Vulnerability scanning identifies weaknesses across systems, applications, and networks to help organizations reduce exposure and stay ahead of threats.
Famous Chollima combines BeaverTail and OtterCookie, COLDRIVER deploys three new malware families, and Vidar Stealer 2.0 demonstrates upgraded capabilities.
Astaroth trojan uses GitHub to host malware configurations, TA585 delivers MonsterV2 malware in phishing campaigns, and threat actors exploit Microsoft’s logo in tech support scams.
Customers experience real-time value with Tanium Ask Agent which transforms IT operations and security by automating complex workflows with precision, scale and speed.
XWorm malware reemerges with ransomware, Microsoft disrupts multiple threats targeting Teams, and Storm-1175 exploits a critical GoAnywhere MFT vulnerability.
Third-party patch management is a vital security practice that involves identifying, testing, and applying updates to third-party software, including business-critical applications like browsers, plug-ins, and productivity tools, to reduce risk, maintain compliance, and ensure endpoint stability.
This week, Tanium’s Cyber Threat Intelligence (CTI) team investigates SystemBC, a large-scale proxy botnet that’s leveraging compromised virtual private server (VPS) infrastructure to support cybercriminal operations, including ransomware and credential theft. Next, the team looks at ShinyHunters—a financially motivated data extortion group that’s now targeting enterprise cloud applications.
Linux patch management is the disciplined process of identifying, testing, and applying security patches and updates to Linux-based systems. It’s essential for fixing vulnerabilities, improving performance, and maintaining compliance—ensuring your infrastructure remains resilient in the face of evolving threats.