eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

209
active users

#Citrix

1 post1 participant0 posts today
Frank Engelhard<p><span class="h-card" translate="no"><a href="https://mastodon.social/@NOS" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>NOS</span></a></span> Jammer dat we al die faxmachines weggegooid hebben! <a href="https://mastodon.social/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a> <a href="https://mastodon.social/tags/OM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OM</span></a></p>
Asta McCarthy<p>Gaat lekker in closed source land:<br>Sharepoint: <a href="https://tweakers.net/nieuws/237390/microsoft-drie-chinese-hackersgroepen-misbruiken-sharepoint-kwetsbaarheid.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">tweakers.net/nieuws/237390/mic</span><span class="invisible">rosoft-drie-chinese-hackersgroepen-misbruiken-sharepoint-kwetsbaarheid.html</span></a></p><p>Outlook: <a href="https://www.security.nl/posting/897447/Britse+overheid+waarschuwt+voor+malware+die+Outlook-accounts+kaapt" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security.nl/posting/897447/Bri</span><span class="invisible">tse+overheid+waarschuwt+voor+malware+die+Outlook-accounts+kaapt</span></a></p><p>Nog een keer outlook: <a href="https://www.security.nl/posting/875288/Kritiek+Microsoft+Outlook-lek+actief+misbruikt+bij+aanvallen+waarschuwt+VS" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security.nl/posting/875288/Kri</span><span class="invisible">tiek+Microsoft+Outlook-lek+actief+misbruikt+bij+aanvallen+waarschuwt+VS</span></a></p><p>Citrix: <a href="https://doublepulsar.com/citrixbleed-2-situation-update-everybody-already-got-owned-503c6d06da9f?gi=fb3489155925" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">doublepulsar.com/citrixbleed-2</span><span class="invisible">-situation-update-everybody-already-got-owned-503c6d06da9f?gi=fb3489155925</span></a></p><p>Waarbij die laatste al *twee weken* actief misbruik werd gemaakt van het lek voordat Citrix in beweging kwam. Met dus hele grote gevolgen voor het OM in Nederland: <a href="https://www.nrc.nl/nieuws/2025/07/22/digitale-werkomgeving-om-inderdaad-gehackt-onderzoek-moet-uitwijzen-welke-informatie-is-gestolen-a4901019" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nrc.nl/nieuws/2025/07/22/digit</span><span class="invisible">ale-werkomgeving-om-inderdaad-gehackt-onderzoek-moet-uitwijzen-welke-informatie-is-gestolen-a4901019</span></a><br> <br>Maar ga vooral door met dit soort proprietary oplossingen vol met gaten die "bedrijfsgeheim" zijn.</p><p><a href="https://mastodon.pirateparty.be/tags/Sharepoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sharepoint</span></a> <a href="https://mastodon.pirateparty.be/tags/Microsoft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Microsoft</span></a> <a href="https://mastodon.pirateparty.be/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://mastodon.pirateparty.be/tags/CVE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CVE</span></a> <a href="https://mastodon.pirateparty.be/tags/gatenkaas" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gatenkaas</span></a> <a href="https://mastodon.pirateparty.be/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.pirateparty.be/tags/DigitaleSoevereiniteit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitaleSoevereiniteit</span></a> <a href="https://mastodon.pirateparty.be/tags/OMlek" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OMlek</span></a></p>
Aristotelis Tzafalias<p>The Netherlands faced a significant Citrix related incident in 2019. The Dutch Safety Board investigated... report linked below.</p><p>It is now 2025, and another Citrix related incident has led to the NL public prosecutor office going offline. </p><p>I'm curious to see the report on the previous report :)</p><p><a href="https://onderzoeksraad.nl/en/onderzoek/vulnerable-through-software-lessons-resulting-from-security/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">onderzoeksraad.nl/en/onderzoek</span><span class="invisible">/vulnerable-through-software-lessons-resulting-from-security/</span></a></p><p><a href="https://infosec.exchange/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a> <a href="https://infosec.exchange/tags/netherlands" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netherlands</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/CitrixBleed2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed2</span></a> exploited weeks before PoCs as <a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> denied attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/citrix-bleed-2-exploited-weeks-before-pocs-as-citrix-denied-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/citrix-bleed-2-exploited-weeks-before-pocs-as-citrix-denied-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
heise online English<p>Citrix Bleed 2: Critical Netscaler security gap exploited for almost a month</p><p>In the last week of June, suspected Chinese actors were already looking for vulnerable Netscaler devices. Citrix has a tip for its customers. </p><p><a href="https://www.heise.de/en/news/Citrix-Bleed-2-Critical-Netscaler-security-gap-exploited-for-almost-a-month-10492588.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/Citrix-Bleed-</span><span class="invisible">2-Critical-Netscaler-security-gap-exploited-for-almost-a-month-10492588.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://social.heise.de/tags/Datenleck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenleck</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Erik Jonker<p>Ernstige kwetsbaarheden in Citrix Netscaler ADC en NetScaler Gateway.<br><a href="https://www.digitaltrustcenter.nl/nieuws/ernstige-kwetsbaarheden-in-citrix-netscaler-adc-en-netscaler-gateway" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">digitaltrustcenter.nl/nieuws/e</span><span class="invisible">rnstige-kwetsbaarheden-in-citrix-netscaler-adc-en-netscaler-gateway</span></a><br><a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.social/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a></p>
