toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

277
active users

#citrix

2 posts2 participants0 posts today
heise online English<p>"Citrix Bleed 2": Current attack warnings </p><p>The "Citrix Bleed 2" vulnerability in Citrix Netscaler is currently being massively attacked, IT security researchers warn.</p><p><a href="https://www.heise.de/en/news/Citrix-Bleed-2-Current-attack-warnings-10519886.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Citrix-Bleed-</span><span class="invisible">2-Current-attack-warnings-10519886.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>"Citrix Bleed 2": Aktuelle Angriffswarnungen </p><p>Die "Citrix Bleed 2" genannte Sicherheitslücke in Citrix Netscaler wird aktuell massiv attackiert, warnen IT-Sicherheitsforscher.</p><p><a href="https://www.heise.de/news/Citrix-Bleed-2-Aktuelle-Angriffswarnungen-10519742.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Citrix-Bleed-2-A</span><span class="invisible">ktuelle-Angriffswarnungen-10519742.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> <a href="https://social.heise.de/tags/Updates" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Updates</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Netherlands" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netherlands</span></a>: <a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://mastodon.thenewoil.org/tags/Netscaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netscaler</span></a> flaw CVE-2025-6543 exploited to breach orgs</p><p><a href="https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
securityaffairs<p>Dutch <a href="https://infosec.exchange/tags/NCSC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NCSC</span></a>: <a href="https://infosec.exchange/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://infosec.exchange/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a> zero-day breaches critical orgs<br><a href="https://securityaffairs.com/181070/hacking/dutch-ncsc-citrix-netscaler-zero-day-breaches-critical-orgs.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/181070/hac</span><span class="invisible">king/dutch-ncsc-citrix-netscaler-zero-day-breaches-critical-orgs.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a></p>
Pyrzout :vm:<p>Netscaler vulnerability was exploited as zero-day for nearly two months (CVE-2025-6543) <a href="https://www.helpnetsecurity.com/2025/08/12/citrix-netscaler-exploitation-zero-day-cve-2025-6543/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/08/12</span><span class="invisible">/citrix-netscaler-exploitation-zero-day-cve-2025-6543/</span></a> <a href="https://social.skynetcloud.site/tags/Shadowserver" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Shadowserver</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a> <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/Fortinet" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fortinet</span></a> <a href="https://social.skynetcloud.site/tags/NCSC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NCSC</span></a>-NL <a href="https://social.skynetcloud.site/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://social.skynetcloud.site/tags/Europe" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Europe</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
Erik Jonker<p>Lezenswaardige update van het NCSC over de Citrix kwetsbaarheid.<br>"Het NCSC stelt vast dat er meerdere kritieke organisaties binnen Nederland succesvol aangevallen zijn via een kwetsbaarheid met kenmerk CVE-2025-6543 in Citrix NetScaler...."<br><a href="https://www.ncsc.nl/actueel/nieuws/2025/07/22/casus-citrix-kwetsbaarheid" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ncsc.nl/actueel/nieuws/2025/07</span><span class="invisible">/22/casus-citrix-kwetsbaarheid</span></a><br><a href="https://mastodon.social/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a> <a href="https://mastodon.social/tags/netscaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netscaler</span></a> <a href="https://mastodon.social/tags/ncsc" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ncsc</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/zeroday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>zeroday</span></a></p>
nemo™ 🇺🇦<p>🚨 The Netherlands' National Cyber Security Centre warns a critical Citrix NetScaler flaw CVE-2025-6543 has been exploited to breach multiple key organizations! This zero-day memory overflow bug enables remote code execution &amp; erases attack traces. Update NOW! 🔐⚠️ <a href="https://mas.to/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://mas.to/tags/ZeroDay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ZeroDay</span></a> <a href="https://mas.to/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a> </p><p>Read more: <a href="https://www.bleepingcomputer.com/news/security/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/netherlands-citrix-netscaler-flaw-cve-2025-6543-exploited-to-breach-orgs/</span></a></p>
Frank Engelhard<p><span class="h-card" translate="no"><a href="https://mastodon.social/@NOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>NOS</span></a></span> Jammer dat we al die faxmachines weggegooid hebben! <a href="https://mastodon.social/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a> <a href="https://mastodon.social/tags/OM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OM</span></a></p>
