<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>crashrun — Daily Threat Intelligence</title>
    <link>https://www.crash.run/</link>
    <description>Recent content on crashrun — Daily Threat Intelligence</description>
    <generator>Hugo</generator>
    <language>en</language>
    <lastBuildDate>Thu, 16 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://www.crash.run/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Zero-Day Barrage and Supply Chain Sabotage Define Chaotic Patch Tuesday</title>
      <link>https://www.crash.run/digest/2026-04-16/</link>
      <pubDate>Thu, 16 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://www.crash.run/digest/2026-04-16/</guid>
      <description>A staggering 167 Microsoft vulnerabilities, a critical Windows Defender zero-day, and a massive WordPress plugin supply chain attack have created a perfect storm for defenders on this April Patch Tuesday. The sheer volume of critical fixes, combined with active exploitation of both new and legacy flaws, demands immediate and strategic action from security teams worldwide.&#xA;The Patch Tuesday Avalanche Microsoft&amp;rsquo;s April 2026 Patch Tuesday is one for the record books, addressing 167 CVEs across its ecosystem.</description>
    </item>
    <item>
      <title></title>
      <link>https://www.crash.run/cv/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.crash.run/cv/</guid>
      <description>Jack Stuart, CISSP, CCSP Cyber Security Professional, Bristol, UK&#xA;Professional Profile Cyber security professional with experience across security operations, vulnerability management, and security testing within complex enterprise environments. Fully certified CISSP and CCSP, with completed OSCP training (labs and exercises).&#xA;Highly hands-on and technically strong, with the ability to bridge blue team, purple team, and red team activities by pressure‑testing controls, translating findings into remediation programmes, and reducing organisational attack surface.</description>
    </item>
    <item>
      <title></title>
      <link>https://www.crash.run/intel/cves/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.crash.run/intel/cves/</guid>
      <description></description>
    </item>
    <item>
      <title></title>
      <link>https://www.crash.run/intel/threats/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.crash.run/intel/threats/</guid>
      <description></description>
    </item>
    <item>
      <title>Security Intelligence Dashboard</title>
      <link>https://www.crash.run/intel/overview/</link>
      <pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate>
      <guid>https://www.crash.run/intel/overview/</guid>
      <description>Welcome to the Security Intelligence Dashboard.</description>
    </item>
  </channel>
</rss>
