Generative Data Intelligence

Tag: Citrix

Secure Browser Tech Is Having a Moment

The rise of cloud applications and infrastructure makes the Web browser the logical place for instituting security controls to protect users from online threats....

North Korean Hackers Target Security Researchers — Again

North Korean state-supported threat actors are targeting security researchers — the second such campaign in the last few years.Google first discovered DPRK attackers weren't going...

Unpatched Citrix NetScaler Devices Targeted by Ransomware Group FIN8

Citrix NetScaler ADC and NetScaler Gateway are at heightened risk of opportunistic attacks by a ransomware group likely linked to the financially motivated FIN8...

Unpatched Citrix NetScaler Devices Targeted by Ransomware Group FIN8

Citrix NetScaler ADC and NetScaler Gateway are at heightened risk of opportunistic attacks by a ransomware group likely linked to the financially motivated FIN8...

Citrix ADC, Gateways Still Backdoored, Even After Being Patched

Nearly 1,900 Citrix networking products around the world have been backdoored as part of a large-scale automated campaign targeting CVE-2023-3519, according to researchers from...

Attackers Exploit Citrix Zero-Day Bug to Pwn NetScaler ADC, Gateway

Cyberattackers are actively exploiting a critical remote code execution (RCE) bug in several versions of Citrix's NetScaler ADC and NetScaler Gateway application delivery and...

Hacker Infected & Foiled by Own Infostealer

Malicious actor "La_Citrix" built a reputation on gaining access to organizations' Citrix remote desktop protocol (RDP) VPN servers and selling them off to the...

Researchers Develop Exploit Code for Critical Fortinet VPN Bug

Researchers have written exploit code for a critical remote code execution (RCE) vulnerability in Fortinet's FortiGate SSL VPNs that the vendor disclosed and patched...

Chip Giant TSMC Blames $70M LockBit Breach on IT Hardware Supplier

Taiwan Semiconductor Manufacturing Company (TSMC) — one of Apple's biggest semiconductor suppliers — on Friday blamed a third-party IT hardware supplier for a data...

How Active Directory Bridging Extends Security Automation to Hybrid IT Environments

In today's hybrid IT environments, it's more important than ever to have a unified security strategy. With users and applications spread across on-premises and...

Top 25 Mobile App Development Companies In USA – USM

List of Mobile App Development Companies in USA, San Francisco, California Top 25 Mobile App Development Companies in the USA Smart Phones have tremendously changed the...

‘Volt Typhoon’ Breaks Fresh Ground for China-Backed Cyber Campaigns

News this week that a likely China-backed threat actor is targeting critical infrastructure organizations in Guam has once again raised the specter of America's...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?