Aristotelis Tzafalias<p>The Netherlands faced a significant Citrix related incident in 2019. The Dutch Safety Board investigated... report linked below.</p><p>It is now 2025, and another Citrix related incident has led to the NL public prosecutor office going offline. </p><p>I'm curious to see the report on the previous report :)</p><p><a href="https://onderzoeksraad.nl/en/onderzoek/vulnerable-through-software-lessons-resulting-from-security/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">onderzoeksraad.nl/en/onderzoek</span><span class="invisible">/vulnerable-through-software-lessons-resulting-from-security/</span></a></p><p><a href="https://infosec.exchange/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a> <a href="https://infosec.exchange/tags/netherlands" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netherlands</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/CitrixBleed2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed2</span></a> exploited weeks before PoCs as <a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> denied attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/citrix-bleed-2-exploited-weeks-before-pocs-as-citrix-denied-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/citrix-bleed-2-exploited-weeks-before-pocs-as-citrix-denied-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
heise online English<p>Citrix Bleed 2: Critical Netscaler security gap exploited for almost a month</p><p>In the last week of June, suspected Chinese actors were already looking for vulnerable Netscaler devices. Citrix has a tip for its customers. </p><p><a href="https://www.heise.de/en/news/Citrix-Bleed-2-Critical-Netscaler-security-gap-exploited-for-almost-a-month-10492588.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Citrix-Bleed-</span><span class="invisible">2-Critical-Netscaler-security-gap-exploited-for-almost-a-month-10492588.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://social.heise.de/tags/Datenleck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenleck</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Pyrzout :vm:<p>CitrixBleed 2: 100 Organizations Hacked, Thousands of Instances Still Vulnerable <a href="https://www.securityweek.com/citrixbleed-2-100-organizations-hacked-thousands-of-instances-still-vulnerable/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">securityweek.com/citrixbleed-2</span><span class="invisible">-100-organizations-hacked-thousands-of-instances-still-vulnerable/</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerabilities</span></a> <a href="https://social.skynetcloud.site/tags/CitrixBleed2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed2</span></a> <a href="https://social.skynetcloud.site/tags/CitrixBleed2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed2</span></a> <a href="https://social.skynetcloud.site/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> <a href="https://social.skynetcloud.site/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a></p>
Erik Jonker<p>Ernstige kwetsbaarheden in Citrix Netscaler ADC en NetScaler Gateway.<br><a href="https://www.digitaltrustcenter.nl/nieuws/ernstige-kwetsbaarheden-in-citrix-netscaler-adc-en-netscaler-gateway" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">digitaltrustcenter.nl/nieuws/e</span><span class="invisible">rnstige-kwetsbaarheden-in-citrix-netscaler-adc-en-netscaler-gateway</span></a><br><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a></p>
heise Security<p>Citrix Bleed 2: Kritische Netscaler-Lücke wird seit fast einem Monat ausgenutzt</p><p>Bereits in der letzten Juniwoche suchten mutmaßlich chinesische Akteure gezielt nach verwundbaren Netscaler-Geräten. Citrix hat einen Tipp für seine Kunden. </p><p><a href="https://www.heise.de/news/Citrix-Bleed-2-Kritische-Netscaler-Luecke-wird-seit-fast-einem-Monat-ausgenutzt-10492320.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Citrix-Bleed-2-K</span><span class="invisible">ritische-Netscaler-Luecke-wird-seit-fast-einem-Monat-ausgenutzt-10492320.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://social.heise.de/tags/Datenleck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenleck</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Jan Vlug<p>Vanwege bezorgdheid over een beveiligingsprobleem in de digitale werkomgeving, is het <a href="https://mastodon.social/tags/OpenbaarMinisterie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenbaarMinisterie</span></a> offline. Het <a href="https://mastodon.social/tags/OM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OM</span></a> sluit niet uit dat er misbruik is gemaakt van een lek.</p><p>„Analyse heeft reden gegeven aan te nemen dat gebruik is gemaakt van deze <a href="https://mastodon.social/tags/kwetsbaarheid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kwetsbaarheid</span></a>.”</p><p>"Het OM gebruikt de software Netscaler van het Amerikaanse bedrijf <a href="https://mastodon.social/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a>."