Component test — Web Designer Skill v1.0.0. Each section demonstrates one Step 5 snippet.
Signal 1 — Pill CTA (btn--cta-pill)
Three organisations confirmed breaches this week via credential stuffing. The attack surface was not their perimeter — it was their third-party authentication provider. The lesson is not about passwords. It is about inherited trust.
Go deeper into how credential exposure travels upstream.
Signal 2 — Primary CTA (btn--primary)
A zero-day in a widely deployed VPN appliance was confirmed exploited in the wild before the vendor acknowledged it existed. Forty-eight hours between first exploitation and public disclosure. Defenders had no window.
Go deeper into why disclosure timelines are a governance problem.d the full analys
Signal 3 — Secondary CTA (btn--secondary)
Regulators in three jurisdictions opened concurrent investigations into the same AI vendor following a data retention failure. The company had no unified record of what it held, where it was stored, or who had accessed it.
Supporting reference material below.
In the Wild — Unordered list + Primary CTA
CVE-2026-1190 actively exploited. Patch window is 48 hours — after that, assume compromise on unpatched instances.
Ransomware dwell time down to 4.2 days. Faster encryption means less time for behavioural detection to fire. Endpoint telemetry must be real-time.
SWIFT network anomaly confirmed as insider threat. Privileged access review is overdue at any institution running legacy transaction infrastructure.
AI in Practice — Ordered list + Callout (no CTA)
Three actions this week:
Review privileged access grants issued in the last 90 days. Revoke anything without a current business justification.
Confirm your endpoint telemetry pipeline is delivering real-time alerts, not batched hourly summaries.
Run tabletop on a 4-day dwell scenario — what would detection look like, and who owns the call to isolate?
This week's control: assume your detection window is shorter than your playbook was written for.
This week's control: assume your detection window is shorter than your playbook was written for.
Callout variant — with Primary CTA (btn--primary)
The full analysis covers what a 4-day dwell scenario means for your incident response plan.
The full analysis covers what a 4-day dwell scenario means for your incident response plan.
Read NowCallout variant — with Secondary CTA (btn--secondary)
The full analysis covers what a 4-day dwell scenario means for your incident response plan.
The full analysis covers what a 4-day dwell scenario means for your incident response plan.
Read NowSign-off — Primary CTA
The week's pattern is consistent: the gap between event and response is shrinking faster than detection and governance can follow.
— David








