Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to set up SAML Authentication for IDP?

Learn How to Set Up SAML Authentication for Your Identity Provider Using CASB In this step-by-step tutorial, we’ll walk you through setting up SAML authentication with your Identity Provider (IdP) using a Cloud Access Security Broker (CASB) via the miniOrange dashboard. What You’ll Learn: Why Use CASB with SAML? CASB adds a layer of visibility and control for your cloud services. Combined with SAML authentication, you get centralized, secure, and compliant user access management across your cloud apps.

June 9, 2025 Cyber Threat Intelligence Briefing

This week’s briefing covers: Proof of Concept Exploit Released for CVE-2025-32756 Further to Kroll reporting in May regarding a critical zero-day vulnerability, CVE-2025-32756 in Fortinet, is now being actively exploited in the wild, with attackers using a crafted AuthHash cookie to gain control of affected systems.

Government Data Breaches Are Eroding Public Trust - It's Time for Stronger Cybersecurity in the Public Sector

The recent data breach at the Australian Human Rights Commission (AHRC) is a stark reminder of what's at stake when public sector cybersecurity falls short. The exposure of sensitive personal information—coupled with a delayed response that exceeded the Notifiable Data Breach (NDB) Scheme's 72-hour notification benchmark—highlights systemic challenges in how government agencies prepare for, detect, and respond to cyber threats. This breach isn't an isolated event.

How to Secure AI in Your App: Mend AI for AppSec Teams

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Attacker Profiles with Behavioral Analysis

How to Fix the Challenges with Web App Firewalls A10 security experts Gary Wang and Jamison Utter explore how to uncover “Dynamic Profiles” of threat actors through advanced behavioral analysis. By leveraging regression models and historical attack patterns, they demonstrate how to detect and anticipate evolving attacker behaviors—an essential capability for staying ahead in today’s rapidly shifting threat landscape.

BlackSuit Ransomware: The Royal Evolution That's Targeting Everyone | Cyber Threats Exposed 1

Think you know ransomware? Think again. BlackSuit isn't just another encryption threat—it's an evolved monster that's putting both Windows AND Linux systems at serious risk. In this episode of our cybersecurity series, we break down.

Built for the agentic era: Meet the Vanta MCP Server

The way developers interact with tools is changing fast. Language models like Claude and ChatGPT, and IDEs like Cursor and Windsurf are much more than assistants and environments—they’re powerful interfaces for interacting with enterprise data. ‍ At Vanta, we envision a world where compliance workflows can shift left to meet GRC teams and developers where they already are. By launching the Vanta MCP Server, we’re making that vision real.