<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Risk-Prioritization — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/risk-prioritization/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sun, 29 Mar 2026 06:52:03 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/risk-prioritization/feed.xml" rel="self" type="application/rss+xml"/><item><title>CrowdStrike CNAPP Adds Adversary-Informed Risk Prioritization</title><link>https://feed.craftedsignal.io/briefs/2026-04-cnapp-risk-prioritization/</link><pubDate>Sun, 29 Mar 2026 06:52:03 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-cnapp-risk-prioritization/</guid><description>CrowdStrike's CNAPP enhancements prioritize cloud risks based on adversary behavior, application context, and configuration change tracking to reduce breach likelihood.</description><content:encoded><![CDATA[<p>CrowdStrike has enhanced its Cloud Native Application Protection Platform (CNAPP) with new features designed to address the limitations of existing cloud risk assessment approaches. Current CNAPP solutions often lack visibility into the application layer, ignore adversary behavior when prioritizing risks, and struggle to connect risk detections to the configuration changes that introduced them. The updated Falcon Cloud Security aims to bridge these gaps by incorporating application context, adversary intelligence, and configuration change tracking. The goal is to help organizations focus on the risks that matter most, based on real-world threat actor tactics and the criticality of affected applications. According to the CrowdStrike 2026 Global Threat Report, cloud intrusions by state-nexus actors increased significantly, underscoring the need for enhanced cloud security measures.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: Exploit a misconfigured cloud service or application vulnerability to gain initial access to the cloud environment.</li>
<li>Privilege Escalation: Leverage overly permissive access controls or insecure configurations to escalate privileges within the cloud environment.</li>
<li>Lateral Movement: Move laterally across the cloud infrastructure, identifying and accessing critical applications and data stores.</li>
<li>Data Access: Access sensitive data stored within cloud storage resources or databases, such as customer PII.</li>
<li>AI Component Exploitation: Target AI-driven applications, potentially exploiting vulnerabilities in external large language models (LLMs) or unapproved AI model usage.</li>
<li>Data Exfiltration: Exfiltrate sensitive data to external locations, potentially using compromised AI components or insecure network configurations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of cloud misconfigurations can lead to data breaches, service disruptions, and financial losses. Compromised AI components may expose sensitive data to external AI services or result in unauthorized model usage. The enhanced CNAPP features aim to reduce the likelihood of such incidents by providing better visibility into application dependencies, prioritizing risks based on adversary behavior, and tracking configuration changes that introduce vulnerabilities. Given the observed increase in cloud intrusions, organizations that fail to address these risks face a heightened risk of compromise.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Leverage Falcon Cloud Security&rsquo;s Application Explorer to gain visibility into application dependencies and identify infrastructure risks impacting critical applications (Application Explorer).</li>
<li>Prioritize remediation efforts based on the adversary intelligence provided by Falcon Cloud Security, focusing on risks aligned with known threat actor tactics and targeted industries (Adversary Intelligence for Cloud Risks). Specifically focus on the techniques employed by threat actors like LABYRINTH CHOLLIMA and SCATTERED SPIDER.</li>
<li>Enable Sysmon process creation logging to activate the rules below.</li>
<li>Deploy the Sigma rules in this brief to your SIEM and tune for your environment.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cnapp</category><category>cloud-security</category><category>risk-prioritization</category></item><item><title>CrowdStrike CNAPP Enhanced with Adversary-Informed Risk Prioritization</title><link>https://feed.craftedsignal.io/briefs/2026-03-cnapp-adversary-informed-risk/</link><pubDate>Sun, 29 Mar 2026 00:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-cnapp-adversary-informed-risk/</guid><description>CrowdStrike enhances its CNAPP capabilities by incorporating adversary intelligence for improved risk prioritization, addressing limitations in infrastructure visibility, threat actor behavior analysis, and alert triage.</description><content:encoded><![CDATA[<p>CrowdStrike has enhanced its Cloud Native Application Protection Platform (CNAPP) to provide adversary-informed risk prioritization. Current CNAPP solutions often fall short by focusing solely on infrastructure, ignoring specific adversary behaviors, and generating excessive alerts. This update to CrowdStrike Falcon Cloud Security addresses these gaps by providing visibility into business applications, correlating risks with known adversary tactics (such as those used by LABYRINTH CHOLLIMA and SCATTERED SPIDER), and providing real-time detection of configuration changes that introduce risk. The goal is to enable security teams to prioritize remediation efforts based on real-world threat actor behavior and focus on the most critical exposures. This proactive security approach allows organizations to anticipate and mitigate cloud breaches more effectively, rather than chasing theoretical risks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Initial Access: An attacker gains initial access to a cloud environment, potentially through compromised credentials or exploiting a misconfiguration.</li>
