‘CitrixBleed 2’ Shows Signs of Active Exploitation

If exploited, the critical vulnerability allows attackers to maintain access for longer periods of time than the original CitrixBleed flaw, all while remaining undetected.

Go to Source
Author: Kristina Beek, Associate Editor, Dark Reading

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.