Interview: Lessons from China's Ascent - Friends of Socialist China
Embedded below is an interview with Friends of Socialist China co-editor Carlos Martinez on the CGTN Radio podcast The Bridge, hosted by Jason Smith.Friends of Socialist China
Embedded below is an interview with Friends of Socialist China co-editor Carlos Martinez on the CGTN Radio podcast The Bridge, hosted by Jason Smith.Friends of Socialist China
BREAKING: Hospital sources in Gaza report 71 people killed in a series of Israeli massacres in the Gaza Strip since dawn today, including 50 aid seekers.
#starvation #FoodAsWeapon #Gaza #SaveGaza #StopIsrael #SanctionIsrael #BDS
#palestine #Israel #Politics #Genocide #PeaceNow #StopTheWar #CeasefireNow @palestine@a.gup.pe @israel @palestine@lemmy.ml
FDA, CDC advisers say lost pregnancies higher than expected following early mRNA vaccination
freerepublic.com/focus/f-chat/…
Comments from below the link above, check them all:
"They should sue the government and the drug companies..."
justthenews.com/politics-polic…
Lower-than-expected pregnancy loss following flu vaccine, however. HHS wants 18-month hold on FOIA litigation related to vaccines including for COVID, litigant's lawyer says.Greg Piper (Just The News)
CeceDuBois reshared this.
In the same conversation, this lady told me she doesn't eat fruits, vegetables, rice or meat. Also, she always orders the same thing when she goes to a restaurant.
It's nice to see someone with worse eating habits than me.
(I'm not a fussy eater - I fail to always plan a balanced meal.)
- Πάνω από 900 συλλήψεις στο Λεκανοπέδιο ρε γκουμουνι.
- Τι? Greek Mafia?
- Χειρότερο ρε πλεμπες.
Χωρίς εισιτήριο στα ΜΜΜ.....
N. E. Felibata 👽 reshared this.
Sensitive content
"Two out of three Germans support the creation of a European nuclear shield"
Well,......no big deal.
Two out of three Germans supported the Nazis once...
I guess two out of three Germans are extremely susceptible to government propaganda.
Disisdeguey🔻Pavlichenko🇵🇸 reshared this.
I love #SarahSilverman. Always have. She's a gem and a legend! #MichaelRosenbaum #podcast #InsideOfYou
Thank you to our sponsors:📞 Mint Mobile: https://mintmobile.com/insideofyou👕 Quince: https://quince.com/inside❤️ This episode is sponsored by BetterHelp. G...YouTube
Marble Blast
Link: marbleblast.vaniverse.io/
Discussion: news.ycombinator.com/item?id=4…
A web port of Marble Blast Gold and Marble Blast Platinum: In this 3D platformer classic, race your marble to the finish as fast as possible in more than 4100 diverse levels taken from Marble Blast Gold, Platinum and Ultra.marbleblast.vaniverse.io
Starship: The minimal, fast, and customizable prompt for any shell
Link: starship.rs/
Discussion: news.ycombinator.com/item?id=4…
Starship is the minimal, blazing fast, and extremely customizable prompt for any shell! Shows the information you need, while staying sleek and minimal.starship.rs
Dev: Building a boat.
PM: Perfect!
Dev: Great.
Two weeks later...
PM: So... can it fly?
A new site, FuckLAPD.com, is using public records and facial recognition technology to allow anyone to identify police officers in Los Angeles they have a picture of. The tool, made by artist Kyle McDonald, is designed to help people identify cops who may otherwise try to conceal their identity, such as covering their badge or serial number.
“We deserve to know who is shooting us in the face even when they have their badge covered up,” McDonald told me when I asked if the site was made in response to police violence during the LA protests against ICE that started earlier this month. “fucklapd.com is a response to the violence of the LAPD during the recent protests against the horrific ICE raids. And more broadly—the failure of the LAPD to accomplish anything useful with over $2B in funding each year.”
“Cops covering up their badges? ID them with their faces instead,” the site, which McDonald said went live this Saturday. The tool allows users to upload an image of a police officer’s face to search over 9,000 LAPD headshots obtained via public record requests. The site says image processing happens on the device, and no photos or data are transmitted or saved on the site. “Blurry, low-resolution photos will not match,” the site says.
“fucklapd.com uses data provided by the City of Los Angeles directly to the public,” McDonald told me in an email. “This data has been provided in response to either public records requests or public records lawsuits. That means all of this information belongs to the public and is a matter of public record. fucklapd.com is not scraping any data.”
