Tanium Basics - Console Navigation, No Compass Needed - Tanium Tech Talks #154

New to Tanium or just need a refresher? In this Tanium Basics kickoff episode, Jesh and Alex walk through the console UI - from environment status to modules and shortcuts - so you can navigate with confidence! What you’ll learn: Environment Status panel provides quick‑hit visibility Question Bar and Search Endpoints streamline activities Quick Links save significant time Tanium Ask enables natural language queries Modules & Shared service navigation supports core workflows Administration menus offer insight & operational controls The power of Question Builder.

Breaking AppSec Myths - Obfuscated Packages

As part of the JFrog Security Research team’s ongoing work, we continuously monitor newly published packages across multiple ecosystems for malicious activity. This effort serves the broader open source community through public research disclosures, and it directly impacts the detection capabilities behind JFrog Xray and JFrog Curation. Our scanning pipeline uses a broad set of indicators to detect suspicious behavior.

Contain the SSO blast radius: Identity security beyond MFA

Over the past week, multiple research teams have documented a renewed wave of voice-led social engineering (vishing) targeting identity providers and federated access. The entry point is not through malware or a zero-day exploit. The goal is simple. Persuade a user to help complete authentication in real time, then use that trusted session to move through SaaS applications and exfiltrate data. Security leaders already know the fundamentals. Multi-factor authentication (MFA) can be socially engineered.

Passwordless Authentication: Where It Strengthens Security and Where It Doesn't

Passwords are still used almost everywhere. People reuse and share their passwords without knowing the risks. Attackers take advantage of these situations. Phishing emails and malware are enough to steal a password, and this is how many security incidents start. The problem can be reduced using passwordless authentication. When passwords are removed from the login process, attackers would find it difficult to attack that device or account.

Analyzing Dead#Vax: Analyzing Multi-Stage VHD Delivery and Self-Parsing Batch Scripts to Deploy In-Memory Shellcode

Securonix Threat Research has been tracking a stealthy malware campaign that uses an uncommon chain of VHD abuse, script-based execution, self-parsing batch logic, fileless PowerShell injections and ultimately dropping RAT. The attack leverages IPFS-hosted VHD files, extreme script obfuscation, runtime decryption, and in-memory shellcode injection into trusted Windows processes, never dropping a decrypted binary to disk.

Is your vendor data a source of insight-or just more noise?

For many risk and compliance leaders, the reality of Third-Party Risk Management (TPRM) is a mountain of disorganized spreadsheets, overflowing inboxes, and endless PDFs. When an audit is seven days away or the Board asks for a risk posture update, documentation overload becomes a liability. In this video, we explore the transition from vendor chaos to risk clarity. The Challenge.

Dinari bridges traditional markets and digital assets - S2E09

In this episode, we're excited to introduce Brandon Ooi, the COO of Dinari, a fintech innovator making compliant tokenized securities accessible to investors. Brandon co-founded Crunchyroll as its CTO and worked at Stripe as an engineer specializing in marketplace enterprises, bringing deep technical expertise and product leadership to the intersection of traditional finance and blockchain technology. Join us as we explore Brandon's journey from building beloved consumer platforms to pioneering the future of securities trading, and how Dinari is bridging the gap between traditional markets and digital assets.