Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Stop Password Sharing & Identify Security Breaches!

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

How API Abuse Can Drain Your Budget Fast? #ratelimiting #api #apisecurity

API abuse isn’t just a security risk it can hit your bottom line. In this clip, Wallarm and Oracle experts explain how attackers and even legitimate users can trigger costly API calls, drive up cloud bills, or abuse third-party integrations. Learn why monitoring, rate limiting, and cost controls are critical to protecting both your security and your budget.

Ep 7: SOAR Loser: Does the O in SOAR stand for obsolete?

SOAR might sound like a superhero for security teams, but is it actually flying too close to the sun? In this episode, Adam and David unpack why security orchestration, automation, and response have been helpful… but might be headed for retirement, thanks to AI shaking up the game. They also dig into the headaches of managing clunky SOAR systems and why it’s time to rethink workflows and case management before you get left in the dust.

CVE-2025-7775: Critical Citrix NetScaler Zero-Day RCE Exploited to Drop Webshells

On August 26, 2025, Citrix released fixes for a critical vulnerability in Citrix NetScaler ADC and Gateway (CVE-2025-7775) that has been exploited on unpatched appliances. The issue stems from a memory overflow flaw that could allow Remote Code Execution (RCE) and/or Denial of Service (DoS) by remote threat actors.

Five-Year Plans, Forever Wars: China's Blueprint for Cyber Dominance

Chinese state-backed cyber operations are often misunderstood as a single, centrally controlled machine. In reality, they are fragmented, diverse, and strategically aligned with China’s national objectives, from economic development to critical infrastructure positioning. In this episode of Data Security Decoded, join Caleb Tolin as he sits down with Mei Danowski, Co-Founder of Natto Thoughts and expert in geopolitical intelligence, to explore how China’s cyber ecosystem operates and how it is shaped by cultural, political, and economic structures.