Rezultati pretraživanja
  1. 24. sij

    Citrix and FireEye Mandiant release version 1.1 of the IOC Scanner for . The update improves detection logic, enhances IOC intelligence, and reduces false positive results.

  2. prije 23 sata

    a colleague of mine sent me following link, where all exposed wildcard certificates are listed: our netscaler appliances were patched on 27th december. we are confused???!!!

    Prikaži ovu nit
  3. 3. velj

    We released our final fix to address the . It supports all versions of ADC, Gateway, and SD-WAN WANOP. Please read on for further details and the download link.

  4. 3. velj

    Third round of scanning for and still nearly 12,000 devices asserted as vulnerable worldwide. Results are not queryable from our service but Entreprise customers and accredited CERTs accross the globe can reach us to get data.

  5. 3. velj

    berichtet in der über die bekannte kritische Citirix Schwachstelle CVE-2019-19781. Infos zum Patch und Empfehlungen für Betroffene finden sich in diesem Artikel.

  6. MISE À JOUR : Citrix a publié des mises à jour de sécurité pour corriger cette vulnérabilité critique. Le Centre pour la cybersécurité recommande aux utilisateurs d’appliquer les correctifs de sécurité appropriés. Pour en savoir plus :

    Prikaži ovu nit
  7. UPDATE: Citrix has released security updates to address this critical vulnerability. The Cyber Centre recommends that users apply the relevant patches. Info:

    Prikaži ovu nit
  8. 31. sij
  9. 30. sij

    Your delay is a malicious cyber actor's opportunity. If you haven't patched yet, patch your vulnerable Citrix devices ASAP and follow your incident response plan to look for signs of exploitation.

  10. 30. sij

    In case you need it after attaching the VMDK to your VM: mount -t ufs -o ufstype=ufs2,ro /dev/sdb8 /mnt/netscaler/var mount -t ufs -o ufstype=ufs2,ro /dev/sdb1 /mnt/netscaler/flash

  11. 30. sij

    Haven't seen this elsewhere but if forensicating ADC/NetScaler images where you mount to /dev/sdb the following command provides additional artifacts related to exploitation: egrep -za "\#\ Compiled\ template\ generated" /dev/sdb8

  12. 29. sij
  13. 28. sij

    Just updated my to include searching for some of the leaked wildcard certificates you can find the url here

  14. 28. sij

    Kontaktieren Sie bei Fragen zur Vulnerability für und das Support-Team von , bei weiterführenden Fragen, u.a. zur Risikoeinschätzung, Bedrohungsanalyse das Securityteam der Unser News-Beitrag➡️

  15. 28. sij

    Attacks on Citrix servers increase after the release of CVE-2019-19781 exploits

  16. 27. sij

    We have teamed up with on an Indicator of Compromise Scanner that aids customers in the detection of compromise in connection with , to ensure our customers are supported.

  17. 25. sij

    2020-01-25:👾🆕 🔥 Exploitation 🔦Cfg: 1⃣reg_key: Disables Windows Defender/Protection 2⃣cmd_shadow|boot|recovery|firewall 3⃣no_name* Unix Setup 4⃣except_language - Anti-CIS🌐+ China🇨🇳 h/t ->

  18. 24. sij

    Today, we released the permanent fix for version 10.5 to address the vulnerability. We have now released permanent fixes for all supported versions of ADC, Gateway, and SD-WAN WANOP. These fixes are available to download now.

  19. 23. sij

    Today, we released permanent fixes to address the vulnerability for Citrix Application Delivery Controller () and versions 12.1 and 13.0. These fixes are available to download now.

  20. 23. sij

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.