<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Strobes Security Blog</title>
    <link>https://strobes.co/blog</link>
    <description>Insights on cybersecurity, vulnerability management, CTEM, and exposure management from the Strobes Security team.</description>
    <language>en-us</language>
    <lastBuildDate>Thu, 16 Apr 2026 17:47:40 GMT</lastBuildDate>
    <atom:link href="https://strobes.co/feed.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Best AI Pentesting Tools in 2026: Ranked, Priced &amp; Compared (12 Tools)</title>
      <link>https://strobes.co/blog/best-ai-pentesting-tools-2026</link>
      <guid isPermaLink="true">https://strobes.co/blog/best-ai-pentesting-tools-2026</guid>
      <description>Which AI pentesting tool actually reduces risk in 2026? We reviewed 12 platforms on autonomy, proof quality, pricing, and what happens after a vulnerability is found.</description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/api/media/file/ai-pentesting-featured-v5.png" type="image/jpeg" />
    </item>
    <item>
      <title>Is Claude Mythos the End of Pentesting?</title>
      <link>https://strobes.co/blog/is-claude-mythos-end-of-pentesting</link>
      <guid isPermaLink="true">https://strobes.co/blog/is-claude-mythos-end-of-pentesting</guid>
      <description>Claude Mythos found thousands of zero-days in Linux, browsers, and Apache. Does that make pentesting platforms obsolete? Understanding why models, harnesses, and platforms are three different things -- and why smarter AI makes Strobes more valuable, not less.</description>
      <pubDate>Wed, 08 Apr 2026 00:00:00 GMT</pubDate>
      <author>Strobes Security</author>
      <enclosure url="https://strobes.co/api/media/file/mythos-featured-new.png" type="image/jpeg" />
    </item>
    <item>
      <title>Strobes VI Now Tracks Supply Chain Attacks, Ransomware Groups, and Threat Actors</title>
      <link>https://strobes.co/blog/strobes-vi-supply-chain-ransomware-threat-actors-tracking</link>
      <guid isPermaLink="true">https://strobes.co/blog/strobes-vi-supply-chain-ransomware-threat-actors-tracking</guid>
      <description>224,487 supply chain incidents. 1,251 threat actors. Ransomware groups tracked in real time. Strobes VI now provides the threat intelligence layer that powers proactive exposure management, starting with the lessons from the Axios npm compromise.</description>
      <pubDate>Fri, 03 Apr 2026 00:00:00 GMT</pubDate>
      <author>Strobes</author>
      <enclosure url="https://strobes.co/api/media/file/strobes-vi-featured-new.png" type="image/jpeg" />
    </item>
    <item>
      <title>The Worst Data Breaches of March 2026</title>
      <link>https://strobes.co/blog/worst-data-breaches-of-march-2026</link>
      <guid isPermaLink="true">https://strobes.co/blog/worst-data-breaches-of-march-2026</guid>
      <description>Nine confirmed data breaches across the US and Europe in March 2026, from a 200,000-device wipe at Stryker to 15.8 million patient records stolen at Cegedim Sante. Here is what happened, breach by breach, and what the pattern tells defenders.</description>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/api/media/file/featured-breach-v4.png" type="image/jpeg" />
    </item>
    <item>
      <title>How Strobes AI Turns a Supply Chain Zero-Day into a Full Exposure Assessment in Under 30 Minutes</title>
      <link>https://strobes.co/blog/strobes-ai-supply-chain-incident-response-exposure-assessment</link>
      <guid isPermaLink="true">https://strobes.co/blog/strobes-ai-supply-chain-incident-response-exposure-assessment</guid>
      <description>When the axios npm package was compromised on March 31, 2026, Strobes AI agents autonomously performed incident response, identified every exposed repository across the attack surface, and generated a complete exposure assessment with remediation tasks in under 30 minutes.</description>
      <pubDate>Tue, 31 Mar 2026 12:00:00 GMT</pubDate>
      <author>Strobes Security</author>
      <enclosure url="https://strobes.co/api/media/file/strobes-ir-exposure-featured-v4.png" type="image/jpeg" />
    </item>
    <item>
      <title>Axios npm Supply Chain Attack: 83M Weekly Downloads Compromised by Cross-Platform RAT</title>
      <link>https://strobes.co/blog/axios-npm-supply-chain-attack-compromised-rat-2026</link>
      <guid isPermaLink="true">https://strobes.co/blog/axios-npm-supply-chain-attack-compromised-rat-2026</guid>
      <description>On March 31, 2026, attackers compromised the axios npm maintainer account and published backdoored versions deploying a cross-platform RAT to macOS, Windows, and Linux. Full incident breakdown with IOCs, detection guidance, and real-time AI-driven response.</description>
      <pubDate>Tue, 31 Mar 2026 10:00:00 GMT</pubDate>
      <author>Strobes Security</author>
