Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mini Shai-Hulud Targets SAP npm Packages With a Bun-Based Secret Stealer

A new npm supply-chain compromise is targeting the SAP developer ecosystem. The affected packages we are tracking so far are: The pattern is familiar but also a bit different: a trusted package receives a new preinstall hook, the hook runs a new setup.mjs file, and that loader downloads the Bun JavaScript runtime to execute a large obfuscated payload named execution.js. The payload is an 11.7 MB credential stealer and propagation framework.

A double win at the Cas d'Or 2026: what identity governance success looks like in the public sector

A French channel partner recently won two top awards at the Cas d'Or 2026 for a public-sector identity governance project. The recognition covered Cyber Governance & Risk Management and the Public Sector category. Here's a look at what the win signals about identity governance in public organizations and how modern IGA platforms help tackle budget pressure, compliance demands, and complex user populations. Identity governance in the public sector rarely makes headlines.

How Cyber Resilience Supports Long-Term Security Goals

In recent years, cyber resilience has moved from being an option to a huge necessity. With organizations becoming a constant target for digital threats, the need for protection, prevention, and deterrence strategies has become more pertinent than ever. Resilience is about being prepared for disruptions, responding quickly, and recovering thoroughly. This makes it easy to secure information and builds faith in the long run.

Top Tools Used to Bypass Cloudflare for Web Scraping: A Security Perspective

Cloudflare protects more than 20% of all websites on the internet, according to W3Techs infrastructure data. Its layered security model combines IP reputation filtering, TLS fingerprinting, JavaScript challenges and behavioural analysis to block automated traffic before it reaches the origin server.

How CDW + Tanium Are Securing Hospitals and Cutting IT Costs by 30-50%

Healthcare IT is at an inflection point — rising costs, thousands of unmanaged devices, and ever-growing cyber threats are putting pressure on hospitals to act. In this video, CDW's healthcare team explores how their partnership with Tanium is helping health systems take control. Learn how the CDW + Tanium solution can help hospitals manage 20,000+ devices across a facility, protect against cyberattacks, reduce IT costs by 30–50%, and free up nurses and clinicians to focus on what matters most: patient care.

The Adversary's Speed Just Changed - What Mythos Means for Your Security Posture

The cybersecurity threat landscape just changed — and most organizations don't know it yet. In this conversation, Tanium's Pedro (CRO) and Mark Liu (VP of Solution Engineering) break down what Anthropic's Mythos really is, why security leaders everywhere are asking about it, and what organizations need to do right now. No marketing pitch — just a straight conversation about a consequential shift that's already underway.

Bot Management vs. ThreatX: How to Stop Business Logic Fraud

Bot Management vs. ThreatX: How to Stop Business Logic Fraud In this video, A10 Networks security expert Gary Wang explores the critical differences between dedicated bot management platforms and the ThreatX approach. If you are concerned about protecting your web applications from sophisticated fraud, this breakdown is essential viewing. Using a real-world scenario—a convenience store referral program being exploited by bad actors—Gary explains how attackers bypass standard defenses to commit "business logic" fraud.

Let's Talk Security: Operationalizing Zero Trust

In this conversation, Forescout CEO Barry Mainz sits down with Dr. Chase Cunningham, also known as “Dr. Zero Trust,” to unpack why Zero Trust is often harder to implement than expected in real-world environments. They also explore what changes when Zero Trust becomes universal (UZTNA)—extending across every connection, every asset, and every environment.