mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#citrixbleed

3 Beiträge3 Beteiligte0 Beiträge heute
IT News<p>This Week in Security: Bitchat, CitrixBleed Part 2, Opossum, and TSAs - @jack is back with a weekend project. Yes, that Jack. [Jack Dorsey] spent last wee... - <a href="https://hackaday.com/2025/07/11/this-week-in-security-bitchat-citrixbleed-part-2-opossum-and-tsas/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackaday.com/2025/07/11/this-w</span><span class="invisible">eek-in-security-bitchat-citrixbleed-part-2-opossum-and-tsas/</span></a> <a href="https://schleuss.online/tags/thisweekinsecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>thisweekinsecurity</span></a> <a href="https://schleuss.online/tags/hackadaycolumns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackadaycolumns</span></a> <a href="https://schleuss.online/tags/securityhacks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityhacks</span></a> <a href="https://schleuss.online/tags/citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrixbleed</span></a> <a href="https://schleuss.online/tags/bitchat" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>bitchat</span></a> <a href="https://schleuss.online/tags/opossum" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opossum</span></a> <a href="https://schleuss.online/tags/mcp" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>mcp</span></a></p>
IT News<p>Critical CitrixBleed 2 vulnerability has been under active exploit for weeks - A critical vulnerability allowing hackers to bypass multifac... - <a href="https://arstechnica.com/security/2025/07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/</span></a> <a href="https://schleuss.online/tags/vulnerabilities" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerabilities</span></a> <a href="https://schleuss.online/tags/citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrixbleed</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a></p>
The New Oil<p>Public exploits released for <a href="https://mastodon.thenewoil.org/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> 2 <a href="https://mastodon.thenewoil.org/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a> flaw, patch now</p><p><a href="https://www.bleepingcomputer.com/news/security/public-exploits-released-for-citrixbleed-2-netscaler-flaw-patch-now/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/public-exploits-released-for-citrixbleed-2-netscaler-flaw-patch-now/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cyberscurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberscurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a></p>
Marcel SIneM(S)US<p>"CitrixBleed 2": <a href="https://social.tchncs.de/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://social.tchncs.de/tags/Netscaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Netscaler</span></a>-Lücken gravierender | Security <a href="https://www.heise.de/news/CitrixBleed-2-Citrix-Netscaler-Luecken-gravierender-10460208.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/CitrixBleed-2-Ci</span><span class="invisible">trix-Netscaler-Luecken-gravierender-10460208.html</span></a> <a href="https://social.tchncs.de/tags/CitrixNetscaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixNetscaler</span></a> <a href="https://social.tchncs.de/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> <a href="https://social.tchncs.de/tags/CitrixBleed2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed2</span></a> <a href="https://social.tchncs.de/tags/Patchday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patchday</span></a></p>
The New Oil<p>New '<a href="https://mastodon.thenewoil.org/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> 2' <a href="https://mastodon.thenewoil.org/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a> flaw let hackers hijack sessions</p><p><a href="https://www.bleepingcomputer.com/news/security/new-citrixbleed-2-netscaler-flaw-let-hackers-hijack-sessions/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/new-citrixbleed-2-netscaler-flaw-let-hackers-hijack-sessions/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://mastodon.thenewoil.org/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a></p>
securityaffairs<p>CitrixBleed 2: The nightmare that echoes the '<a href="https://infosec.exchange/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a>' flaw in <a href="https://infosec.exchange/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a> devices<br><a href="https://securityaffairs.com/179339/hacking/citrixbleed-2-the-nightmare-that-echoes-the-citrixbleed-flaw-in-netscaler-devices.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/179339/hac</span><span class="invisible">king/citrixbleed-2-the-nightmare-that-echoes-the-citrixbleed-flaw-in-netscaler-devices.