| payload |
{"created_at":"2026-04-05T17:19:00.713 {"created_at":"2026-04-05T17:19:00.713233+00:00","signal_type":"opportunity_research_delta","source":"opportunity_research_ingestor","url":"https://docs.tenable.com/exposure-management/Content/PDF/tenable-exposure-management-user-guide.pdf","value":{"fp":"441e4f18c1b6b716","published_at":"","query":"IAC valuation impacted conflicting reports resolution primary sources","snippet":"Access the Attack Path page, where you can optimize risk prioritization by exposing risky attack paths that traverse the attack surface, including web apps, ...","source":"web_search","summary":"Access the Attack Path page, where you can optimize risk prioritization by exposing risky attack paths that traverse the attack surface, including web apps, ...","title":"[PDF] tenable-exposure-management-user-guide.pdf","url":"https://docs.tenable.com/exposure-management/Content/PDF/tenable-exposure-management-user-guide.pdf"}}... |