<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[BreachBits, Inc.]]></title><description><![CDATA[We are the world's most accurate cyber risk rating platform.]]></description><link>https://www.breachbits.com/blog</link><generator>RSS for Node</generator><lastBuildDate>Sun, 26 Apr 2026 22:04:38 GMT</lastBuildDate><atom:link href="https://www.breachbits.com/blog-feed.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[BreachBits &#38; Chaucer Focus on Digital Assets, Critical Infrastructure, and Industrial Sectors in 2025]]></title><description><![CDATA[In 2025, Chaucer Group and BreachBits® have strengthened partnership and focused on meeting unique needs of digital asset, critical...]]></description><link>https://www.breachbits.com/post/breachbits-chaucer-focus-on-digital-assets-critical-infrastructure-and-industrial-sectors-in-202</link><guid isPermaLink="false">68ea704a7ff4126e771cc605</guid><category><![CDATA[Around the Market]]></category><category><![CDATA[Industry Insights]]></category><pubDate>Sat, 11 Oct 2025 16:25:41 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8f3a1e_117163a29a47482d9acad6cad8960e6d~mv2.png/v1/fit/w_1000,h_630,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>J. Foster Davis</dc:creator></item><item><title><![CDATA[Emergent Threat Advisory - Oracle E-Business Suite (EBS): What BreachRisk customers need to know]]></title><description><![CDATA[Oracle has issued a Security Alert Advisory addressing a vulnerability in Oracle E-Business Suite (CVE- 2025-61882 ) . This vulnerability...]]></description><link>https://www.breachbits.com/post/emergent-threat-advisory-oracle-e-business-suite-ebs-what-breachrisk-customers-need-to-know</link><guid isPermaLink="false">68e6750d4a2a77bd89cec400</guid><category><![CDATA[Threat Bulletins]]></category><pubDate>Wed, 08 Oct 2025 05:00:00 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8f3a1e_528f86d2e28440668d2c58a6f9232886~mv2.png/v1/fit/w_1000,h_630,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Miguel Diaz</dc:creator></item><item><title><![CDATA[Unlocking Discounts: BreachBits® Accepted by the Native Risk Collective]]></title><description><![CDATA[We've partnered with Native to help digital asset and crypto companies unlock discounts on cyber and tech E&#38;O insurance in the Lloyd's market.

Here's why we've chosen to partner with Native and where you'll see us heading next.]]></description><link>https://www.breachbits.com/post/unlocking-discounts-breachbits-accepted-by-the-native-risk-collective</link><guid isPermaLink="false">687fd0ca65a1765566093ce4</guid><category><![CDATA[Industry Insights]]></category><pubDate>Tue, 22 Jul 2025 21:04:20 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8f3a1e_dc298b5bdb4442868b212a0a3871967b~mv2.png/v1/fit/w_1000,h_630,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>J. Foster Davis</dc:creator></item><item><title><![CDATA[BreachBits and NTI Earn Recognition at Interop Tokyo 2025 for Innovation in Cyber Risk Assessment]]></title><description><![CDATA[BreachBits® and Nippon Telematique received recognition as a Best of Show Finalist at Interop Tokyo 2025.]]></description><link>https://www.breachbits.com/post/breachbits-and-nti-earn-recognition-at-interop-tokyo-2025-for-innovation-in-cyber-risk-assessment</link><guid isPermaLink="false">68a4a7faf8302ff273a2c111</guid><category><![CDATA[Around the Market]]></category><category><![CDATA[Industry Insights]]></category><pubDate>Wed, 02 Jul 2025 05:00:00 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8f3a1e_b614124a3f0343f48235fc7c6c3c51dd~mv2.png/v1/fit/w_1000,h_630,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Kiana Waits</dc:creator></item><item><title><![CDATA[Palo Alto PAN-OS Exploited Authentication Bypass: What BreachRisk customers need to know]]></title><description><![CDATA[Palo Alto indicates the existence of a publicly available exploit chain. BreachRisk can detect this threat and is notifying those affected.]]></description><link>https://www.breachbits.com/post/palo-alto-pan-os-exploited-authentication-bypass-what-breachrisk-customers-need-to-know</link><guid isPermaLink="false">67425891c07b5136416edc23</guid><category><![CDATA[Threat Bulletins]]></category><pubDate>Sat, 23 Nov 2024 23:25:02 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8f3a1e_43bc73b511c14fd6abef3af4e4473430~mv2.png/v1/fit/w_1000,h_630,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Miguel Diaz</dc:creator></item><item><title><![CDATA[Enhancing Virtual CISO Credentials: BreachBits + SecurityStudio Collaboration]]></title><description><![CDATA[Imagine you are a vCISO approaching a new client. Wouldn't it be great to lead  with continuous red teaming so you can advise your client...]]