<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>cybercrime.club</title><link>https://cybercrime.club/tags/epss/</link><description>Infrastructure security news for people who build infrastructure.</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Sun, 05 Apr 2026 11:00:00 -0400</lastBuildDate><atom:link href="https://cybercrime.club/tags/epss/" rel="self" type="application/rss+xml"/><item><title>Severity Drift: Why Your Vulnerability Triage Process Is Working With Bad Data</title><link>https://cybercrime.club/deep-dives/severity-drift-vuln-triage-bad-data/</link><pubDate>Sun, 05 Apr 2026 11:00:00 -0400</pubDate><guid>https://cybercrime.club/deep-dives/severity-drift-vuln-triage-bad-data/</guid><description>From silent reclassifications to incomplete patches to NVD enrichment backlogs, the severity data your vuln management program depends on is wrong more often than you think. Here's the proof — and what to do about it.</description></item></channel></rss>