Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Connecting Claude AI to LimaCharlie #ai #cybersecurity

Traditional AI integrations force you to choose between convenience and control. Our approach gives you both. LimaCharlie's MCP server makes connecting AI agents to your security infrastructure both simple and secure. The Process: Generate API keys with precise permissions One command connects Claude Code to your org Query live security data with natural language Key Features: The result: AI agents that work within your security boundaries while providing instant access to live infrastructure data.

Inside the Adversary's Mind: How Cloudflare's Red Team Hacks to Defend

Get a behind-the-scenes look at Cloudflare’s Red Team with Dan Jones — a Senior Security Engineer who thinks like an attacker to strengthen defenses. In this preview of his Cloudflare Connect 2025 talk, Dan shares how offensive security helps protect millions of Internet properties.

A10's ThreatX: API & Application Protection at the Edge

A10's ThreatX: API & Application Protection at the Edge A10's Carlo Alpuerto discusses how ThreatX provides comprehensive protection for APIs and applications at the edge. He explains that while the company offers a SaaS-first approach, the solution can be deployed on-premise, on a physical server, or in virtualized and cloud environments like AWS, Azure, and GCP.

Stop Password Sharing & Identify Security Breaches!

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

How API Abuse Can Drain Your Budget Fast? #ratelimiting #api #apisecurity

API abuse isn’t just a security risk it can hit your bottom line. In this clip, Wallarm and Oracle experts explain how attackers and even legitimate users can trigger costly API calls, drive up cloud bills, or abuse third-party integrations. Learn why monitoring, rate limiting, and cost controls are critical to protecting both your security and your budget.

Ep 7: SOAR Loser: Does the O in SOAR stand for obsolete?

SOAR might sound like a superhero for security teams, but is it actually flying too close to the sun? In this episode, Adam and David unpack why security orchestration, automation, and response have been helpful… but might be headed for retirement, thanks to AI shaking up the game. They also dig into the headaches of managing clunky SOAR systems and why it’s time to rethink workflows and case management before you get left in the dust.

CVE-2025-7775: Critical Citrix NetScaler Zero-Day RCE Exploited to Drop Webshells

On August 26, 2025, Citrix released fixes for a critical vulnerability in Citrix NetScaler ADC and Gateway (CVE-2025-7775) that has been exploited on unpatched appliances. The issue stems from a memory overflow flaw that could allow Remote Code Execution (RCE) and/or Denial of Service (DoS) by remote threat actors.