benelux teams.</description>
              <pubDate>Mon, 11 Aug 2025 09:29:23 GMT</pubDate>
              <guid>https://trescudo.inblog.io/winrar-zero-day-romcom-threat-analysis</guid>
              <category>Threat Analysis</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T15%3A02%3A01.696Z-8044179c-ccf5-4a23-a646-9aa03de27159&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Air France–KLM Data Breach 2025</title>
              <link>https://trescudo.inblog.io/air-france-klm-data-breach</link>
              <description>Learn how the Air France KLM data breach exposed loyalty data via a third-party SaaS, the GDPR/NIS2 penalties, and 7 steps Benelux CISOs must take now.</description>
              <pubDate>Thu, 07 Aug 2025 22:40:05 GMT</pubDate>
              <guid>https://trescudo.inblog.io/air-france-klm-data-breach</guid>
              <category>Breach Analyses</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T15%3A02%3A53.217Z-25604c68-8fbc-4cf7-9d6f-cebc17f5ef24&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>NIS2 vs. NIST CSF</title>
              <link>https://trescudo.inblog.io/nis2-vs-nist-csf-it-security-benelux</link>
              <description>Compare NIS2 and NIST CSF for IT Security Benelux leaders. See overlap, gaps, fines, and a 5-step decision guide for sustainable cyber-resilience.</description>
              <pubDate>Wed, 06 Aug 2025 13:08:34 GMT</pubDate>
              <guid>https://trescudo.inblog.io/nis2-vs-nist-csf-it-security-benelux</guid>
              <category>Compliance &amp; Risk</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T15%3A03%3A50.113Z-8e0c6220-10b8-459c-b956-c6af7675a15f&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Plague PAM Backdoor</title>
              <link>https://trescudo.inblog.io/plague-pam-backdoor</link>
              <description>The new Plague PAM backdoor evaded AV for a year. Learn its TTPs, IOC list and a threat-detection blueprint to secure your Linux servers in 2025.</description>
              <pubDate>Mon, 04 Aug 2025 15:34:47 GMT</pubDate>
              <guid>https://trescudo.inblog.io/plague-pam-backdoor</guid>
              <category>Breach Analyses</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T15%3A04%3A33.260Z-c7a51912-6be2-4b4c-be78-f67e6e83b34a&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Salt Typhoon Hits Orange</title>
              <link>https://trescudo.inblog.io/salt-typhoon-orange-2025</link>
              <description>French telecom Orange S.A. suffered a Salt Typhoon APT attack on 25 July 2025. Learn the TTPs, business impact, NIS2/DORA exposure and concrete defence steps.</description>
              <pubDate>Wed, 30 Jul 2025 10:10:22 GMT</pubDate>
              <guid>https://trescudo.inblog.io/salt-typhoon-orange-2025</guid>
              <category>Breach Analyses</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T15%3A05%3A17.429Z-3150cb36-0241-4fb9-bc7f-6328951942b3&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>The Human Perimeter</title>
              <link>https://trescudo.inblog.io/human-perimeter</link>
              <description>Clorox lost $380 M when hackers duped a help‑desk agent. Discover how human error, not malware, drives breaches—and how to fortify your human perimeter.</description>
              <pubDate>Tue, 29 Jul 2025 12:42:47 GMT</pubDate>
              <guid>https://trescudo.inblog.io/human-perimeter</guid>
              <category>Breach Analyses</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T15%3A06%3A15.212Z-1acf2cfb-2270-43e6-b738-af0ac097de5d&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>SharePoint Under Siege </title>
              <link>https://trescudo.inblog.io/sharepoint-vulnerability-patching</link>
              <description>A critical SharePoint vulnerability (CVE-2025-53770) is here. Learn why a &quot;patch-and-pray&quot; strategy is not enough and how to build true cyber resilience.</description>
              <pubDate>Tue, 22 Jul 2025 14:49:35 GMT</pubDate>
              <guid>https://trescudo.inblog.io/sharepoint-vulnerability-patching</guid>
              <category>Breach Analyses</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T15%3A07%3A01.045Z-ff3baaf8-e69b-4c8e-a2db-cb5cdba062e6&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Data Security: AI Personas</title>
              <link>https://trescudo.inblog.io/data-security-ai-personas</link>
              <description>What if the person you&apos;re talking to isn&apos;t real? Discover how AI personas create new insider threats and why Data Security with DLP and XDR is your best defence.</description>
              <pubDate>Sat, 19 Jul 2025 10:05:29 GMT</pubDate>
              <guid>https://trescudo.inblog.io/data-security-ai-personas</guid>
              <category>Cybersecurity Strategy</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T15%3A07%3A43.444Z-fdac3184-5ef9-4a97-8e12-a68c42d54fb3&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>The Digital Honey Trap </title>
              <link>https://trescudo.inblog.io/digital-honey-trap-romance-scam</link>
              <description>A romance scam can turn a trusted employee into an insider threat. Learn how the &apos;Digital Honey Trap&apos; works and how DLP, XDR, and Zero Trust can protect your data.</description>
              <pubDate>Wed, 16 Jul 2025 07:00:00 GMT</pubDate>
              <guid>https://trescudo.inblog.io/digital-honey-trap-romance-scam</guid>
              <category>Products &amp; Solutions</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T15%3A08%3A48.264Z-647bac5c-7a4d-4438-91b9-0e0df3945f32&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Zero‑Trust Security Architecture</title>
              <link>https://trescudo.inblog.io/zero-trust-security-architecture</link>
              <description>Learn how zero‑trust security architecture, micro‑segmentation and identity‑centric security stop lateral movement, meet DORA/NIS2, and cut breach costs by 40 %.</description>
              <pubDate>Tue, 15 Jul 2025 14:16:06 GMT</pubDate>
              <guid>https://trescudo.inblog.io/zero-trust-security-architecture</guid>
              <category>Cybersecurity Strategy</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T15%3A11%3A46.577Z-680964c7-56fd-457f-b0a0-3d94d8d2346c&amp;w=1920&amp;q=85" type="image/webp"/>
            </item><item>
              <title>Mastering Risk Management </title>
              <link>https://trescudo.inblog.io/mastering-risk-management-strategies-cyber-resilience</link>
              <description>In uncertain times, mastering cyber risk is key. This guide offers four essential strategies for resilience, from understanding your attack surface to incident response.</description>
              <pubDate>Tue, 15 Jul 2025 10:29:41 GMT</pubDate>
              <guid>https://trescudo.inblog.io/mastering-risk-management-strategies-cyber-resilience</guid>
              <category>Compliance &amp; Risk</category>
              <author>Evangeline</author>
              <enclosure url="https://image.inblog.dev?url=https%3A%2F%2Fsource.inblog.dev%2Ffeatured_image%2F2025-09-09T15%3A17%3A01.090Z-3777ecde-f113-4f40-9301-28dc99da184b&amp;w=1920&amp;q=85" type="image/webp"/>
            </item>
      </channel>
    </rss>