<li>Privilege Escalation: The attacker attempts to escalate privileges within the cloud environment, leveraging weaknesses in Identity and Access Management (IAM) policies or exploiting vulnerable services.</li>
<li>Lateral Movement: Once elevated, the attacker moves laterally across the cloud infrastructure, identifying and accessing sensitive data stores or critical applications.</li>
<li>Application Exploitation: The attacker exploits vulnerabilities in business applications running in the cloud environment, such as SQL injection flaws or remote code execution vulnerabilities.</li>
<li>Data Exfiltration: The attacker exfiltrates sensitive data from compromised applications and data stores, potentially using cloud storage services or establishing covert communication channels.</li>
<li>Persistence: The attacker establishes persistence within the cloud environment, ensuring continued access even if initial entry points are discovered and patched.</li>
<li>Impact: The attacker achieves their objective, such as data theft, financial gain, or disruption of critical services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of cloud vulnerabilities can lead to significant data breaches, financial losses, and reputational damage. In 2025, cloud intrusions by state-nexus actors increased by 266% year-over-year, underscoring the growing threat to cloud environments. The sectors most at risk include financial services, healthcare, and critical infrastructure. A successful attack can result in the theft of sensitive customer data, intellectual property, or trade secrets, leading to regulatory fines, legal liabilities, and loss of competitive advantage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the Sigma rule &ldquo;Detect Cloud Account with Excessive Permissions&rdquo; to identify overly permissive access controls within cloud environments, a common initial access and privilege escalation vector (logsource: cloudtrail, rule: Detect Cloud Account with Excessive Permissions).</li>
<li>Utilize the &ldquo;Adversary Intelligence for Cloud Risks&rdquo; capability in CrowdStrike Falcon Cloud Security to prioritize remediation efforts based on known adversary tactics, techniques, and procedures (TTPs), focusing on threat actors such as LABYRINTH CHOLLIMA and SCATTERED SPIDER.</li>
<li>Deploy the Sigma rule &ldquo;Detect Data Exfiltration via Cloud Storage&rdquo; to identify unauthorized data transfers to cloud storage services, a common tactic used by attackers to exfiltrate sensitive information (logsource: cloudtrail, rule: Detect Data Exfiltration via Cloud Storage).</li>
<li>Continuously monitor cloud configurations and audit logs for suspicious activity, such as unauthorized access attempts, privilege escalations, and lateral movement.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud-security</category><category>cnapp</category><category>risk-prioritization</category></item><item><title>CrowdStrike CNAPP Enhanced with Adversary-Informed Risk Prioritization</title><link>https://feed.craftedsignal.io/briefs/2026-03-cnapp-advances/</link><pubDate>Sat, 28 Mar 2026 14:46:06 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-cnapp-advances/</guid><description>CrowdStrike has enhanced its CNAPP capabilities by adding application-layer visibility and prioritizing risks based on known adversary tactics, techniques, and procedures (TTPs).</description><content:encoded><![CDATA[<p>CrowdStrike has advanced its Cloud-Native Application Protection Platform (CNAPP) to address limitations in current cloud security approaches. The enhancements include Application Explorer, which provides application-layer visibility alongside cloud infrastructure context, and adversary intelligence for cloud risks. These updates aim to help organizations understand how applications interact with infrastructure and prioritize risks based on threat actor behavior. Specifically, the CNAPP maps cloud risks to over 280 adversary groups tracked by CrowdStrike, such as LABYRINTH CHOLLIMA and SCATTERED SPIDER. This allows security teams to focus on exploitation chains known to be used against specific industries and organizational profiles, moving beyond theoretical risk assessments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An attacker gains initial access to a cloud environment through compromised credentials or exploitation of a vulnerability in a cloud service. (TA0001)</li>
<li><strong>Privilege Escalation:</strong> The attacker attempts to elevate privileges within the cloud environment to gain access to more sensitive resources and data.</li>
<li><strong>Lateral Movement:</strong> Using the compromised credentials or elevated privileges, the attacker moves laterally within the cloud environment to identify and access target applications and data stores.</li>
<li><strong>Application Discovery:</strong> The attacker uses Application Explorer (if available) to map application dependencies, identify business-critical applications, and locate AI components (MCPs, LLMs) within the environment.</li>
