toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

288
active users

#citrixbleed

0 posts0 participants0 posts today
The New Oil<p>Over 3,000 <a href="https://mastodon.thenewoil.org/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a> devices left unpatched against <a href="https://mastodon.thenewoil.org/tags/CitrixBleed2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed2</span></a> bug</p><p><a href="https://www.bleepingcomputer.com/news/security/over-3-000-netscaler-devices-left-unpatched-against-actively-exploited-citrixbleed-2-flaw/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/over-3-000-netscaler-devices-left-unpatched-against-actively-exploited-citrixbleed-2-flaw/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/CitrixBleed2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed2</span></a>: Kritische Netscaler-Lücke wird seit fast einem Monat ausgenutzt | Security <a href="https://www.heise.de/news/Citrix-Bleed-2-Kritische-Netscaler-Luecke-wird-seit-fast-einem-Monat-ausgenutzt-10492320.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Citrix-Bleed-2-K</span><span class="invisible">ritische-Netscaler-Luecke-wird-seit-fast-einem-Monat-ausgenutzt-10492320.html</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a> <a href="https://social.tchncs.de/tags/CyberCrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberCrime</span></a> <a href="https://social.tchncs.de/tags/DataLeak" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataLeak</span></a> <a href="https://social.tchncs.de/tags/Datenleck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenleck</span></a> <a href="https://social.tchncs.de/tags/Datenschutz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenschutz</span></a> <a href="https://social.tchncs.de/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://social.tchncs.de/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a></p>
DrWhax<p>Perhaps the EU should only allow Tailscale like VPN's for remote connectivity... <a href="https://infosec.exchange/tags/citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrixbleed</span></a></p>
GreyNoise<p>GreyNoise observed exploitation of CitrixBleed 2 (CVE-2025-5777) nearly two weeks before a public PoC was released. Full breakdown: <a href="https://www.greynoise.io/blog/exploitation-citrixbleed-2-cve-2025-5777-before-public-poc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">greynoise.io/blog/exploitation</span><span class="invisible">-citrixbleed-2-cve-2025-5777-before-public-poc</span></a> <a href="https://infosec.exchange/tags/GreyNoise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreyNoise</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> <a href="https://infosec.exchange/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://infosec.exchange/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a></p>
PrivacyDigest<p>Critical <a href="https://mas.to/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> 2 <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> has been under active <a href="https://mas.to/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> for weeks</p><p>A critical vulnerability allowing <a href="https://mas.to/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> to bypass <a href="https://mas.to/tags/multifactor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>multifactor</span></a> <a href="https://mas.to/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> in network management devices made by <a href="https://mas.to/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> has been actively <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> for more than a month, researchers said. The finding is at odds with advisories from the vendor saying there is no evidence of in-the-wild <a href="https://mas.to/tags/exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitation</span></a>.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://arstechnica.com/security/2025/07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/</span></a></p>
IT News<p>This Week in Security: Bitchat, CitrixBleed Part 2, Opossum, and TSAs - @jack is back with a weekend project. Yes, that Jack. [Jack Dorsey] spent last wee... - <a href="https://hackaday.com/2025/07/11/this-week-in-security-bitchat-citrixbleed-part-2-opossum-and-tsas/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/11/this-w</span><span class="invisible">eek-in-security-bitchat-citrixbleed-part-2-opossum-and-tsas/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrixbleed</span></a> <a href="https://schleuss.online/tags/bitchat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitchat</span></a> <a href="https://schleuss.online/tags/opossum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opossum</span></a> <a href="https://schleuss.online/tags/mcp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mcp</span></a></p>
IT News<p>Critical CitrixBleed 2 vulnerability has been under active exploit for weeks - A critical vulnerability allowing hackers to bypass multifac... - <a href="https://arstechnica.com/security/2025/07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrixbleed</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a></p>