heise Security<p>Citrix Bleed 2: Kritische Netscaler-Lücke wird seit fast einem Monat ausgenutzt</p><p>Bereits in der letzten Juniwoche suchten mutmaßlich chinesische Akteure gezielt nach verwundbaren Netscaler-Geräten. Citrix hat einen Tipp für seine Kunden. </p><p><a href="https://www.heise.de/news/Citrix-Bleed-2-Kritische-Netscaler-Luecke-wird-seit-fast-einem-Monat-ausgenutzt-10492320.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/Citrix-Bleed-2-K</span><span class="invisible">ritische-Netscaler-Luecke-wird-seit-fast-einem-Monat-ausgenutzt-10492320.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://social.heise.de/tags/Datenleck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Datenleck</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
Jan Vlug<p>Vanwege bezorgdheid over een beveiligingsprobleem in de digitale werkomgeving, is het <a href="https://mastodon.social/tags/OpenbaarMinisterie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenbaarMinisterie</span></a> offline. Het <a href="https://mastodon.social/tags/OM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OM</span></a> sluit niet uit dat er misbruik is gemaakt van een lek.</p><p>„Analyse heeft reden gegeven aan te nemen dat gebruik is gemaakt van deze <a href="https://mastodon.social/tags/kwetsbaarheid" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>kwetsbaarheid</span></a>.”</p><p>"Het OM gebruikt de software Netscaler van het Amerikaanse bedrijf <a href="https://mastodon.social/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a>."</p><p><a href="https://mastodon.social/tags/CitrixSucks" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixSucks</span></a></p><p><a href="https://www.nrc.nl/nieuws/2025/07/18/openbaar-ministerie-is-offline-vanwege-ernstige-zorgen-over-ict-beveiliging-datalek-niet-uitgesloten-a4900617" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">nrc.nl/nieuws/2025/07/18/openb</span><span class="invisible">aar-ministerie-is-offline-vanwege-ernstige-zorgen-over-ict-beveiliging-datalek-niet-uitgesloten-a4900617</span></a></p><p><a href="https://mastodon.social/tags/DigitaleSoevereiniteit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitaleSoevereiniteit</span></a> <a href="https://mastodon.social/tags/DigitaleAutonomie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DigitaleAutonomie</span></a> <a href="https://mastodon.social/tags/justitie" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>justitie</span></a> <a href="https://mastodon.social/tags/netwerk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netwerk</span></a> <a href="https://mastodon.social/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p>
GreyNoise<p>GreyNoise observed exploitation of CitrixBleed 2 (CVE-2025-5777) nearly two weeks before a public PoC was released. Full breakdown: <a href="https://www.greynoise.io/blog/exploitation-citrixbleed-2-cve-2025-5777-before-public-poc" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">greynoise.io/blog/exploitation</span><span class="invisible">-citrixbleed-2-cve-2025-5777-before-public-poc</span></a> <a href="https://infosec.exchange/tags/GreyNoise" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GreyNoise</span></a> <a href="https://infosec.exchange/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://infosec.exchange/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> <a href="https://infosec.exchange/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://infosec.exchange/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a></p>
Cambionn<p><a href="https://mastodon.nl/tags/Today" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Today</span></a> one of my colleagues put my attention on this article, and to be honest I do love the reporting style. Meme's and writing like this?</p><p>"The ‘good news’, I suspect, is that most orgs will be too lacking in logs to have evidence."</p><p>"China go brrr"</p><p>At least it's not dry :awesome: </p><p><a href="https://doublepulsar.com/citrixbleed-2-situation-update-everybody-already-got-owned-503c6d06da9f" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">doublepulsar.com/citrixbleed-2</span><span class="invisible">-situation-update-everybody-already-got-owned-503c6d06da9f</span></a></p><p><a href="https://mastodon.nl/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mastodon.nl/tags/datasecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>datasecurity</span></a> <a href="https://mastodon.nl/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.nl/tags/citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix</span></a> <a href="https://mastodon.nl/tags/netscaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>netscaler</span></a> <a href="https://mastodon.nl/tags/citrix_netscaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>citrix_netscaler</span></a> <a href="https://mastodon.nl/tags/incident" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>incident</span></a> <a href="https://mastodon.nl/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> <a href="https://mastodon.nl/tags/meme" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>meme</span></a> <a href="https://mastodon.nl/tags/report" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>report</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/CISA" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISA</span></a> tags <a href="https://mastodon.thenewoil.org/tags/CitrixBleed2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed2</span></a> as exploited, gives agencies a day to patch</p><p><a href="https://www.bleepingcomputer.com/news/security/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a></p>
