Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

A10's ThreatX: API & Application Protection at the Edge

A10's ThreatX: API & Application Protection at the Edge A10's Carlo Alpuerto discusses how ThreatX provides comprehensive protection for APIs and applications at the edge. He explains that while the company offers a SaaS-first approach, the solution can be deployed on-premise, on a physical server, or in virtualized and cloud environments like AWS, Azure, and GCP.

Stop Password Sharing & Identify Security Breaches!

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

How API Abuse Can Drain Your Budget Fast? #ratelimiting #api #apisecurity

API abuse isn’t just a security risk it can hit your bottom line. In this clip, Wallarm and Oracle experts explain how attackers and even legitimate users can trigger costly API calls, drive up cloud bills, or abuse third-party integrations. Learn why monitoring, rate limiting, and cost controls are critical to protecting both your security and your budget.

Ep 7: SOAR Loser: Does the O in SOAR stand for obsolete?

SOAR might sound like a superhero for security teams, but is it actually flying too close to the sun? In this episode, Adam and David unpack why security orchestration, automation, and response have been helpful… but might be headed for retirement, thanks to AI shaking up the game. They also dig into the headaches of managing clunky SOAR systems and why it’s time to rethink workflows and case management before you get left in the dust.

CVE-2025-7775: Critical Citrix NetScaler Zero-Day RCE Exploited to Drop Webshells

On August 26, 2025, Citrix released fixes for a critical vulnerability in Citrix NetScaler ADC and Gateway (CVE-2025-7775) that has been exploited on unpatched appliances. The issue stems from a memory overflow flaw that could allow Remote Code Execution (RCE) and/or Denial of Service (DoS) by remote threat actors.