></description><link>https://www.breachbits.com/post/enhancing-virtual-ciso-credentials-breachbits-securitystudio-collaboration</link><guid isPermaLink="false">66c8a6fffa42b17751e01ec5</guid><category><![CDATA[Industry Insights]]></category><pubDate>Thu, 29 Aug 2024 20:58:28 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/ec367e_dbb2464d8dba4cb09518d4230b37075c~mv2.png/v1/fit/w_1000,h_630,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>J. Foster Davis</dc:creator></item><item><title><![CDATA[Unlocking Additional Revenue Streams with BreachRisk™: A Look into ASCII Edge Conference Denver 2024]]></title><description><![CDATA[Here are some of our observations at ASCII Edge Denver 2024, where we presented BreachRisk™ for Service Providers.]]></description><link>https://www.breachbits.com/post/unlocking-msp-cyber-revenue-streams-with-breachrisk-a-look-into-ascii-edge-conference-denver-2024</link><guid isPermaLink="false">6650fb383fb6e3551714b003</guid><category><![CDATA[Industry Insights]]></category><pubDate>Tue, 28 May 2024 05:00:00 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8f3a1e_ca4c59bd13c94864a5bacfe799a89a7a~mv2.png/v1/fit/w_1000,h_630,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Kiana Waits</dc:creator></item><item><title><![CDATA[XZ Utils Linux Vulnerability: What BreachRisk customers need to know]]></title><description><![CDATA[BreachRisk cannot detect the recent XZ Utils Linux Vulnerability. Threat may expand. Customers should continue cyber risk management.]]></description><link>https://www.breachbits.com/post/xz-utils-linux-vulnerability-what-breachrisk-customers-need-to-know</link><guid isPermaLink="false">660b2a60d4a13a98fc5fa827</guid><category><![CDATA[Threat Bulletins]]></category><pubDate>Tue, 02 Apr 2024 05:00:00 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/ec367e_8f9abd198d11406589999c13b49c1592~mv2.png/v1/fit/w_1000,h_630,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Miguel Diaz</dc:creator></item><item><title><![CDATA[Cyber Awareness Month: Windows NTLM Authentication Update in Windows 11]]></title><description><![CDATA[Microsoft recently announced that the NTLM authentication protocol will be no longer be available in the new Windows 11 update]]></description><link>https://www.breachbits.com/post/cyber-awareness-month-windows-ntlm-authentication-update-in-windows-11</link><guid isPermaLink="false">65ae0bc7ffc4df87d8c8c5ec</guid><pubDate>Mon, 30 Oct 2023 20:28:54 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/ec367e_d5b8f592bc944d9cb00b73937f6b7a02~mv2.png/v1/fit/w_1000,h_630,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Miguel Diaz</dc:creator></item><item><title><![CDATA[NetScaler/Citrix Gateway &#38; ADC Vulnerability: What you need to know]]></title><description><![CDATA[A critical security issue was announced last week affecting Citrix NetScaler (ADC and Gateway) products.]]></description><link>https://www.breachbits.com/post/netscaler-vulnerability-bb-2023-18-cve-2023-4966</link><guid isPermaLink="false">65ae0bc7ffc4df87d8c8c5ed</guid><category><![CDATA[Threat Bulletins]]></category><pubDate>Fri, 27 Oct 2023 22:17:49 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/ec367e_d6344a98f22a474d92879da9bae5f224~mv2.png/v1/fit/w_1000,h_630,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Miguel Diaz</dc:creator></item><item><title><![CDATA[Cisco IOS XE Web Management Interface Vulnerability: What you need to know]]></title><description><![CDATA[Here's how BreachBits has helped customers respond to the Cisco IOS XE Web Management Interface Vulnerability.]]></description><link>https://www.breachbits.com/post/cisco-ios-xe-web-management-interface-vulnerability-what-you-need-to-know</link><guid isPermaLink="false">65ae0bc7ffc4df87d8c8c5eb</guid><category><![CDATA[Threat Bulletins]]></category><pubDate>Wed, 25 Oct 2023 19:49:50 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/ec367e_db403c2e4e7a479ea3c06314eb0e893f~mv2.png/v1/fit/w_1000,h_630,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>Miguel Diaz</dc:creator></item><item><title><![CDATA[NetScaler ADC &#38; Gateway Vulnerability: What you need to know]]></title><description><![CDATA[BreachBits analyzed the Citrix/NetScaler threat and rapidly deployed detection to our BreachRisk™ subscribers.]]></description><link>https://www.breachbits.com/post/citrix-netscaler-jul-2023-breachbits-response</link><guid isPermaLink="false">65ae0bc7ffc4df87d8c8c5e1</guid><category><![CDATA[Threat Bulletins]]></category><pubDate>Thu, 03 Aug 2023 19:06:01 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8f3a1e_649fbeb2cf844d799e0a1025d392ed1c~mv2.png/v1/fit/w_1000,h_630,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>J. Foster Davis</dc:creator></item><item><title><![CDATA[The Next Generation of Risk Measurement for Cyber Insurers]]></title><description><![CDATA[At a time when both the demand for cyber insurance and the risk of cyber-attacks are growing, the need for accurate, scalable, and...]]></description><link>https://www.breachbits.com/post/insurance-cyber-risk-the-next-generation-of-cyber-risk-measurement</link><guid isPermaLink="false">65ae0bc6ffc4df87d8c8c5d6</guid><category><![CDATA[Industry Insights]]></category><pubDate>Mon, 15 Aug 2022 17:15:01 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/e1051a_94d83f5cb0c14025bb7ba3352a26d605~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>John Lundgren</dc:creator></item><item><title><![CDATA[Standardizing the Cyber Menace]]></title><description><![CDATA[Managing your enterprise's cyber risk is a surmountable task. I say this because many boards and executives have expressed to me that...]]