Ars Technica News<p>Critical CitrixBleed 2 vulnerability has been under active exploit for weeks <a href="https://arstechni.ca/bJJZ" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechni.ca/bJJZ</span><span class="invisible"></span></a> <a href="https://c.im/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://c.im/tags/citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrixbleed</span></a> <a href="https://c.im/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://c.im/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://c.im/tags/Biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Biz</span></a>&amp;IT <a href="https://c.im/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a></p>
The New Oil<p>Public exploits released for <a href="https://mastodon.thenewoil.org/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> 2 <a href="https://mastodon.thenewoil.org/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a> flaw, patch now</p><p><a href="https://www.bleepingcomputer.com/news/security/public-exploits-released-for-citrixbleed-2-netscaler-flaw-patch-now/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/public-exploits-released-for-citrixbleed-2-netscaler-flaw-patch-now/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cyberscurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberscurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a></p>
The New Oil<p>New '<a href="https://mastodon.thenewoil.org/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> 2' <a href="https://mastodon.thenewoil.org/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a> flaw let hackers hijack sessions</p><p><a href="https://www.bleepingcomputer.com/news/security/new-citrixbleed-2-netscaler-flaw-let-hackers-hijack-sessions/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-citrixbleed-2-netscaler-flaw-let-hackers-hijack-sessions/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://mastodon.thenewoil.org/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a></p>
securityaffairs<p>CitrixBleed 2: The nightmare that echoes the '<a href="https://infosec.exchange/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a>' flaw in <a href="https://infosec.exchange/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a> devices<br><a href="https://securityaffairs.com/179339/hacking/citrixbleed-2-the-nightmare-that-echoes-the-citrixbleed-flaw-in-netscaler-devices.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/179339/hac</span><span class="invisible">king/citrixbleed-2-the-nightmare-that-echoes-the-citrixbleed-flaw-in-netscaler-devices.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Kevin Beaumont<p>Prior recaps on <a href="https://cyberplace.social/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> and LockBit by me: <a href="https://doublepulsar.com/lockbit-ransomware-group-assemble-strike-team-to-breach-banks-law-firms-and-governments-4220580bfcee" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">doublepulsar.com/lockbit-ranso</span><span class="invisible">mware-group-assemble-strike-team-to-breach-banks-law-firms-and-governments-4220580bfcee</span></a></p><p><a href="https://doublepulsar.com/mass-exploitation-of-citrixbleed-vulnerability-including-a-ransomware-group-1405cbb9de18" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">doublepulsar.com/mass-exploita</span><span class="invisible">tion-of-citrixbleed-vulnerability-including-a-ransomware-group-1405cbb9de18</span></a></p><p><a href="https://doublepulsar.com/what-it-means-citrixbleed-ransom-group-woes-grow-as-over-60-credit-unions-hospitals-47766a091d4f" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">doublepulsar.com/what-it-means</span><span class="invisible">-citrixbleed-ransom-group-woes-grow-as-over-60-credit-unions-hospitals-47766a091d4f</span></a></p>
Kevin Beaumont<p>The Boeing <a href="https://cyberplace.social/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> incident led to a $200m ransom demand: <a href="https://cyberscoop.com/boeing-confirms-attempted-200-million-ransomware-extortion-attempt/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/boeing-confirms</span><span class="invisible">-attempted-200-million-ransomware-extortion-attempt/</span></a></p>
Kevin Beaumont<p>Another <a href="https://cyberplace.social/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a>, this one from mid November. 200k people impacted. HT <span class="h-card" translate="no"><a href="https://infosec.exchange/@euroinfosec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>euroinfosec</span></a></span> </p><p><a href="https://apps.web.maine.gov/online/aeviewer/ME/40/5f9aa393-9c7a-49e0-855f-5e36adfb9e6c.shtml" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">apps.web.maine.gov/online/aevi</span><span class="invisible">ewer/ME/40/5f9aa393-9c7a-49e0-855f-5e36adfb9e6c.shtml</span></a></p>
