Brutkey

Kevin Beaumont
@GossiTheDog@cyberplace.social

I think this thread exposes something about the cybersecurity industry and org posture btw - it almost all runs on Windows and EDR telemetry, hence why there’s little info on this from vendors (Netscaler is closed box appliance - they’re flying blind) and why orgs aren’t seeing anything, they don’t know how without vendors.

I keep contacting orgs and they have no idea they are compromised or how to investigate.

#CitrixBleed2

Kevin Beaumont
@GossiTheDog@cyberplace.social

The Dutch Public Prosecution Service #CitrixBleed2 incident rolls on - NRC report on an email from the Director of their IT service, where they say β€œIt is clear that it’s a massive and dramatic incident”.

https://www.nrc.nl/nieuws/2025/07/22/digitale-werkomgeving-om-inderdaad-gehackt-onderzoek-moet-uitwijzen-welke-informatie-is-gestolen-a4901019


Kevin Beaumont
@GossiTheDog@cyberplace.social

The Dutch Public Prosecution Service Citrix Netscaler incident is rumbling on. They are working on service recovery.

https://www.databreachtoday.com/dutch-prosecutors-recover-from-suspected-russian-hack-a-29129

#CitrixBleed2

Kevin Beaumont
@GossiTheDog@cyberplace.social

I've updated my CitrixBleed2 scan results for the first time in two weeks (I've been on holiday).

https://raw.githubusercontent.com/GossiTheDog/scanning/refs/heads/main/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt

2637 orgs still vuln