></description><link>https://www.breachbits.com/post/standardizing-the-cyber-menace</link><guid isPermaLink="false">65ae0bc7ffc4df87d8c8c5e0</guid><category><![CDATA[The Hacker's Perspective]]></category><pubDate>Fri, 01 Jul 2022 13:17:01 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/e1051a_ac02d36accf843939c3d4ed587950dd7~mv2.png/v1/fit/w_1000,h_647,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>J. Foster Davis</dc:creator></item><item><title><![CDATA[Atlassian Confluence Threat: BreachBits Response &#38; Integration]]></title><description><![CDATA[Details of a new threat that could allow attackers to easily gain access to Atlassian Confluence Server and Data Center and possibly...]]></description><link>https://www.breachbits.com/post/atlassian-confluence-threat-breachbits-response-integration</link><guid isPermaLink="false">65ae0bc7ffc4df87d8c8c5df</guid><category><![CDATA[Threat Bulletins]]></category><pubDate>Sat, 04 Jun 2022 23:57:38 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8f3a1e_c246b3ac06ac4523b10148a356f26234~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>J. Foster Davis</dc:creator></item><item><title><![CDATA[Enterprise Risk Management for the Prudent Cyber Insurance Policy Holder]]></title><description><![CDATA[So, if you’re an underwriter for cyber insurance, or manage policies of this sort, here’s the weapon of choice for your clients. They need..]]></description><link>https://www.breachbits.com/post/enterprise-risk-management-for-the-prudent-cyber-insurance-policy-holder</link><guid isPermaLink="false">65ae0bc7ffc4df87d8c8c5de</guid><category><![CDATA[Industry Insights]]></category><pubDate>Thu, 19 May 2022 13:15:03 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/e1051a_a5e41c2380094857bb46b8101e17068b~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>J. Foster Davis</dc:creator></item><item><title><![CDATA[Insuring Unnatural Disasters - Cyber Risk Scoring]]></title><description><![CDATA[As we address cybersecurity, I’d like to specifically discuss cyber insurance. For those not familiar with the term, think of it like...]]></description><link>https://www.breachbits.com/post/insuring-unnatural-disasters-cyber-risk-scoring</link><guid isPermaLink="false">65ae0bc7ffc4df87d8c8c5dd</guid><category><![CDATA[Industry Insights]]></category><pubDate>Tue, 22 Mar 2022 13:05:02 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/e1051a_3655ca8737584e0da8757c1ec505bfac~mv2.png/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>J. Foster Davis</dc:creator></item><item><title><![CDATA[Russia-Ukraine Conflict: Initial Report for BreachBits Customers]]></title><description><![CDATA[We are postured to incorporate new threats instantly across our entire BreachRisk™ customer base. We will continue to keep our BreachRisk™ c]]></description><link>https://www.breachbits.com/post/russia-ukraine-conflict-initial-report-for-breachbits-customers</link><guid isPermaLink="false">65ae0bc7ffc4df87d8c8c5dc</guid><category><![CDATA[The Hacker's Perspective]]></category><pubDate>Fri, 25 Feb 2022 16:31:26 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8f3a1e_19fdf6f01cc9407aa981dfd8e756726b~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>J. Foster Davis</dc:creator></item><item><title><![CDATA[BreachTips: Top 10 Tips for Decreasing Cyber Risks]]></title><description><![CDATA[We're ending the year with our Top 10 Tips to strengthen  your business’s cyber security and decrease risk factors for malicious attacks.]]></description><link>https://www.breachbits.com/post/breachtips-top-10-tips-for-decreasing-cyber-risks</link><guid isPermaLink="false">65ae0bc6ffc4df87d8c8c5d5</guid><category><![CDATA[The Hacker's Perspective]]></category><pubDate>Mon, 03 Jan 2022 18:39:47 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/c8ff1b_6add30931e314fd7b83288af327209dc~mv2.jpg/v1/fit/w_1000,h_1000,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>John Lundgren</dc:creator></item><item><title><![CDATA[Log4Shell Cyber Threat: BreachBits Response &#38; Integration]]></title><description><![CDATA[Details of a new threat to hundreds of software vendors was made public that could allow attackers to easily gain access to  millions of...]]></description><link>https://www.breachbits.com/post/breachbits-update-on-log4shell-vulnerability</link><guid isPermaLink="false">65ae0bc7ffc4df87d8c8c5db</guid><category><![CDATA[Threat Bulletins]]></category><pubDate>Tue, 14 Dec 2021 06:00:00 GMT</pubDate><enclosure url="https://static.wixstatic.com/media/8f3a1e_53da78c418414d78ba8e0a24ed272b44~mv2.png/v1/fit/w_1000,h_720,al_c,q_80/file.png" length="0" type="image/png"/><dc:creator>J. Foster Davis</dc:creator></item></channel></rss>