      <enclosure url="https://strobes.co/api/media/file/axios-supply-chain-featured-v4.png" type="image/jpeg" />
    </item>
    <item>
      <title>How to Write an Effective AI Agent Skill: The Four-Layer Architecture</title>
      <link>https://strobes.co/blog/how-to-write-effective-ai-agent-skill</link>
      <guid isPermaLink="true">https://strobes.co/blog/how-to-write-effective-ai-agent-skill</guid>
      <description>Most teams building AI agents get the ratio wrong: 90% code, 10% methodology. Here is the four-layer architecture Strobes uses to build skills that run complete security assessments autonomously.</description>
      <pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate>
      <author>Siva Krishna Samireddy</author>
      <enclosure url="https://strobes.co/api/media/file/ai-agent-skill-featured-v4.png" type="image/jpeg" />
    </item>
    <item>
      <title>Strobes AI: The Agent Stack Specialized for Offensive Security</title>
      <link>https://strobes.co/blog/strobes-ai-agent-stack-offensive-security</link>
      <guid isPermaLink="true">https://strobes.co/blog/strobes-ai-agent-stack-offensive-security</guid>
      <description>A deep-dive into the multi-agent architecture behind Strobes AI — 12 purpose-built offensive security agents, the Skills system, Human in the Loop governance, and the architectural properties that make continuous exposure management viable at scale.</description>
      <pubDate>Fri, 27 Mar 2026 06:00:00 GMT</pubDate>
      <author>Prakash</author>
      <enclosure url="https://strobes.co/api/media/file/strobes-agent-stack-featured-v4.png" type="image/jpeg" />
    </item>
    <item>
      <title>A Poisoned PyPI Package Quietly Hit 36 Percent of Cloud Environments Through LiteLLM</title>
      <link>https://strobes.co/blog/litellm-pypi-supply-chain-attack-ai-infrastructure</link>
      <guid isPermaLink="true">https://strobes.co/blog/litellm-pypi-supply-chain-attack-ai-infrastructure</guid>
      <description>LiteLLM 1.82.7 and 1.82.8 silently swept AWS credentials, Kubernetes configs, and SSH keys from 3.4 million daily installs. Here is exactly what the payload did and how Strobes AI detects and shuts it down.</description>
      <pubDate>Thu, 26 Mar 2026 00:00:00 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/api/media/file/featured-litellm-supply-chain-v4.png" type="image/jpeg" />
    </item>
    <item>
      <title>What is an Exposure Assessment Platform? The Complete Guide for Security Leaders</title>
      <link>https://strobes.co/blog/what-is-an-exposure-assessment-platform</link>
      <guid isPermaLink="true">https://strobes.co/blog/what-is-an-exposure-assessment-platform</guid>
      <description>An Exposure Assessment Platform (EAP) is the connective tissue that unifies, normalizes, prioritizes, and mobilizes remediation across your entire attack surface. This guide covers how EAPs work, why they replace traditional vulnerability management, and how to evaluate one for your CTEM program.</description>
      <pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate>
      <author>Alibha</author>
      <enclosure url="https://strobes.co/api/media/file/eap-featured-image.png" type="image/jpeg" />
    </item>
    <item>
      <title>Agentic Pentesting with Strobes AI</title>
      <link>https://strobes.co/blog/agentic-pentesting-strobes-ai</link>
      <guid isPermaLink="true">https://strobes.co/blog/agentic-pentesting-strobes-ai</guid>
      <description>What happens when you point Strobes AI at a real web app and let it run a full OWASP WSTG assessment with zero hand-holding? 32 tasks, 21 phases, 42 confirmed vulnerabilities — all autonomous.</description>
      <pubDate>Wed, 25 Mar 2026 00:00:00 GMT</pubDate>
      <author>Prakash Ashok</author>
      <enclosure url="https://strobes.co/api/media/file/agentic-pentesting-cover.png" type="image/jpeg" />
    </item>
    <item>
      <title>Building an AI Harness for Offensive Security: What It Takes to Turn LLMs Into Reliable Pentest and Validation Operators</title>
      <link>https://strobes.co/blog/ai-harness-offensive-security-llm-pentest-architecture</link>
      <guid isPermaLink="true">https://strobes.co/blog/ai-harness-offensive-security-llm-pentest-architecture</guid>
      <description>The model is 20% of the problem. Here is the engineering story behind the orchestration, tooling, middleware, and infrastructure that turns a capable LLM into a reliable penetration testing operator.</description>
      <pubDate>Sun, 22 Mar 2026 00:00:00 GMT</pubDate>
      <author>Strobes Security</author>
      <enclosure url="https://strobes.co/api/media/file/blog-ai-harness-cover.png" type="image/jpeg" />
    </item>
    <item>
      <title>Why Crawling Is the Hardest Part of AI-Powered Pen Testing (And How We Fixed It)</title>
      <link>https://strobes.co/blog/ai-powered-pentesting-crawling-attack-surface-discovery</link>