<li><strong>Data Exfiltration:</strong> The attacker identifies storage resources or data stores containing sensitive information (e.g., PII) and attempts to exfiltrate the data to an external location.</li>
<li><strong>Shadow AI Exploitation:</strong> The attacker exploits shadow AI activity by identifying unapproved model usage and exposing sensitive data to external AI services.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence within the environment to maintain access and continue their activities even if initial access methods are remediated. (TA0003)</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The impact of a successful attack can range from data breaches and financial losses to reputational damage and disruption of critical business operations. Specific consequences include the compromise of business-critical applications (e.g., payment processing, hospital ERP), exposure of sensitive data (e.g., PII), and the exploitation of AI-driven applications through shadow AI activity. In 2025, cloud-conscious intrusions by state-nexus threat actors surged 266% year-over-year, highlighting the increasing risk and potential impact of cloud-based attacks.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Leverage Falcon Cloud Security&rsquo;s Application Explorer to gain visibility into application dependencies, identify business-critical applications, and map infrastructure risks affecting production applications.</li>
<li>Utilize the adversary intelligence feature within Falcon Cloud Security to prioritize cloud risks based on known adversary profiles and observed techniques, focusing on groups like LABYRINTH CHOLLIMA and SCATTERED SPIDER.</li>
<li>Deploy the Sigma rules below to detect suspicious activity related to common cloud attack patterns in your environment.</li>
<li>Review and harden overly permissive access controls on storage resources identified by CrowdStrike.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud-security</category><category>cnapp</category><category>threat-intelligence</category><category>risk-prioritization</category></item><item><title>CrowdStrike Falcon Cloud Security CNAPP with Adversary-Informed Risk Prioritization</title><link>https://feed.craftedsignal.io/briefs/2026-03-cnapp-adversary-risk/</link><pubDate>Sat, 28 Mar 2026 09:35:23 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-cnapp-adversary-risk/</guid><description>CrowdStrike Falcon Cloud Security enhances CNAPP capabilities with application-layer visibility and adversary-informed risk prioritization, enabling security teams to focus on attacker-aligned risks and known threat actors.</description><content:encoded><![CDATA[<p>CrowdStrike has enhanced its Falcon Cloud Security CNAPP (Cloud-Native Application Protection Platform) with new features aimed at improving risk assessment and prioritization. These advancements address limitations in current CNAPP solutions, which often lack visibility into business applications, ignore adversary behavior, and result in endless triage. The new capabilities provide security teams with the context needed to understand cloud risk, prioritize remediation, and accelerate response times. The updates correlate infrastructure findings with business-critical applications and incorporate intelligence on adversary tactics, techniques, and procedures (TTPs) observed in documented intrusions, especially those from state-nexus threat actors which saw a 266% increase year-over-year in 2025.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Foothold:</strong> An attacker gains initial access to a cloud environment through misconfigurations or vulnerabilities in cloud infrastructure, such as overly permissive access to storage resources.</li>
<li><strong>Privilege Escalation:</strong> Leveraging the initial access, the attacker attempts to escalate privileges within the cloud environment, potentially exploiting weak identity and access management (IAM) policies.</li>
<li><strong>Application Discovery:</strong> The attacker identifies business applications running within the cloud environment and maps their dependencies, potentially using techniques to enumerate services and access data.</li>
<li><strong>Data Access:</strong> The attacker accesses sensitive data stored within the cloud environment, such as customer personally identifiable information (PII), by exploiting vulnerabilities or misconfigurations in application or infrastructure layers.</li>
<li><strong>Lateral Movement:</strong> The attacker moves laterally within the cloud environment, compromising additional systems and applications, potentially leveraging stolen credentials or exploiting trust relationships between services.</li>
<li><strong>AI Application Compromise (if applicable):</strong> If the targeted organization uses AI-driven applications, the attacker attempts to compromise these applications, potentially gaining access to external large language models (LLMs) or exfiltrating sensitive data.</li>
<li><strong>Data Exfiltration:</strong> The attacker exfiltrates sensitive data from the compromised cloud environment, potentially using techniques to bypass data loss prevention (DLP) controls or obfuscate the exfiltration traffic.</li>