</p><p><a href="https://mastodon.social/tags/CitrixSucks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixSucks</span></a></p><p><a href="https://www.nrc.nl/nieuws/2025/07/18/openbaar-ministerie-is-offline-vanwege-ernstige-zorgen-over-ict-beveiliging-datalek-niet-uitgesloten-a4900617" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nrc.nl/nieuws/2025/07/18/openb</span><span class="invisible">aar-ministerie-is-offline-vanwege-ernstige-zorgen-over-ict-beveiliging-datalek-niet-uitgesloten-a4900617</span></a></p><p><a href="https://mastodon.social/tags/DigitaleSoevereiniteit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitaleSoevereiniteit</span></a> <a href="https://mastodon.social/tags/DigitaleAutonomie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitaleAutonomie</span></a> <a href="https://mastodon.social/tags/justitie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>justitie</span></a> <a href="https://mastodon.social/tags/netwerk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netwerk</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p>
GreyNoise<p>GreyNoise observed exploitation of CitrixBleed 2 (CVE-2025-5777) nearly two weeks before a public PoC was released. Full breakdown: <a href="https://www.greynoise.io/blog/exploitation-citrixbleed-2-cve-2025-5777-before-public-poc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">greynoise.io/blog/exploitation</span><span class="invisible">-citrixbleed-2-cve-2025-5777-before-public-poc</span></a> <a href="https://infosec.exchange/tags/GreyNoise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreyNoise</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> <a href="https://infosec.exchange/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://infosec.exchange/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a></p>
Cambionn<p><a href="https://mastodon.nl/tags/Today" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Today</span></a> one of my colleagues put my attention on this article, and to be honest I do love the reporting style. Meme's and writing like this?</p><p>"The ‘good news’, I suspect, is that most orgs will be too lacking in logs to have evidence."</p><p>"China go brrr"</p><p>At least it's not dry :awesome: </p><p><a href="https://doublepulsar.com/citrixbleed-2-situation-update-everybody-already-got-owned-503c6d06da9f" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">doublepulsar.com/citrixbleed-2</span><span class="invisible">-situation-update-everybody-already-got-owned-503c6d06da9f</span></a></p><p><a href="https://mastodon.nl/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.nl/tags/datasecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datasecurity</span></a> <a href="https://mastodon.nl/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.nl/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a> <a href="https://mastodon.nl/tags/netscaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netscaler</span></a> <a href="https://mastodon.nl/tags/citrix_netscaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix_netscaler</span></a> <a href="https://mastodon.nl/tags/incident" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incident</span></a> <a href="https://mastodon.nl/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.nl/tags/meme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>meme</span></a> <a href="https://mastodon.nl/tags/report" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>report</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> tags <a href="https://mastodon.thenewoil.org/tags/CitrixBleed2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed2</span></a> as exploited, gives agencies a day to patch</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a></p>
PrivacyDigest<p>Critical <a href="https://mas.to/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> 2 <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> has been under active <a href="https://mas.to/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> for weeks</p><p>A critical vulnerability allowing <a href="https://mas.to/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> to bypass <a href="https://mas.to/tags/multifactor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>multifactor</span></a> <a href="https://mas.to/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> in network management devices made by <a href="https://mas.to/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> has been actively <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> for more than a month, researchers said. The finding is at odds with advisories from the vendor saying there is no evidence of in-the-wild <a href="https://mas.to/tags/exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitation</span></a>.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://arstechnica.com/security/2025/07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/</span></a></p>
IT News<p>Critical CitrixBleed 2 vulnerability has been under active exploit for weeks - A critical vulnerability allowing hackers to bypass multifac... - <a href="https://arstechnica.com/security/2025/07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrixbleed</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a></p>