      <guid isPermaLink="true">https://strobes.co/blog/ai-powered-pentesting-crawling-attack-surface-discovery</guid>
      <description>AI agents are brilliant at reading code but terrible at navigating browsers. Here&apos;s how Strobes combines static analysis, CDP-based swarm crawling, and human browser handover to build a complete attack surface map before testing begins.</description>
      <pubDate>Fri, 20 Mar 2026 08:00:00 GMT</pubDate>
      <author>Strobes Research Team</author>
      <enclosure url="https://strobes.co/api/media/file/crawl-architecture-diagram.png" type="image/jpeg" />
    </item>
    <item>
      <title>Top Data Breaches of February 2026</title>
      <link>https://strobes.co/blog/top-data-breaches-of-february-2026</link>
      <guid isPermaLink="true">https://strobes.co/blog/top-data-breaches-of-february-2026</guid>
      <description>February 2026 brought a series of significant data breaches spanning automotive, aviation, hospitality, finance, telecom, and media. The incidents were not driven by a single attack method. Some resulted from credential stuffing, others from ransomware and extortion tactics, and several from inadequ</description>
      <pubDate>Mon, 02 Mar 2026 15:34:24 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2026/03/6.png" type="image/jpeg" />
    </item>
    <item>
      <title>42,900 OpenClaw Exposed Control Panels and Why You Should Care</title>
      <link>https://strobes.co/blog/42900-openclaw-exposed-control-panels-and-why-you-should-care</link>
      <guid isPermaLink="true">https://strobes.co/blog/42900-openclaw-exposed-control-panels-and-why-you-should-care</guid>
      <description>Over the past two weeks, most coverage around Moltbot and OpenClaw has chased the flashy angle. One-click exploits, remote code execution, APT chatter, scary screenshots. Meanwhile, security teams are doing what they always do when a new tool gets hit. Patch, block ports, rotate keys. That&apos;s necessa</description>
      <pubDate>Thu, 12 Feb 2026 14:47:11 GMT</pubDate>
      <author>Venu Rao</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2026/02/3.png" type="image/jpeg" />
    </item>
    <item>
      <title>Driving CTEM Adoption Across the Enterprise</title>
      <link>https://strobes.co/blog/driving-ctem-adoption-across-the-enterprise</link>
      <guid isPermaLink="true">https://strobes.co/blog/driving-ctem-adoption-across-the-enterprise</guid>
      <description>Most enterprises are not short on security activity. They run scanners, onboard new tools, commission assessments, run internal reviews, and publish regular risk reports. Yet exposure still slips through. Incidents still trace back to issues that were already known. Teams still debate what matters m</description>
      <pubDate>Mon, 09 Feb 2026 14:28:40 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2026/02/2.png" type="image/jpeg" />
    </item>
    <item>
      <title>Exposure Assessment vs Adversarial Exposure Validation</title>
      <link>https://strobes.co/blog/exposure-assessment-vs-validation</link>
      <guid isPermaLink="true">https://strobes.co/blog/exposure-assessment-vs-validation</guid>
      <description>Your security team just delivered another quarterly report. 847 vulnerabilities discovered. 23 rated critical. 156 high severity. CVSS scores assigned. Remediation priorities set. And yet, like last quarter, the backlog grows faster than your team can patch. Worse, you&apos;re left wondering: are we fixi</description>
      <pubDate>Wed, 04 Feb 2026 10:38:40 GMT</pubDate>
      <author>Alibha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2026/02/1.png" type="image/jpeg" />
    </item>
    <item>
      <title>Adversarial Exposure Validation for Modern Environments</title>
      <link>https://strobes.co/blog/adversarial-exposure-validation-for-modern-environments</link>
      <guid isPermaLink="true">https://strobes.co/blog/adversarial-exposure-validation-for-modern-environments</guid>
      <description>What is Adversarial Exposure Validation? Adversarial Exposure Validation is a structured approach that applies attacker-style actions to confirm how your environment behaves under real pressure. Instead of stopping at detection, it recreates the tactics hostile actors use to prove which exposures ac</description>
      <pubDate>Tue, 03 Feb 2026 17:43:43 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2026/02/illustration-of-a-neon-letter-i-isolated-on-black-2025-12-31-02-24-07-utc.jpg" type="image/jpeg" />
    </item>
    <item>
      <title>Why Deduplication Is the Most Underrated Security Control</title>
      <link>https://strobes.co/blog/vulnerability-deduplication-security</link>
      <guid isPermaLink="true">https://strobes.co/blog/vulnerability-deduplication-security</guid>
