Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mastering Tanium Automate - Converge 2025 Labs - Tanium Tech Talks #140

Converge 2025 Labs Mastering Tanium Automate Immersive 3-hour workshop in two 90-minute sessions Get hands-on experience designing Automate Playbooks that you can take home and apply immediately FREE PASS TO CONVERGE Get a FREE pass to Tanium Converge in Orlando, Florida, November 17-20. REGISTRATION DEADLINE for Labs and CTF is October 29..

Step-by-Step Guide: Confluence SAML SSO + SCIM Setup with Okta

This short tutorial shows you how to set up the miniOrange SAML+SCIM Bundle for Confluence with Okta as your Identity Provider (IdP). Follow along to enable secure Single Sign-On (SSO) and automate user provisioning between Okta and Confluence. With this plugin, you can: Allow users to log in to Confluence using their Okta credentials Automatically sync and provision users from Okta to Confluence Map Okta groups to Confluence roles for streamlined access control.

Drupal Two-Factor Authentication (2FA/MFA) - Web Authentication

Having a Second Factor Authentication while logging into any service we use has become the norm these days. You also get a reward for activating or enabling MFA in some cases, which is something extra, I guess. If you'd like to add this extra layer of security to your Drupal site, you're in the right place. In this video, we’ll walk you through how to configure Web Authentication as the Two-Factor Authentication(2FA) method for End Users as well as Admins in your Drupal site.

How to Set Up miniOrange 2FA Plugin in WordPress (Step-by-Step)

In this video, we show you how to set up the miniOrange 2-Factor Authentication (2FA) plugin in WordPress. Using the Setup Wizard and plugin dashboard, we’ll guide you to configure 2FA, choose a method, and secure your login. It’s a quick and simple way to protect your website, keep user accounts safe, and block unauthorized access. Timestamps: Contact Us: info@xecurify.com or mfasupport@xecurify.com.

Military ID Deepfakes: How North Korean Hackers Target the South with AI

North Korean threat actor Kimsuky has escalated its social engineering tactics by leveraging military ID deepfakes to deceive South Korean targets. According to a recent analysis by South Korean cybersecurity firm Genians, the group is now using AI-generated images to impersonate military personnel, making phishing campaigns more convincing and harder to detect.

RaccoonO365 Domain Takedown: Microsoft and Cloudflare Dismantle Global Phishing Network

The cybercrime world took a major hit this month with the RaccoonO365 domain takedown, a coordinated move by Microsoft’s Digital Crimes Unit (DCU) and Cloudflare. By seizing 338 malicious domains, investigators disrupted a sprawling phishing-as-a-service ( PhaaS) network that had stolen more than 5,000 Microsoft 365 credentials across 94 countries. This action signals a shift toward large-scale, proactive disruption of phishing operations that exploit everyday users and global enterprises alike.

Falcon for IT Redefines Vulnerability Management with Risk-based Patching

CrowdStrike is introducing Risk-based Patching in CrowdStrike Falcon for IT to close the gap between security and IT teams. With AI-powered Risk-based Patching and CrowdStrike Falcon Exposure Management, organizations can identify, prioritize, and fix the vulnerabilities most critical to them through a single console and workflow while accelerating security and IT consolidation.

Announcing Threat AI: Security's First Agentic Threat Intelligence System

CrowdStrike is unveiling groundbreaking innovations across Counter Adversary Operations. Threat AI, a system of AI-powered agents built on the CrowdStrike Falcon platform, is the industry’s first agentic threat intelligence system. It provides mission-ready agents to reason, hunt, and take action against any stage of adversary activity. In addition, the new Threat Intelligence Browser Extension for Google Chrome extends intelligence everywhere analysts work.