Today, Citrix, a business unit of Cloud Software Group, Inc., a premier secure application access provider, announced a new capability designed to simplify and optimize how organizations secure their ...
For decades, Citrix has been the default platform for delivering virtual desktops – now that’s about to change. The venerable desktop provider’s decision to retire perpetual licensing and move ...
A cyber intrusion linked to the China-based group Salt Typhoon has been identified by cybersecurity researchers, involving the exploitation of a Citrix NetScaler Gateway vulnerability. The operation, ...
Citrix announced it will change its licensing model to a cloud-based system, effective from next year. Citrix’s file-based licensing setup will be replaced by its License Activation Service (LAS), ...
Almost two months to the day after the "Citrix Bleed 2" security flaw became known, users of NetScaler ADC and Gateway appliances are once again facing trouble. The manufacturer is reporting three ...
Citrix has released patches for three zero-day vulnerabilities in NetScaler ADC and Gateway, one of which was already being exploited by attackers. The flaws, tracked as CVE-2025-7775, CVE-2025-7776, ...
Citrix is once again testing customer patience with three new NetScaler flaws, one of which is a zero-day that attackers are already actively exploiting. The vulnerabilities affect multiple versions ...
Citrix added a handful of offerings to its NetScaler platform designed to strengthen enterprise data security. Chief among the updates is support for post-quantum cryptography (PQC). Initially teased ...
U.S. cybersecurity agency CISA says hackers are actively exploiting a critical-rated security flaw in a widely used Citrix product, and has given other federal government departments just one day to ...
Amid confusing reports about Citrix NetScaler exploits in the wild, researchers offer technical analyses and indicators of compromise for one of the vulnerabilities dubbed Citrix Bleed 2 that can lead ...
Citrix users are back in the crosshairs, as a new out-of-bounds read vulnerability, reminiscent of the notorious “Citrix Bleed,” has surfaced with signs already pointing to active exploitation. The ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results