      <description>Security teams face constant pressure from an overload of alerts and findings. Every new scanner or assessment adds to the pile, making it hard to focus on what matters. Instead of streamlining efforts, these tools often create more confusion by repeating the same issues across reports. This is wher</description>
      <pubDate>Tue, 03 Feb 2026 12:17:23 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2026/02/7-2.jpg" type="image/jpeg" />
    </item>
    <item>
      <title>Top 10 Exposure Management Platforms That Truly Reduce Risks</title>
      <link>https://strobes.co/blog/top-10-exposure-management-platforms-that-truly-reduce-risks</link>
      <guid isPermaLink="true">https://strobes.co/blog/top-10-exposure-management-platforms-that-truly-reduce-risks</guid>
      <description>If you’ve owned security outcomes for any length of time, the shift is clear. Counting CVEs no longer tells you whether risk is actually going down. Attack surfaces expand continuously, change faster than teams can track, and traditional scanners struggle to show what attackers are actually exploiti</description>
      <pubDate>Tue, 03 Feb 2026 09:56:49 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2026/02/9.jpg" type="image/jpeg" />
    </item>
    <item>
      <title>How ASPM Protects Cloud-Native Applications from Misconfigurations and Exploits</title>
      <link>https://strobes.co/blog/how-aspm-protects-cloud-native-applications-from-misconfigurations-and-exploits</link>
      <guid isPermaLink="true">https://strobes.co/blog/how-aspm-protects-cloud-native-applications-from-misconfigurations-and-exploits</guid>
      <description>Cloud-native applications have changed how businesses build and scale software. Microservices, containers, and serverless architectures enable faster and more flexible development, but they also make the environment more challenging to secure. Misconfigurations have quietly become one of the biggest</description>
      <pubDate>Fri, 23 Jan 2026 11:01:17 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2026/01/7-1.jpg" type="image/jpeg" />
    </item>
    <item>
      <title>Cybersecurity Trends to Watch in  2026</title>
      <link>https://strobes.co/blog/cybersecurity-trends-to-watch-in-2026</link>
      <guid isPermaLink="true">https://strobes.co/blog/cybersecurity-trends-to-watch-in-2026</guid>
      <description>2026 is already resetting the stakes. Last year, more than 4,100 publicly disclosed data breaches were reported globally, nearly 11 a day, with the average cost reaching about $4.44 million. That is not background noise. It is an early warning. Every boardroom update, budget call, and security plan </description>
      <pubDate>Mon, 19 Jan 2026 14:34:22 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2026/01/7-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>Top CVEs of December 2025</title>
      <link>https://strobes.co/blog/top-cves-of-december-2025</link>
      <guid isPermaLink="true">https://strobes.co/blog/top-cves-of-december-2025</guid>
      <description>December 2025 was a brutal reality check for security teams. While most were winding down for the holidays, threat actors weaponized a tectonic shift in the landscape, headlined by the &quot;React2Shell&quot; exploit. From mass web server takeovers to unauthenticated mail server compromises, the Top CVEs of D</description>
      <pubDate>Fri, 02 Jan 2026 08:23:47 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2026/01/12-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>Top Data Breaches of December 2025</title>
      <link>https://strobes.co/blog/top-data-breaches-of-december-2025</link>
      <guid isPermaLink="true">https://strobes.co/blog/top-data-breaches-of-december-2025</guid>
      <description>December 2025 closed the year with several high-impact data breaches across retail, education, healthcare research, and telecom. These incidents were not driven by a single cause. Some stemmed from misconfigured systems, others from ransomware, and several from third-party access failures. What ties</description>
      <pubDate>Wed, 31 Dec 2025 12:40:09 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/12/19-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>Why Visibility Alone Fails and Context Wins in 2026</title>
      <link>https://strobes.co/blog/visibility-vs-context-2026</link>
      <guid isPermaLink="true">https://strobes.co/blog/visibility-vs-context-2026</guid>
      <description>For more than a decade, cybersecurity teams have chased visibility through logs, dashboards, alerts, and tools that promised a single pane of glass. And yet, here’s the uncomfortable truth. Security teams today have unprecedented visibility, yet they often lack clarity on what actually matters. They</description>
      <pubDate>Wed, 31 Dec 2025 12:18:35 GMT</pubDate>
