Detailed examination of the critical flaw in Citrix NetScaler devices exploited for credential harvesting. Learn about the technical aspects, the scale of the threat, and recommendations for effective remediation.
IBM X-Force
2 Articles
2
Detailed insights into how cybercriminals use phishing and EV certificates to facilitate ransomware attacks, targeting multiple language-speaking groups.