PrivacyDigest<p>Critical <a href="https://mas.to/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> 2 <a href="https://mas.to/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> has been under active <a href="https://mas.to/tags/exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploit</span></a> for weeks</p><p>A critical vulnerability allowing <a href="https://mas.to/tags/hackers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>hackers</span></a> to bypass <a href="https://mas.to/tags/multifactor" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>multifactor</span></a> <a href="https://mas.to/tags/authentication" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>authentication</span></a> in network management devices made by <a href="https://mas.to/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> has been actively <a href="https://mas.to/tags/exploited" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploited</span></a> for more than a month, researchers said. The finding is at odds with advisories from the vendor saying there is no evidence of in-the-wild <a href="https://mas.to/tags/exploitation" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>exploitation</span></a>.<br><a href="https://mas.to/tags/security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>security</span></a> <a href="https://mas.to/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a></p><p><a href="https://arstechnica.com/security/2025/07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/security/2025/</span><span class="invisible">07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/</span></a></p>
The New Oil<p>Public exploits released for <a href="https://mastodon.thenewoil.org/tags/CitrixBleed" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed</span></a> 2 <a href="https://mastodon.thenewoil.org/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a> flaw, patch now</p><p><a href="https://www.bleepingcomputer.com/news/security/public-exploits-released-for-citrixbleed-2-netscaler-flaw-patch-now/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/public-exploits-released-for-citrixbleed-2-netscaler-flaw-patch-now/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cyberscurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberscurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> warns of login issues after <a href="https://mastodon.thenewoil.org/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a> auth bypass patch</p><p><a href="https://www.bleepingcomputer.com/news/security/citrix-warns-of-login-issues-after-netscaler-auth-bypass-patch/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/citrix-warns-of-login-issues-after-netscaler-auth-bypass-patch/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
The New Oil<p>Over 1,200 <a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> servers unpatched against critical auth bypass flaw</p><p><a href="https://www.bleepingcomputer.com/news/security/over-1-200-citrix-servers-unpatched-against-critical-auth-bypass-flaw/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/over-1-200-citrix-servers-unpatched-against-critical-auth-bypass-flaw/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>
heise online English<p>"CitrixBleed 2": Indications of ongoing attacks on security leak</p><p>A Citrix Netscaler vulnerability nicknamed "CitrixBleed 2" is serious. It is now apparently being attacked.</p><p><a href="https://www.heise.de/en/news/CitrixBleed-2-Indications-of-ongoing-attacks-on-security-leak-10464316.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/en/news/CitrixBleed-2</span><span class="invisible">-Indications-of-ongoing-attacks-on-security-leak-10464316.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
heise Security<p>"CitrixBleed 2": Indizien für laufende Angriffe auf Sicherheitsleck</p><p>Eine Citrix-Netscaler-Lücke mit dem Spitznamen "CitrixBleed 2" ist gravierend. Nun wird sie offenbar attackiert.</p><p><a href="https://www.heise.de/news/CitrixBleed-2-Indizien-fuer-laufende-Angriffe-auf-Sicherheitsleck-10464142.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">heise.de/news/CitrixBleed-2-In</span><span class="invisible">dizien-fuer-laufende-Angriffe-auf-Sicherheitsleck-10464142.html?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon</span></a></p><p><a href="https://social.heise.de/tags/Cyberangriff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cyberangriff</span></a> <a href="https://social.heise.de/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://social.heise.de/tags/Exploit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Exploit</span></a> <a href="https://social.heise.de/tags/IT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>IT</span></a> <a href="https://social.heise.de/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.heise.de/tags/news" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>news</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/CitrixBleed2" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CitrixBleed2</span></a> flaw now believed to be exploited in attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/citrix-bleed-2-flaw-now-believed-to-be-exploited-in-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/citrix-bleed-2-flaw-now-believed-to-be-exploited-in-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> <a href="https://mastodon.thenewoil.org/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a></p>
CERT-Bund<p>Der Hersteller <a href="https://social.bund.de/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> hat Sicherheitsupdates für seine Produkte <a href="https://social.bund.de/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a> ADC und NetScaler Gateway veröffentlicht. Eine der damit geschlossenen, kritischen <a href="https://social.bund.de/tags/Schwachstellen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Schwachstellen</span></a> wird bereits aktiv ausgenutzt, bei weiteren könnte dies zeitnah erfolgen. Betreiber sollten schnellstmöglich ihre Instanzen absichern.<br><a href="https://www.bsi.bund.de/SharedDocs/Cybersicherheitswarnungen/DE/2025/2025-254480-1032" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bsi.bund.de/SharedDocs/Cybersi</span><span class="invisible">cherheitswarnungen/DE/2025/2025-254480-1032</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Citrix" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Citrix</span></a> warns of <a href="https://mastodon.thenewoil.org/tags/NetScaler" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetScaler</span></a> vulnerability exploited in DoS attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/citrix-warns-of-netscaler-vulnerability-exploited-in-dos-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/citrix-warns-of-netscaler-vulnerability-exploited-in-dos-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p>