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Kevin Beaumont<p>Prior recaps on <a href="https://cyberplace.social/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> and LockBit by me: <a href="https://doublepulsar.com/lockbit-ransomware-group-assemble-strike-team-to-breach-banks-law-firms-and-governments-4220580bfcee" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">doublepulsar.com/lockbit-ranso</span><span class="invisible">mware-group-assemble-strike-team-to-breach-banks-law-firms-and-governments-4220580bfcee</span></a></p><p><a href="https://doublepulsar.com/mass-exploitation-of-citrixbleed-vulnerability-including-a-ransomware-group-1405cbb9de18" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">doublepulsar.com/mass-exploita</span><span class="invisible">tion-of-citrixbleed-vulnerability-including-a-ransomware-group-1405cbb9de18</span></a></p><p><a href="https://doublepulsar.com/what-it-means-citrixbleed-ransom-group-woes-grow-as-over-60-credit-unions-hospitals-47766a091d4f" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">doublepulsar.com/what-it-means</span><span class="invisible">-citrixbleed-ransom-group-woes-grow-as-over-60-credit-unions-hospitals-47766a091d4f</span></a></p>
Kevin Beaumont<p>The Boeing <a href="https://cyberplace.social/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> incident led to a $200m ransom demand: <a href="https://cyberscoop.com/boeing-confirms-attempted-200-million-ransomware-extortion-attempt/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cyberscoop.com/boeing-confirms</span><span class="invisible">-attempted-200-million-ransomware-extortion-attempt/</span></a></p>
Kevin Beaumont<p>Another <a href="https://cyberplace.social/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a>, this one from mid November. 200k people impacted. HT <span class="h-card" translate="no"><a href="https://infosec.exchange/@euroinfosec" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>euroinfosec</span></a></span> </p><p><a href="https://apps.web.maine.gov/online/aeviewer/ME/40/5f9aa393-9c7a-49e0-855f-5e36adfb9e6c.shtml" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">apps.web.maine.gov/online/aevi</span><span class="invisible">ewer/ME/40/5f9aa393-9c7a-49e0-855f-5e36adfb9e6c.shtml</span></a></p>
Hugo Tunius :rust:<p>The Church of Sweden(Svenska Kyrkan) was ransomwared on the 23rd of November. This is now being attributed to BlackCat.</p><p>Here's a <a href="https://infosec.exchange/tags/Citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrixbleed</span></a> vulnerable server serving a wildcard cert for *.svenskakyrkan.se, last scanned by Shodan on the 23rd. Probably not related at all</p>
Marcel SIneM(S)US<p><a href="https://social.tchncs.de/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> erst nach zwei Wochen gepatcht: 36 Millionen Kundendaten abgegriffen | Security <a href="https://www.heise.de/news/CitrixBleed-erst-nach-zwei-Wochen-gepatcht-36-Millionen-Kundendaten-abgegriffen-9579227.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/CitrixBleed-erst</span><span class="invisible">-nach-zwei-Wochen-gepatcht-36-Millionen-Kundendaten-abgegriffen-9579227.html</span></a></p>
Marcus "MajorLinux" Summers<p>Like I always say, update yo stuff!</p><p>Comcast held a virtual door open for thieves to steal data - Desk Chair Analysts </p><p><a href="https://dcanalysts.net/comcast-held-a-virtual-door-open-for-thieves-to-steal-data/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">dcanalysts.net/comcast-held-a-</span><span class="invisible">virtual-door-open-for-thieves-to-steal-data/</span></a></p><p><a href="https://toot.majorshouse.com/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://toot.majorshouse.com/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> <a href="https://toot.majorshouse.com/tags/Comcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Comcast</span></a> <a href="https://toot.majorshouse.com/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://toot.majorshouse.com/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://toot.majorshouse.com/tags/Xfinity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Xfinity</span></a> <a href="https://toot.majorshouse.com/tags/TechNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechNews</span></a> <a href="https://toot.majorshouse.com/tags/DCA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DCA</span></a></p>
Avoid the Hack! :donor:<p><a href="https://infosec.exchange/tags/Comcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Comcast</span></a> Xfinity data breach affects over 35 million people</p><p>A <a href="https://infosec.exchange/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> fatality.</p><p>Data accessed includes customer usernames and hashed* passwords. Xfinity is forcing password changes next time you sign into an account.</p><p>In some cases data accessed may include:</p><p>- Last 4 of SSN<br>- DOBs<br>- Secret Questions / Answers exposed</p><p><a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/xfinity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xfinity</span></a></p><p><a href="https://www.theverge.com/2023/12/18/24007082/xfinity-data-breach-hack-notice-citrix" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theverge.com/2023/12/18/240070</span><span class="invisible">82/xfinity-data-breach-hack-notice-citrix</span></a></p>