      <author>Venu Rao</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/12/3-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>2025, The Year We Stopped Building Features and Started Building Outcomes</title>
      <link>https://strobes.co/blog/2025-building-security-outcomes</link>
      <guid isPermaLink="true">https://strobes.co/blog/2025-building-security-outcomes</guid>
      <description>Let me be real with you. 2025 wasn&apos;t about launching a hundred features and patting ourselves on the back. It was about asking one uncomfortable question: Are we actually helping security teams reduce exposure, or are we just giving them another dashboard to stare at? The answer shaped everything we</description>
      <pubDate>Tue, 30 Dec 2025 08:30:37 GMT</pubDate>
      <author>Akhil Reni</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/12/10-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>Top Data Breaches in 2025 [Month-wise]</title>
      <link>https://strobes.co/blog/top-data-breaches-in-2025-month-wise</link>
      <guid isPermaLink="true">https://strobes.co/blog/top-data-breaches-in-2025-month-wise</guid>
      <description>A data breach. Headlines scream, investors and customers panic, fingers get pointed, and goodwill gets affected. Do you know how much a data breach can affect a company? Data breaches have become a constant threat in our ever-connected world, and 2025 has been no different. From tech giants to gover</description>
      <pubDate>Fri, 26 Dec 2025 05:48:11 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/12/13-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>Top CVEs of November 2025</title>
      <link>https://strobes.co/blog/top-cves-of-november-2025</link>
      <guid isPermaLink="true">https://strobes.co/blog/top-cves-of-november-2025</guid>
      <description>Security teams barely got a break in November. High-severity alerts kept popping up, ranging from active Windows kernel exploits to urgent cloud infrastructure flaws. With so many patches releasing at once, identifying the most dangerous threats is essential for protecting your network. The followin</description>
      <pubDate>Thu, 11 Dec 2025 11:21:27 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/11/6-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>CVE-2025-55182: React2Shell RCE Demands Immediate Security Action</title>
      <link>https://strobes.co/blog/react2shell-cve-2025-55182-rce</link>
      <guid isPermaLink="true">https://strobes.co/blog/react2shell-cve-2025-55182-rce</guid>
      <description>React2Shell exposes a fundamental flaw in how React Server Components interpret untrusted data, turning a routine hydration step into a reliable remote execution pathway. Introduction If you work with React, Next.js, or any framework that leans on React Server Components (RSC), this is the one vulne</description>
      <pubDate>Mon, 08 Dec 2025 15:19:35 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/12/11-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>Top Data Breaches of November 2025</title>
      <link>https://strobes.co/blog/top-data-breaches-of-november-2025</link>
      <guid isPermaLink="true">https://strobes.co/blog/top-data-breaches-of-november-2025</guid>
      <description>Data breaches recorded a high-impact breach across apparel brands, analytics platforms, food-delivery networks, cloud providers, and major financial institutions. These incidents exposed sensitive customer data, internal records, and operational details, showing how easily exposure spreads when vend</description>
      <pubDate>Fri, 28 Nov 2025 15:46:52 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/11/12-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>The Dark Side of Discounts: Mapping the Black Friday Cybercrime Economy</title>
      <link>https://strobes.co/blog/black-friday-cybercrime-economy</link>
      <guid isPermaLink="true">https://strobes.co/blog/black-friday-cybercrime-economy</guid>
      <description>Black Friday creates a shift that most enterprises feel long before the sale begins. Traffic climbs. Product teams release updates faster. New landing pages, offers, and integrations move into production with tight timelines. These changes are normal for revenue growth, but they also widen exposure </description>
      <pubDate>Thu, 27 Nov 2025 13:30:14 GMT</pubDate>
      <author>Kirthika</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/11/9-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>Root Detection in Android Apps - Security Benefits, Challenges, and Implementation Strategies</title>
      <link>https://strobes.co/blog/root-detection-android-security</link>
      <guid isPermaLink="true">https://strobes.co/blog/root-detection-android-security</guid>