<li><strong>Impact:</strong> The attack results in data breach, financial loss, reputational damage, or disruption of critical business services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of cloud vulnerabilities and misconfigurations can lead to significant data breaches, potentially affecting millions of users. Organizations in various sectors, including financial services and healthcare, are at risk. The compromise of AI-driven applications can lead to exposure of sensitive data to external AI services and unauthorized access to large language models. The financial impact can range from direct losses due to theft to indirect costs associated with remediation, legal fees, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Utilize Falcon Cloud Security&rsquo;s Application Explorer to gain visibility into business applications running across cloud and on-premises environments and identify infrastructure risks affecting production applications.</li>
<li>Leverage Falcon Cloud Security&rsquo;s adversary intelligence to prioritize cloud risks based on known adversary profiles and observed techniques, focusing on threat actors such as LABYRINTH CHOLLIMA and SCATTERED SPIDER.</li>
<li>Implement continuous code-level runtime analysis to build an application inventory, map dependencies, and identify application-layer risks as highlighted by the Falcon Cloud Security capabilities.</li>
<li>Monitor and audit overly permissive access to storage resources that can lead to data breaches.</li>
<li>Enhance cloud security posture by addressing IAM misconfigurations, which are often the entry point for initial access.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud-security</category><category>cnaap</category><category>risk-prioritization</category></item><item><title>CrowdStrike Falcon Cloud Security Introduces Adversary-Informed Risk Prioritization</title><link>https://feed.craftedsignal.io/briefs/2026-03-cnapp-risk-prioritization/</link><pubDate>Sat, 28 Mar 2026 09:26:44 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-cnapp-risk-prioritization/</guid><description>CrowdStrike's Falcon Cloud Security enhances CNAPP capabilities by introducing adversary-informed risk prioritization, application layer visibility, and root cause analysis of configuration changes, enabling security teams to better understand and remediate cloud risks.</description><content:encoded><![CDATA[<p>CrowdStrike Falcon Cloud Security has introduced new Cloud Native Application Protection Platform (CNAPP) capabilities focused on improving risk assessment and remediation in cloud environments. The updates address limitations such as lack of application layer visibility, ignoring adversary behavior, and difficulty in tracing the origin of exposures. Falcon Cloud Security now incorporates Application Explorer, providing application-layer visibility, and adversary intelligence, aligning risk prioritization with known threat actor behaviors (like LABYRINTH CHOLLIMA and SCATTERED SPIDER) and observed intrusion patterns. Additionally, it provides insights into the configuration changes leading to identified exposures. These enhancements aim to provide security teams with better context, enabling them to understand cloud risk, prioritize remediation efforts, and accelerate the transition from detection to action.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise:</strong> An organization&rsquo;s cloud infrastructure is misconfigured, creating an overly permissive access control to a storage resource containing customer PII.</li>
<li><strong>Discovery:</strong> An adversary, potentially aligned with a group like LABYRINTH CHOLLIMA or SCATTERED SPIDER, identifies the misconfigured storage resource through reconnaissance activities.</li>
<li><strong>Lateral Movement:</strong> The adversary uses the initial access to move laterally within the cloud environment, exploiting existing roles and permissions.</li>
<li><strong>Privilege Escalation:</strong> The adversary elevates privileges to gain access to sensitive applications, exploiting vulnerabilities or misconfigurations.</li>
<li><strong>Data Access:</strong> The attacker accesses applications connected to the storage resource, including business-critical applications processing payment information.</li>
<li><strong>Data Exfiltration:</strong> The adversary exfiltrates sensitive customer PII from the storage resource, taking advantage of the permissive access controls.</li>
<li><strong>Impact:</strong> The exfiltrated data is used for malicious purposes, such as identity theft or financial fraud, leading to financial and reputational damage for the targeted organization.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The enhanced CNAPP capabilities aim to reduce the likelihood and impact of cloud breaches. In 2025, cloud intrusions by state-nexus threat actors surged by 266%. Successfully exploiting cloud misconfigurations can lead to significant data breaches, financial losses, and reputational damage. Organizations across various sectors, especially financial services, are at risk. Failure to prioritize and remediate cloud risks can result in the compromise of business-critical applications and sensitive data, including personally identifiable information (PII).</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Prioritize deployment of Falcon Cloud Security to gain application-layer visibility and identify infrastructure risks impacting critical applications as described in the <strong>Overview</strong>.</li>