IT News<p>Xfinity waited 13 days to patch critical Citrix Bleed 0-day. Now it’s paying the price - Enlarge / A Comcast Xfinity service van in San Ramon, California on Feb... - <a href="https://arstechnica.com/?p=1992160" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1992160</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/networkbreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>networkbreach</span></a> <a href="https://schleuss.online/tags/citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrixbleed</span></a> <a href="https://schleuss.online/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://schleuss.online/tags/comcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>comcast</span></a> <a href="https://schleuss.online/tags/xfinity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>xfinity</span></a> <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>biz</span></a>&amp;it</p>
securityaffairs<p><a href="https://infosec.exchange/tags/Comcast" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Comcast</span></a>’s <a href="https://infosec.exchange/tags/Xfinity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Xfinity</span></a> customer data exposed after <a href="https://infosec.exchange/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> attack<br><a href="https://securityaffairs.com/156147/data-breach/comcasts-xfinity-customer-data-exposed-after-citrixbleed-attack.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">securityaffairs.com/156147/dat</span><span class="invisible">a-breach/comcasts-xfinity-customer-data-exposed-after-citrixbleed-attack.html</span></a><br><a href="https://infosec.exchange/tags/securityaffairs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>securityaffairs</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a></p>
Kevin Beaumont<p>CTS, a cloud provider for legal firms in the UK, who were late patching <a href="https://cyberplace.social/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a>, have appeared on Cactus ransomware's portal today.</p><p>They're offering downloads of CTS customer data. <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>
ITSEC News<p>Supply-chain ransomware attack causes outages at over 60 credit unions - Ransomware hits firm that providing cloud services to credit unions in order ensure that ... <a href="https://www.tripwire.com/state-of-security/supply-chain-ransomware-attack-causes-outages-over-60-credit-unions" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tripwire.com/state-of-security</span><span class="invisible">/supply-chain-ransomware-attack-causes-outages-over-60-credit-unions</span></a> <a href="https://schleuss.online/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://schleuss.online/tags/citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrixbleed</span></a> <a href="https://schleuss.online/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://schleuss.online/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://schleuss.online/tags/guestblog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>guestblog</span></a> <a href="https://schleuss.online/tags/dataloss" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dataloss</span></a> <a href="https://schleuss.online/tags/malware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>malware</span></a></p>
Graham Cluley<p>Supply-chain ransomware attack causes outages at over 60 credit unions.</p><p>Read more in my article on the Tripwire blog: <a href="https://www.tripwire.com/state-of-security/supply-chain-ransomware-attack-causes-outages-over-60-credit-unions" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tripwire.com/state-of-security</span><span class="invisible">/supply-chain-ransomware-attack-causes-outages-over-60-credit-unions</span></a></p><p><a href="https://mastodon.green/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.green/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://mastodon.green/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.green/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://mastodon.green/tags/citrixbleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrixbleed</span></a></p>
Matthew Skelton<p>"Payments to ransomware and extortion groups need to be outlawed. I know, I know, it will be hard and there’s a million reasons to argue against it and lots of vested interests who don’t want this. ... I mean it — ransomware payments to these groups need to be outlawed, internationally." - Kevin Beaumont (aka <span class="h-card" translate="no"><a href="https://cyberplace.social/@GossiTheDog" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>GossiTheDog</span></a></span> )</p><p><a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> <a href="https://mastodon.social/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> </p><p><a href="https://doublepulsar.com/what-it-means-citrixbleed-ransom-group-woes-grow-as-over-60-credit-unions-hospitals-47766a091d4f" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">doublepulsar.com/what-it-means</span><span class="invisible">-citrixbleed-ransom-group-woes-grow-as-over-60-credit-unions-hospitals-47766a091d4f</span></a></p>
Kevin Beaumont<p>HTC Global Services aka HTC Inc aka Caretech, a healthcare MSP with 11k staff and access to hospitals across the US are still dealing with a ransomware group. They failed to patch for <a href="https://cyberplace.social/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a>. <a href="https://cyberplace.social/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a></p>