<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Tinte Security Blog</title>
    <link>https://tinte.io/blog</link>
    <description>Cybersecurity intelligence, vulnerability research, and attack surface analysis for DACH enterprises.</description>
    <language>en</language>
    <lastBuildDate>Wed, 08 Apr 2026 16:01:59 GMT</lastBuildDate>
    <atom:link href="https://tinte.io/feed.xml" rel="self" type="application/rss+xml" />
    <item>
      <title><![CDATA[CVE-2026-5281: Four Chrome Zero-Days in Four Months and What It Means for Enterprise Attack Surface]]></title>
      <link>https://tinte.io/blog/chrome-zero-day-cve-2026-5281-enterprise-browser-risk</link>
      <guid isPermaLink="true">https://tinte.io/blog/chrome-zero-day-cve-2026-5281-enterprise-browser-risk</guid>
      <pubDate>Wed, 08 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[The fourth actively exploited Chrome zero-day of 2026 exposes a systemic gap: most mid-market organizations have no browser patch management. Here is why that matters and what to do about it.]]></description>
      <category>attack-surface</category>
    </item>
    <item>
      <title><![CDATA[Claude Mythos Preview: What Anthropic's Security-Capable AI Means for Defenders]]></title>
      <link>https://tinte.io/blog/claude-mythos-preview-cybersecurity-watershed-moment</link>
      <guid isPermaLink="true">https://tinte.io/blog/claude-mythos-preview-cybersecurity-watershed-moment</guid>
      <pubDate>Wed, 08 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Anthropic's Claude Mythos Preview can autonomously find and exploit zero-day vulnerabilities. For security teams, this changes the threat model and the urgency of defensive investment.]]></description>
      <category>cybersecurity</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-35616: FortiClient EMS API Bypass Under Active Exploitation]]></title>
      <link>https://tinte.io/blog/forticlient-ems-cve-2026-35616-api-bypass-exploitation</link>
      <guid isPermaLink="true">https://tinte.io/blog/forticlient-ems-cve-2026-35616-api-bypass-exploitation</guid>
      <pubDate>Wed, 08 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Fortinet released an emergency hotfix for CVE-2026-35616 after attackers began exploiting a pre-authentication API bypass in FortiClient EMS. CISA added it to KEV on April 6. Over 2,000 instances are internet-exposed, with significant concentration in Germany.]]></description>
      <category>vulnerability-assessment</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-3055: Active NetScaler Exploitation and the Exposure Security Teams Must Close]]></title>
      <link>https://tinte.io/blog/citrix-netscaler-cve-2026-3055-kev-active-exploitation</link>
      <guid isPermaLink="true">https://tinte.io/blog/citrix-netscaler-cve-2026-3055-kev-active-exploitation</guid>
      <pubDate>Sun, 05 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[CISA added CVE-2026-3055 to KEV on March 30 after active exploitation. Organizations using NetScaler SAML IdP paths should treat this as immediate exposure reduction work.]]></description>
      <category>vulnerability-assessment</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-33634: Why Trivy Supply-Chain Exposure Is a Priority This Week]]></title>
      <link>https://tinte.io/blog/trivy-cve-2026-33634-kev-supply-chain-compromise</link>
      <guid isPermaLink="true">https://tinte.io/blog/trivy-cve-2026-33634-kev-supply-chain-compromise</guid>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[CISA added CVE-2026-33634 to KEV on March 26 after active exploitation evidence. Teams using Trivy in CI/CD should treat this as an immediate exposure review.]]></description>
      <category>vulnerability-assessment</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-33017: Langflow RCE Moves from Advisory to Active Exploitation]]></title>
      <link>https://tinte.io/blog/langflow-cve-2026-33017-active-exploitation</link>
      <guid isPermaLink="true">https://tinte.io/blog/langflow-cve-2026-33017-active-exploitation</guid>
      <pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[CISA has KEV-listed CVE-2026-33017 for active exploitation. Organizations using Langflow should treat external exposure and upgrade execution as immediate priorities.]]></description>
