Application Security News and Articles
Frequently asked questions about recent Citrix NetScaler ADC and Gateway vulnerabilities that have reportedly been exploited in the wild, including CVE-2025-5777 known as CitrixBleed 2.
Background
Tenable’s Research Special Operations (RSO) ...
Are You Really Securing Your Non-Human Identities and Secrets? How confident are you in the security measures protecting your Non-Human Identities (NHIs) and Secrets? Do you often wonder if there are areas for improvement? These are critical ...
Why is Effective NHI Management Crucial? Is complete independence in cybersecurity attainable? When we increasingly rely on cloud technologies, the security of non-human identities (NHIs) has emerged as a crucial concern. Effective NHI management ...
Are You Truly Prepared for Cybersecurity Threats? Security risks abound in increasingly dependent on complex digital interactions. From healthcare to finance, businesses across industries are looking for ways to safeguard their data. One crucial ...
Is Your NHI Management Ready to Face Evolving Security Needs? Evolving security needs pose a continually shifting challenge for cybersecurity professionals across industries such as financial services, healthcare, and travel. Key to maintaining a ...
APIs have become the digital glue of the enterprise — and attackers know it.
Related: API security – the big picture
In this debut edition of the Last Watchdog Strategic Reel (LWSR), A10 Networks’ Field CISO Jamison Utter cuts … (more…) ...
When SCIM provisioning problems occur in production, you're often working with enterprise customer IT teams to diagnose and resolve the issues. Having a good process for this collaboration can make the difference between a quick resolution and ...
In cybersecurity, the old maxim “you can’t secure what you can’t see” serves as one of the primary guiding principles. As enterprise networks grow increasingly distributed and complex across on-premises data centers, ...
This is the second of a multi-part series evaluating RAG systems using Tonic Validate. Today, we compare the performance of OpenAI's Assistant to Llamaindex. And there is a clear winner...for now.
The post RAG evaluation series: validating the ...
This is the third of a multi-part series evaluating RAG systems using Tonic Validate. Today, we compare the performance of LangChain against that of Haystack. Will there be a straw that breaks the parrots back?
The post RAG evaluation series: ...
This is the fourth installment in a multi-part series on evaluating various RAG systems using Tonic Validate, a RAG evaluation and benchmarking platform. In this installment, we pit OpenAI's RAG Assistant against Google's Vertex Search and ...
After more than 40 years of being set against a very recognizable blue, the updated error message will soon be displayed across a black background.
The post Windows’ Infamous ‘Blue Screen of Death’ Will Soon Turn Black appeared first on ...
Early stage startups face a brutal dilemma: you need marketing expertise and budget to grow, but lack both. Discover how programmatic SEO breaks this cycle by automating top-of-funnel growth and building long-term SEO authority for B2B SaaS ...
Noteworthy stories that might have slipped under the radar: Norwegian dam hacked, AT&T agrees to $177 million data breach settlement, Whole Foods distributor restores systems after attack.
The post In Other News: Norway Dam Hacked, $177M ...
From malware markets to IAM frameworks, BSides SATX 2025 showed why modern security must evolve from static protection to identity-centric, adaptive defense.
The post When Infostealer Frontiers Meet Identity-Centric Defense: Lessons from BSides ...
Check out the U.S. government’s latest call for developers to use memory-safe programming languages, as well as its warning for cybersecurity teams regarding cyber risk from hackers tied to Iran. Plus, get the latest on ransomware trends, the ...
Fake account creation is one of the most persistent forms of online abuse. What used to be a fringe tactic (bots signing up to post spam) has become a scaled, repeatable attack. Today’s fake account farms operate with disposable identities, ...
Microsoft is preparing a private preview of new Windows endpoint security platform capabilities to help antimalware vendors create solutions that run outside the kernel.
The post Microsoft to Preview New Windows Endpoint Security Platform After ...
We need to talk about data integrity.
Narrowly, the term refers to ensuring that data isn’t tampered with, either in transit or in storage. Manipulating account balances in bank databases, removing entries from criminal records, and murder by ...
The current geopolitical climate demands a proactive, comprehensive approach to cybersecurity. Here’s what you need to know — and how Tenable can help.
The cybersecurity landscape is in constant flux, but rarely do we see such a rapid ...