<li>Utilize the adversary intelligence feature in Falcon Cloud Security to prioritize risk remediation based on known threat actor behavior, specifically focusing on groups like <strong>LABYRINTH CHOLLIMA and SCATTERED SPIDER</strong> as mentioned in the <strong>Overview</strong>.</li>
<li>Implement the following Sigma rule to detect anomalous access to cloud storage resources.</li>
<li>Enable and review cloud configuration logs to identify misconfigurations leading to overly permissive access controls, enabling faster remediation and prevention of future exposures, as described in the <strong>Attack Chain</strong>.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud</category><category>cnapp</category><category>risk-prioritization</category></item><item><title>CrowdStrike Falcon Cloud Security CNAPP with Adversary-Informed Risk Prioritization</title><link>https://feed.craftedsignal.io/briefs/2026-03-crowdstrike-cnapp/</link><pubDate>Sat, 28 Mar 2026 08:17:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-crowdstrike-cnapp/</guid><description>CrowdStrike's new CNAPP capabilities in Falcon Cloud Security focus on adversary-informed risk prioritization by correlating application-layer visibility with threat actor profiles and techniques, enabling security teams to understand cloud risk, prioritize remediation, and accelerate response.</description><content:encoded><![CDATA[<p>CrowdStrike has enhanced its Falcon Cloud Security with new Cloud-Native Application Protection Platform (CNAPP) capabilities designed to prioritize cloud risks based on adversary behavior. This update addresses critical gaps in current CNAPP solutions, including limited visibility into business applications, a lack of integration of adversary intelligence, and difficulties in tracing the root cause of exposures. The new features provide application-layer visibility, correlate risks with threat actor profiles and techniques, and help identify the configuration changes that introduced vulnerabilities. This enables security teams to focus on the attack paths most likely to be exploited by threat actors, such as LABYRINTH CHOLLIMA and SCATTERED SPIDER, and to more effectively prioritize remediation efforts within their cloud environments.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Initial Compromise (Theoretical):</strong> An attacker gains initial access to the cloud environment, potentially exploiting a misconfiguration or vulnerability in a cloud service or application.</li>
<li><strong>Reconnaissance:</strong> The attacker uses internal reconnaissance techniques to discover cloud resources, application dependencies, and potential attack paths within the cloud environment. This phase can be accelerated by exploiting overly permissive access controls on storage resources.</li>
<li><strong>Privilege Escalation:</strong> The attacker attempts to elevate privileges within the cloud environment by exploiting weak IAM configurations, vulnerable services, or exposed credentials.</li>
<li><strong>Lateral Movement:</strong> Using compromised credentials or exploiting service vulnerabilities, the attacker moves laterally to other cloud resources and applications within the environment. The attacker may target business-critical applications that process sensitive data.</li>
<li><strong>Data Access:</strong> The attacker accesses sensitive data stored in cloud storage, databases, or other resources, potentially including customer PII.</li>
<li><strong>Exfiltration (Theoretical):</strong> The attacker exfiltrates the stolen data from the cloud environment to an external location.</li>
<li><strong>Impact (Theoretical):</strong> The successful attack results in data breaches, financial loss, reputational damage, and disruption of business operations.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The observed trend of increasing cloud breaches, including a 266% year-over-year surge in cloud-conscious intrusions by state-nexus threat actors in 2025, highlights the critical need for enhanced cloud security measures. Successful attacks can lead to data breaches, financial losses, reputational damage, and disruption of critical business operations, particularly targeting financial services. The Falcon Cloud Security CNAPP aims to reduce the risk of such incidents by providing better visibility, risk prioritization, and faster response times.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy Falcon Cloud Security to gain visibility into application-layer risks and dependencies as described in the overview section.</li>
<li>Utilize the adversary intelligence features of Falcon Cloud Security to prioritize cloud risks based on known threat actor profiles and observed techniques, mapping risks to groups like LABYRINTH CHOLLIMA and SCATTERED SPIDER.</li>
<li>Investigate alerts generated by Falcon Cloud Security that indicate potential attack paths used by known threat actors, focusing on the industries they actively target, as mentioned in the threat brief.</li>
<li>Enable and review logs from your cloud infrastructure and application services to correlate with the Falcon Cloud Security findings and identify the configuration changes that introduced the exposures.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cloud-security</category><category>cnapp</category><category>threat-intelligence</category><category>risk-prioritization</category></item></channel></rss>