      <category>vulnerability-assessment</category>
    </item>
    <item>
      <title><![CDATA[KEV Alert: Craft CMS and Laravel Livewire Under Active Exploitation]]></title>
      <link>https://tinte.io/blog/kev-craft-livewire-active-exploitation</link>
      <guid isPermaLink="true">https://tinte.io/blog/kev-craft-livewire-active-exploitation</guid>
      <pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[CISA has KEV-listed CVE-2025-32432 (Craft CMS) and CVE-2025-54068 (Laravel Livewire) for active exploitation. CMS and framework teams should treat patching as an immediate priority.]]></description>
      <category>vulnerability-assessment</category>
    </item>
    <item>
      <title><![CDATA[CVE-2026-20131: Active Exploitation of Cisco Firewall Management]]></title>
      <link>https://tinte.io/blog/cisco-fmc-cve-2026-20131-active-exploitation</link>
      <guid isPermaLink="true">https://tinte.io/blog/cisco-fmc-cve-2026-20131-active-exploitation</guid>
      <pubDate>Sat, 21 Mar 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[CISA has KEV-listed CVE-2026-20131 after active exploitation. Security teams should treat Cisco firewall management exposure as an immediate remediation priority.]]></description>
      <category>vulnerability-assessment</category>
    </item>
    <item>
      <title><![CDATA[Admin/Fortinet: When Your Firewall's Front Door Is Wide Open]]></title>
      <link>https://tinte.io/blog/fortinet-default-credentials-open-door</link>
      <guid isPermaLink="true">https://tinte.io/blog/fortinet-default-credentials-open-door</guid>
      <pubDate>Sat, 21 Mar 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Thousands of FortiGate firewalls are still running with factory default credentials. Here's why this keeps happening and what attackers do with that access.]]></description>
      <category>vulnerability-assessment</category>
    </item>
    <item>
      <title><![CDATA[Why External Attack Surface Management Matters in 2026]]></title>
      <link>https://tinte.io/blog/why-attack-surface-management-matters</link>
      <guid isPermaLink="true">https://tinte.io/blog/why-attack-surface-management-matters</guid>
      <pubDate>Wed, 18 Mar 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Most organizations don't know what attackers can see. External Attack Surface Management closes this gap — before threat actors exploit it.]]></description>
      <category>attack-surface</category>
    </item>
    <item>
      <title><![CDATA[NIS2 Compliance: What German Companies Need to Know]]></title>
      <link>https://tinte.io/blog/nis2-compliance-german-companies</link>
      <guid isPermaLink="true">https://tinte.io/blog/nis2-compliance-german-companies</guid>
      <pubDate>Thu, 12 Mar 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[NIS2 expands cybersecurity obligations to thousands of German companies. Here's what changes, who is affected, and how to prepare.]]></description>
      <category>nis2</category>
    </item>
    <item>
      <title><![CDATA[The Anatomy of a Phishing Attack: How to Protect Your Organization]]></title>
      <link>https://tinte.io/blog/anatomy-of-a-phishing-attack</link>
      <guid isPermaLink="true">https://tinte.io/blog/anatomy-of-a-phishing-attack</guid>
      <pubDate>Thu, 05 Mar 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Phishing remains the #1 initial access vector. Understanding how these attacks work is the first step to building resilience.]]></description>
      <category>phishing</category>
    </item>
    <item>
      <title><![CDATA[Penetration Testing vs. Vulnerability Scanning: What's the Difference?]]></title>
      <link>https://tinte.io/blog/pentesting-vs-vulnerability-scanning</link>
      <guid isPermaLink="true">https://tinte.io/blog/pentesting-vs-vulnerability-scanning</guid>
      <pubDate>Wed, 25 Feb 2026 00:00:00 GMT</pubDate>
      <description><![CDATA[Two terms often confused, but fundamentally different approaches. Understanding the distinction is key to choosing the right security assessment.]]></description>
      <category>penetration-testing</category>
    </item>
  </channel>
</rss>