      <description>Among the most debated questions in the constantly changing mobile application development, whether to include root detection in the application is a seemingly important choice to both developers and security teams. This is not just a technical option, but it has far-reaching consequences in terms o</description>
      <pubDate>Tue, 25 Nov 2025 09:41:01 GMT</pubDate>
      <author>Shiva Krishna Samireddy</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/11/6-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>Why Organizations Are Moving to CTEM</title>
      <link>https://strobes.co/blog/why-organizations-are-moving-to-ctem</link>
      <guid isPermaLink="true">https://strobes.co/blog/why-organizations-are-moving-to-ctem</guid>
      <description>Security teams are facing exposure patterns that form and spread far faster than traditional assessment cycles can handle. A misconfigured cloud role created during an early-morning deployment can expose sensitive permissions before lunch. A forgotten internet-exposed asset can be scanned by automat</description>
      <pubDate>Tue, 25 Nov 2025 09:30:00 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/11/7-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>Top Data Breaches of October 2025</title>
      <link>https://strobes.co/blog/top-data-breaches-of-october-2025</link>
      <guid isPermaLink="true">https://strobes.co/blog/top-data-breaches-of-october-2025</guid>
      <description>October 2025 brought significant data breaches. From universities and airlines to healthcare providers and enterprise systems, multiple high-impact incidents exposed millions of records across industries. These breaches highlight recurring issues, such as third-party risks, delayed patching, exposed</description>
      <pubDate>Thu, 30 Oct 2025 16:12:59 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/10/2-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>Top CVEs of October 2025</title>
      <link>https://strobes.co/blog/top-cves-of-october-2025</link>
      <guid isPermaLink="true">https://strobes.co/blog/top-cves-of-october-2025</guid>
      <description>October wasn’t short on headlines, but these CVEs did more than make the news. They reshaped how organizations view exposure, privilege, and trust across their environments. Top CVEs of October 2025 spotlights the vulnerabilities that drove real-world exploits, privilege abuse in the cloud, and syst</description>
      <pubDate>Thu, 30 Oct 2025 12:13:53 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/10/4-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>Cybersecurity Accountability: Why CISOs Must Share Ownership Across the Enterprise</title>
      <link>https://strobes.co/blog/cybersecurity-accountability-why-cisos-must-share-ownership-across-the-enterprise</link>
      <guid isPermaLink="true">https://strobes.co/blog/cybersecurity-accountability-why-cisos-must-share-ownership-across-the-enterprise</guid>
      <description>The sharing of ownership is more secure within the company. There are still standards set by the CISO and the core program being executed, but business owners, product team, IT, data stewards, legal, procurement, and finance each have well defined responsibilities. This model transforms security int</description>
      <pubDate>Fri, 24 Oct 2025 07:25:53 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/10/15-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>Beyond the Basics Developing a Risk Driven AI Driven Cloud Native Security Strategy.</title>
      <link>https://strobes.co/blog/beyond-the-basics-developing-a-risk-driven-ai-driven-cloud-native-security-strategy</link>
      <guid isPermaLink="true">https://strobes.co/blog/beyond-the-basics-developing-a-risk-driven-ai-driven-cloud-native-security-strategy</guid>
      <description>The use of clouds has taken a significant step forward beyond workloads and virtual machines. Containers, Kubernetes, microservices, APIs, and serverless functions can be relied upon by modern enterprises to provide a cloud-native architecture. Such environments not only speed up the delivery of sof</description>
      <pubDate>Wed, 22 Oct 2025 13:47:59 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/10/20-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>The F5 Nation-State Compromise: Strategic Implications and Enterprise Defense Mandates</title>
      <link>https://strobes.co/blog/the-f5-nation-state-compromise-strategic-implications-and-enterprise-defense-mandates</link>
      <guid isPermaLink="true">https://strobes.co/blog/the-f5-nation-state-compromise-strategic-implications-and-enterprise-defense-mandates</guid>
      <description>On October 15, 2025, F5 Networks, a key player in application delivery and security, disclosed a devastating breach that has sent ripples through the cybersecurity community. Dubbed the F5 nation-state compromise, this breach isn’t just another corporate incident; it’s a strategic espionage event, h</description>