NO NAME<p><a href="https://soapbox.hackdefendr.com/tags/MOVEit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MOVEit</span></a>, <a href="https://soapbox.hackdefendr.com/tags/Capita" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Capita</span></a>, <a href="https://soapbox.hackdefendr.com/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> and more: The biggest <a href="https://soapbox.hackdefendr.com/tags/data" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>data</span></a> <a href="https://soapbox.hackdefendr.com/tags/breaches" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>breaches</span></a> of #2023</p><p>Hackers had a busy year exploiting popular file-transfer tools and targeting under-resourced organizations</p><p><a href="https://techcrunch.com/2023/12/27/moveit-capita-citrixbleed-biggest-data-breaches-2023/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2023/12/27/move</span><span class="invisible">it-capita-citrixbleed-biggest-data-breaches-2023/</span></a></p>
Hugo Tunius :rust:<p>The Church of Sweden(Svenska Kyrkan) was ransomwared on the 23rd of November. This is now being attributed to BlackCat.</p><p>Here's a <a href="https://infosec.exchange/tags/Citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrixbleed</span></a> vulnerable server serving a wildcard cert for *.svenskakyrkan.se, last scanned by Shodan on the 23rd. Probably not related at all</p>
Marcus "MajorLinux" Summers<p>Like I always say, update yo stuff!</p><p>Comcast held a virtual door open for thieves to steal data - Desk Chair Analysts </p><p><a href="https://dcanalysts.net/comcast-held-a-virtual-door-open-for-thieves-to-steal-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dcanalysts.net/comcast-held-a-</span><span class="invisible">virtual-door-open-for-thieves-to-steal-data/</span></a></p><p><a href="https://toot.majorshouse.com/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://toot.majorshouse.com/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> <a href="https://toot.majorshouse.com/tags/Comcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Comcast</span></a> <a href="https://toot.majorshouse.com/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://toot.majorshouse.com/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://toot.majorshouse.com/tags/Xfinity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Xfinity</span></a> <a href="https://toot.majorshouse.com/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a> <a href="https://toot.majorshouse.com/tags/DCA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DCA</span></a></p>
Avoid the Hack! :donor:<p><a href="https://infosec.exchange/tags/Comcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Comcast</span></a> Xfinity data breach affects over 35 million people</p><p>A <a href="https://infosec.exchange/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> fatality.</p><p>Data accessed includes customer usernames and hashed* passwords. Xfinity is forcing password changes next time you sign into an account.</p><p>In some cases data accessed may include:</p><p>- Last 4 of SSN<br>- DOBs<br>- Secret Questions / Answers exposed</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/xfinity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xfinity</span></a></p><p><a href="https://www.theverge.com/2023/12/18/24007082/xfinity-data-breach-hack-notice-citrix" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theverge.com/2023/12/18/240070</span><span class="invisible">82/xfinity-data-breach-hack-notice-citrix</span></a></p>
IT News<p>Xfinity waited 13 days to patch critical Citrix Bleed 0-day. Now it’s paying the price - Enlarge / A Comcast Xfinity service van in San Ramon, California on Feb... - <a href="https://arstechnica.com/?p=1992160" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1992160</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/networkbreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networkbreach</span></a> <a href="https://schleuss.online/tags/citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrixbleed</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/comcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>comcast</span></a> <a href="https://schleuss.online/tags/xfinity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xfinity</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it</p>
securityaffairs<p><a href="https://infosec.exchange/tags/Comcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Comcast</span></a>’s <a href="https://infosec.exchange/tags/Xfinity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Xfinity</span></a> customer data exposed after <a href="https://infosec.exchange/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> attack<br><a href="https://securityaffairs.com/156147/data-breach/comcasts-xfinity-customer-data-exposed-after-citrixbleed-attack.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/156147/dat</span><span class="invisible">a-breach/comcasts-xfinity-customer-data-exposed-after-citrixbleed-attack.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a></p>