Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Follow-Up: Updates on Actively Exploited Information Disclosure Vulnerability "Citrix Bleed 2" in Citrix NetScaler ADC and Gateway (CVE-2025-5777)

In late June 2025, Arctic Wolf issued a security bulletin addressing a critical out-of-bounds read vulnerability in Citrix NetScaler ADC and Gateway that Citrix disclosed, tracked as CVE-2025-5777. This vulnerability affects NetScaler devices configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server.

The extended Q+A: continuing the AI agents conversation

Last week, we hosted the Product Spotlight: Build agents in Tines, and it was a hit. We had so many questions that we couldn’t answer them all live, so we’re continuing the conversation here. Before we jump into the Q+A, here’s a quick recap of the webinar in case you missed it: In this session, Head of Product Stephen O'Brien introduced the AI Agent action and shared how it builds on our ongoing evolution of workflows.

SANS SOC Survey 2025: What's holding teams back and how to move forward

The 2025 SANS SOC Survey reveals that while technology keeps evolving, the core problems facing SOC teams remain stubbornly in place. Teams are understaffed. Tool sprawl is growing. And performance metrics often miss the mark. Many SOCs lack the workflows, strategy, and staff to connect tools, streamline processes, and reduce manual work. And now they face a new challenge: making AI actually deliver value. Let’s dig into the key findings.

What to Look for in a Phishing Site Detection and Takedown Solution

With the average phishing campaign now harvesting its first set of credentials in under 15 minutes , the efficacy of a detection strategy is measured in seconds, not hours.. Relying on scanning and takedown or traditional threat intelligence feeds – that inherently lag behind real-time user engagement – is no longer a viable defense against even unsophisticated credential theft and account takeover (ATO) scams.

NIST's new LEV metric: How does it help companies?

The National Institute of Standards and Technology (NIST) has unveiled a new metric that promises to revolutionize the way vulnerability management is prioritized. Likely Exploited Vulnerabilities (LEV) is a ranking designed to help organizations focus their efforts on the flaws that cybercriminals are actively using to perpetrate real-world attacks. Thousands of vulnerabilities are reported every year but only a small fraction is exploited in the wild.

CPS 234 vs. ISO 27001: Differences and overlaps

CPS 234 and ISO 27001 are two industry-accepted standards that help protect organisations from cyber attacks—one of the biggest threats and concerns Australian organisations experienced in 2024. The standards can be said to share the same end goal—increasing cyber resilience while helping manage information security more effectively. ‍ Despite this shared goal, CPS 234 and ISO 27001 come with notable differences.

Clash for Windows: Key Features and How to Use It Safely

The demand for web privacy and secure Internet access has sharply increased recently. As a result, many users are scrambling to find essential tools to guarantee online privacy and safety, such as Clash for Windows, one of the more popular tools. It comes with some powerful features that not only protect privacy but also improve the browsing experience. This post examines its main features and how it can be used safely.

Opening a Business in Hong Kong: Legal Setup, Local Requirements, and Practical Realities

Company registration, Hong Kong still stands tall-not because it shouts the loudest, but because it stays consistent. It's a place that favors action over noise. While many cities offer tax perks or startup hubs, few combine legal transparency, global banking access, and geographic reach like this one does. The process isn't glamorous, but it's clean. And in a region where unpredictability can kill momentum, that kind of dependability is gold.

Design as Risk Management in Fintech Products

For developers building in fintech, most conversations revolve around security, compliance, and architecture. But one layer is often underestimated - UX design. And that's ironic, because in fintech, design is risk. Take onboarding flows, KYC steps, or multi-step transfers - the smallest friction point or unclear interface can result in lost conversions, user errors, or compliance red flags.

How to Rent a Server in the USA While Living in Ukraine: My Experience, Challenges, and Tips

When I first thought about renting a server in the USA while living in Ukraine, I believed it would be pretty simple: choose a hosting provider, pay, and start using it. But in reality, it turned out to be quite an adventure - full of losses, misunderstandings, and surprises related to exchange rates and support delays. Today, I want to share my personal experience so that maybe some of you can avoid the same mistakes.