      <pubDate>Thu, 16 Oct 2025 10:07:55 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/10/21-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>The Real Cost of Security Fatigue and How CTEM Brings It Down</title>
      <link>https://strobes.co/blog/the-real-cost-of-security-fatigue-and-how-ctem-brings-it-down</link>
      <guid isPermaLink="true">https://strobes.co/blog/the-real-cost-of-security-fatigue-and-how-ctem-brings-it-down</guid>
      <description>Security fatigue is becoming one of the most overlooked challenges in cybersecurity today. A recent report by Sophos found that 85% of cybersecurity and IT professionals in the Asia-Pacific region are already experiencing burnout or fatigue. That means even before a major attack happens, many teams </description>
      <pubDate>Wed, 15 Oct 2025 10:59:44 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/10/1-min.png" type="image/jpeg" />
    </item>
    <item>
      <title>CVE-2025-61882 Explained: The Oracle Zero-Day Breach That Hit Enterprises Hard</title>
      <link>https://strobes.co/blog/cve-2025-61882-explained-the-oracle-zero-day-breach-that-hit-enterprises-hard</link>
      <guid isPermaLink="true">https://strobes.co/blog/cve-2025-61882-explained-the-oracle-zero-day-breach-that-hit-enterprises-hard</guid>
      <description>A critical zero-day vulnerability in Oracle E-Business Suite (EBS) was exploited by the Cl0p ransomware group in mid-2025. The flaw, later tracked as CVE-2025-61882, allowed remote code execution without authentication, giving attackers complete control over affected systems. On the Strobes Vulnerab</description>
      <pubDate>Thu, 09 Oct 2025 13:04:26 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/10/Blog-Featured-Images-strobes-1.png" type="image/jpeg" />
    </item>
    <item>
      <title>Top Data Breaches In September 2025</title>
      <link>https://strobes.co/blog/top-data-breaches-of-september-2025</link>
      <guid isPermaLink="true">https://strobes.co/blog/top-data-breaches-of-september-2025</guid>
      <description>September 2025 saw major data breaches affecting Volvo, Gucci, European airports, Wealthsimple, and Harrods. From HR data to critical infrastructure, attackers exploited vendor ecosystems and third-party systems. These incidents underscore the importance of robust third-party risk management, contin</description>
      <pubDate>Wed, 01 Oct 2025 10:42:47 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/10/9-min-1200x627-1.jpg" type="image/jpeg" />
    </item>
    <item>
      <title>Top CVEs &amp; Vulnerabilities of September 2025</title>
      <link>https://strobes.co/blog/top-cves-vulnerabilities-of-september-2025</link>
      <guid isPermaLink="true">https://strobes.co/blog/top-cves-vulnerabilities-of-september-2025</guid>
      <description>CVEs &amp; Vulnerabilities of September 2025 reveal a wave of high-impact flaws that security teams cannot afford to ignore. From unauthenticated exploits in FreePBX to privilege escalation in Android and root-level risks in Cisco firewalls, attackers are moving fast to weaponize these weaknesses. This </description>
      <pubDate>Wed, 01 Oct 2025 08:08:16 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/10/8-min-1200x627-1.jpg" type="image/jpeg" />
    </item>
    <item>
      <title>Beyond the Basics Developing a Risk Driven AI Driven Cloud Native Security Strategy</title>
      <link>https://strobes.co/blog/ai-powered-cloud-native-security-strategy</link>
      <guid isPermaLink="true">https://strobes.co/blog/ai-powered-cloud-native-security-strategy</guid>
      <description>Cloud-native architectures bring speed and scalability but also create new risks beyond traditional workloads. Misconfigured APIs, vulnerable containers, and over-permissive access expose enterprises to advanced threats. This blog explains why legacy security tools fall short, how AI-driven strategi</description>
      <pubDate>Tue, 30 Sep 2025 13:14:00 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/09/7-min-1200x627-1.jpg" type="image/jpeg" />
    </item>
    <item>
      <title>How to Manage Vulnerability Risk Across 10,000+ Assets?</title>
      <link>https://strobes.co/blog/vulnerability-risk-management-for-10000-assets</link>
      <guid isPermaLink="true">https://strobes.co/blog/vulnerability-risk-management-for-10000-assets</guid>
      <description>When your asset base exceeds 10,000, vulnerability risk management becomes a strategic discipline. This guide covers asset discovery, scanning, prioritization, remediation, and validation, showing how enterprises can orchestrate tools, teams, and processes effectively. Learn how Strobes RBVM central</description>
      <pubDate>Fri, 26 Sep 2025 14:12:01 GMT</pubDate>
      <author>Alibha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/09/6-min-1200x627-1.jpg" type="image/jpeg" />
