Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing the AI Agent action

Today, we’re announcing a way to build and deploy agents in Tines through our AI Agent action. In the AI market, AI agents suddenly seem to be everywhere – software that can autonomously think and perform tasks on behalf of the user. But we’re still very early in the adoption curve of agents. One thing we’ve noticed is that most solutions can’t handle the varying complexities of mission-critical workflows.

CVE-2025-5777: Critical Information Disclosure Vulnerability "Citrix Bleed 2" in Citrix NetScaler ADC and Gateway

On June 23, 2025, Citrix updated the scope of a previously disclosed vulnerability—CVE-2025-5777—to clarify that it affects NetScaler devices configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) or AAA virtual server. CVE-2025-5777, originally disclosed on June 17, is a critical-severity out-of-bounds read caused by insufficient input validation.

Enhancing Detection and Security Efficacy with the Behavioral Detection Engine in Aurora Endpoint Defense

In the ever-evolving cybersecurity landscape, staying ahead of emerging threats is a constant challenge. Traditional endpoint detection and response (EDR) solutions often suffer from alert noise, rule complexity, and slow adaptation to new attack techniques. That’s why Arctic Wolf is excited to introduce the Behavioral Detection Engine — an advanced detection and response framework embedded within Aurora Focus, the EDR module of Aurora Endpoint Defense.

Inside the Early Lessons of DORA Compliance: What Works, What Fails, What's Next?

Six months into DORA — is financial services building real resilience or just ticking boxes? In this episode of Razorwire, host James Rees is joined by Richard Cassidy, Jonathan Care, and first-time guest Romain Deslorieux to dissect how the Digital Operational Resilience Act (DORA) is really playing out in financial services — beyond the policies and into the pressure.

Machine identity mayhem: The volume, variety, velocity challenge

Machine identities—like the API keys, certificates, and access tokens that secure machine-to-machine connections—are swarming businesses. Yet, many teams still reach for manual tools while their systems overclock. At the start of the year, I predicted the ratio of machine to human identities would likely soon tip past 100:1. As of mid-year, most organizations are clocking in at more than 80:1—and I’ve seen environments as high as 500:1.

Why Founders Should Care About Organic Traffic Early

Did you know that the result in Google's organic search results gets a 27.6% click-through rate? Your startup needs to understand that organic search drives much of most businesses' website performance. The numbers tell the story - first page results capture over 90% of all organic traffic.

Why Mid-Sized Cities Are Reshaping the Commercial Real Estate Map

Look, I'll be straight with you - I used to be one of those guys who wouldn't touch anything outside New York or LA. Maybe some Colorado commercial real estate if I was feeling adventurous, but otherwise it was gateway cities or bust, right? That was the gospel according to every commercial real estate conference I'd ever been to. Then 2020 happened, and everything I thought I knew got turned upside down.

Securing Business Communications: A Guide to Phone Line Cybersecurity

We are in an era where data breaches and cyberattacks are becoming more and more common. The reason why is simple: we are becoming more reliant on technology, so by stealing people's data, you can gain access to a lot of personal information. Just look at M&S and the CO-OP, it's only a few months ago when they were subject to a major hack, which stole a lot of people's data, costing them a lot of money in the process - this was a real eye opener for other big businesses.