Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to detect React2Shell attacks using network-based threat hunting

How do you find React2Shell vulnerabilities or detect React2Shell attacks in real environments? In this video, Corelight cloud security researcher David Burkett walks through how to threat hunt React2Shell by focusing on post-exploitation behavior at the network level. Instead of relying on exploit signatures, the approach uses application baselining and network traffic analysis to identify abnormal behavior.

The Author's Take: The Past, Present, & Future of Third Party (Cyber) Risk Management

“It is also a common trap of giving inexperienced customers a false sense of security…”~Navigating Supply Chain Cyber Risk TPRM processes today are filled with thousands of pages of questionnaires, assessments, and more, but does that status quo really help secure your vendor ecosystem? Join Aleksandr Yampolskiy (CEO & Co-Founder, SecurityScorecard) and Alex Golbin (Co-Author, Navigating Supply Chain Cyber Risk) as they chat about.

UI Migration Guide - miniOrange SAML SSO + SCIM Provisioning App Bundle for Bitbucket

We’ve redesigned the miniOrange SAML SSO + SCIM Provisioning app for Bitbucket with a new bundled interface to make authentication and user provisioning simpler, faster, and more efficient. This video is your step-by-step guide to understanding what’s new, where to find your settings, and how to make the most of the updated dashboard. What You’ll Learn Unified Dashboard Navigation – Manage SAML SSO and SCIM provisioning from one central place.

Security at Scale: Why Specialization Matters More Than Ever

Security at Scale: Why Specialization Matters More Than Ever In this clip from the A10 Networks discussion “APIs Are the Language of AI — Protecting Them Is Critical,” A10 security experts Jamison Utter and Carlo Alpuerto break down why specialization is becoming essential in modern security operations. They explain how rapidly evolving threats, AI-driven scale, and expanding API ecosystems are reshaping how teams must organize, collaborate, and defend critical infrastructure.

Feature Request Portal - Tanium Tech Talks #147

We want to hear your feature requests. Find out how on today's Tanium Tech Talk. Send feedback directly to our Product Management team Suggest and vote on product feature requests and enhancements Help determine what we implement and how we prioritize Use your Tanium Titans user community login To explore the Tanium Feature Request Portal, go to community.tanium.com, login, and look for the Product Ideas button.

We Asked AI Security Experts to Explain Their Work Using Emojis #AISecurity #AI #AppSec

Can you explain AI Security using only emojis? We challenged AI Security professionals to do just that — no words, just symbols. Their creative combos reveal how experts really think about risks, models, and protection in today’s AI-driven world. From to to , each emoji tells a story about securing the systems behind the world’s most powerful models. Subscribe for more creative takes on AppSec, AI Security, and secure development from the Mend.io team.

The Howler Episode 25 - Susan Corcoran, Chief Accounting Officer

This month, we sit down with Susan Corcoran, Chief Accounting Officer, as she unpacks common misconceptions about accounting, takes us on her journey from Minnesota dairy farm to London then back to Minnesota, and so much more! With nearly two decades of experience, spanning Deloitte and United Health Group, Susan Corcoran has led everything from SEC reporting to global accounting strategy. Now she's steering Arctic Wolf's financial integrity and compliance at the highest level as Chief Accounting Officer.

SecurityScorecard CEO Dr. Aleksandr Yampolskiy 2026 Predictions for Supply Chain Cybersecurity

It's that time of year again for SecurityScorecard 2026 predictions. CEO and co-founder of SecurityScorecard Dr. Aleksandr Yampolskiy shares his predictions for how CEOs will rethink supply chain cybersecurity in 2026. We have seen supply chain breaches take over the headlines and cyber risk is becoming more than just a TPRM & IT issue and is becoming a bigger boardroom issue.