    </item>
    <item>
      <title>Department of War Announces CSRMC to Strengthen US Cyber Frontlines</title>
      <link>https://strobes.co/blog/csrmc-department-of-war-cybersecurity</link>
      <guid isPermaLink="true">https://strobes.co/blog/csrmc-department-of-war-cybersecurity</guid>
      <description>The Department of War has retired the Risk Management Framework (RMF) and introduced the Cybersecurity Risk Management Construct (CSRMC). Unlike RMF’s paperwork-heavy, point-in-time approvals, CSRMC emphasizes automation, continuous monitoring, and real-time risk defense. With its lifecycle and ten </description>
      <pubDate>Fri, 26 Sep 2025 13:45:26 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/09/5-min-1200x627-1.jpg" type="image/jpeg" />
    </item>
    <item>
      <title>How Regular CVE Scanning Reduces the Risk of RCE Attacks</title>
      <link>https://strobes.co/blog/cve-scanning-reduce-risk-rce-attacks</link>
      <guid isPermaLink="true">https://strobes.co/blog/cve-scanning-reduce-risk-rce-attacks</guid>
      <description>Remote Code Execution (RCE) attacks remain one of the most dangerous cybersecurity threats, allowing attackers to take full control of systems and cause severe business damage. Regular CVE scanning is a key part of how to prevent RCE attacks, helping organizations identify unpatched vulnerabilities,</description>
      <pubDate>Thu, 25 Sep 2025 13:55:23 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/09/4-min-1200x627-1.jpg" type="image/jpeg" />
    </item>
    <item>
      <title>How Application Penetration Testing Prevents Real-World Breaches</title>
      <link>https://strobes.co/blog/application-penetration-testing-prevent-breaches</link>
      <guid isPermaLink="true">https://strobes.co/blog/application-penetration-testing-prevent-breaches</guid>
      <description>Applications are prime targets for attackers, and breaches often start with a single vulnerability. Application penetration testing identifies, validates, and helps remediate these weaknesses before they are exploited. Modern PTaaS integrates with DevSecOps and CTEM, providing continuous validation,</description>
      <pubDate>Wed, 24 Sep 2025 14:34:35 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/09/3-min-1200x627-1.jpg" type="image/jpeg" />
    </item>
    <item>
      <title>6 Ways CISOs Are Using AI to Prioritize Critical Vulnerabilities</title>
      <link>https://strobes.co/blog/cisos-use-ai-powered-vulnerability-prioritization</link>
      <guid isPermaLink="true">https://strobes.co/blog/cisos-use-ai-powered-vulnerability-prioritization</guid>
      <description>Just like AI is transforming business operations, it’s revolutionizing how CISOs handle vulnerabilities. AI-powered vulnerability prioritization helps reduce alert noise, focus on high-risk issues, and automate remediation, enabling security teams to act faster, stay ahead of threats, and strengthen</description>
      <pubDate>Mon, 22 Sep 2025 15:04:18 GMT</pubDate>
      <author>Shubham Jha</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/09/2-min-1200x627-1.jpg" type="image/jpeg" />
    </item>
    <item>
      <title>NIS2 Cybersecurity Directive: What CISOs Must Do to Stay Compliant and Mitigate Risk</title>
      <link>https://strobes.co/blog/nis2-cybersecurity-directive-guide</link>
      <guid isPermaLink="true">https://strobes.co/blog/nis2-cybersecurity-directive-guide</guid>
      <description>The NIS2 Cybersecurity Directive raises the stakes for compliance, accountability, and enterprise resilience across the EU. For CISOs and security leaders, NIS2 is more than a regulation, it is an opportunity to integrate compliance with risk reduction, strengthen governance, and build long-term bus</description>
      <pubDate>Fri, 12 Sep 2025 14:08:33 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/09/NIS2-Cybersecurity-Directive-1200x627-1.jpg" type="image/jpeg" />
    </item>
    <item>
      <title>Ransomware Readiness Assessment- A Strobes Guide to Resilience, ROI and Compliance</title>
      <link>https://strobes.co/blog/ransomware-readiness-assessment-metrics-components</link>
      <guid isPermaLink="true">https://strobes.co/blog/ransomware-readiness-assessment-metrics-components</guid>
      <description>Ransomware can halt operations, drain budgets, and erode trust. A ransomware readiness assessment helps CISOs validate backup recovery, control high-risk access, and prove resilience against evolving threats. By aligning with CISA and NIST guidance, organizations gain clear steps, measurable outcome</description>
      <pubDate>Thu, 11 Sep 2025 13:35:48 GMT</pubDate>
      <author>Likhil Chekuri</author>
      <enclosure url="https://strobes.co/wp-content/uploads/2025/09/1-1-1200x627-2.jpg" type="image/jpeg" />
    </item>
  </channel>
</rss>