In addition to potentially identifying officers by name and serial number, FuckLAPD.com also pulls up a police officer’s salary.
“Surprisingly it [the domain name] only costs $10 a year to exercise my first amendment right to say fucklapd.com,” McDonald said.
playlist.megaphone.fm?p=TBIEA2…
I tested the tools by grabbing an image of a white and bald police officer from an LAPD press conference addressing its use of force during the anti-ICE protests in Los Angeles. I uploaded the image to the site, and within a few seconds the site presented me with nine headshots of officers who could be possible matches, all of them bald white men. The first correctly identified the cop in the image I uploaded.
Clicking “view profile” under the result sent me to the Watch the Watchers site by the Stop LAPD Spying Coalition, a community group based in the Skid Row neighborhood of downtown Los Angeles. “All of the information on this website comes from records that were deliberately made public by the City of Los Angeles in response to either public records requests or public records lawsuits,” the Watch the Watchers site says. “We plan to keep refreshing this data from new public records requests as well as to add other data.” Stop LAPD Spying Coalition is not associated with FuckLAPD.com and did not endorse the site.
McDonald told me that since the site launched, it had around 50,000 visitors, but “Because the analysis happens on-device I have no way of knowing what people are using it for, except for some people who have posted screenshots to Twitter or Instagram,” he said.
In 2018 McDonald made another tool called ICEspy which used hundreds of photos of ICE employees from LinkedIn and does much the same thing as FuckLAPD.com. “This app is designed to highlight and embarrass the organization committing atrocities against refugees and immigrants to the United States,” ICEspy’s website says. That tool originally used a Microsoft API, before Microsoft restricted access to it. McDonald said on X that he recently relaunched the tool to run locally on devices. 404 Media tested ICEspy using images of ICE employees on LinkedIn to verify if the tool worked and each result was incorrect; McDonald indicated on X he was looking for others to re-scrape LinkedIn and update the database.
Over the last few months ICE officers have consistently worn masks, neck gaiters, sunglasses, and baseball caps to shield their identity while often refusing to provide their name or even confirm the agency they belong to. This includes while violently assaulting people, detaining U.S. citizens, and pointing weapons at bystanders, leaving little room for recourse or accountability against the individual agents or the agency.
ICE’s constant use of masks has created a climate where people cannot be sure that the heavily armed group of men coming towards them are really federal agents or not. In Philadelphia, a man pretended to be an ICE agent in order to rob an auto repair shop and zip tie an employee. In Brooklyn, a man posed as an immigration officer before attempting to rape a woman.
ICE claims that assaults against its officers have increased by 413 percent, and use this as the justification for covering their faces. But as Philip Bump showed in the Washington Postthere are still plenty of questions about those numbers and their accuracy. ICE says its officers’ family members have been doxed too.
Neither the LAPD or ICE responded to a request for comment.
Joseph Cox contributed reporting.
Activists post footage which also shows suspects being led away by masked agent.Billal Rahman (Newsweek)
reshared this
Bitte diese Petition unterzeichnen und verbreiten. Danke! - Bin mir leider nicht sicher, ob nur Bajuwar:innen unterschreiben dürfen, da es an den Landtag geht. Hab's trotzdem gemacht.
N. E. Felibata 👽 reshared this.
The week ahead has all the makings of the water-splitting event that the Atlantic Alliance has never known. The 38th NATO summit, taking place in TheРикардо Нуно Коста (New Eastern Outlook)
Trump's ceasefire is already collapsing
#Zionists threaten to strike #Tehran
#Iran denies having launched missiles
"In response to Iran's violation of the truce, we will respond with force," the zionazi chief of staff said.
Meanwhile in #TelAviv it is one step closer to civil war as Iranian missiles strike at will without any obstruction from the supposedly "invulnerable" dome's.
Disisdeguey🔻Pavlichenko🇵🇸 reshared this.
Woke Gov. Moore strikes again. Ocean City, MD, has been a resort town on the Atlantic for as long as I can remember, for whites and blacks. I've never seen violence as many times as I've been there.
The Gov wants to give 400 MILLION taxpayer dollars to black developers for welfare housing in Ocean City. 2 wks ago, Sotomayor & Jackson said discrimination against anybody is unconstitutional. The gov is being sued. Also, a Commission to study woke BS was also stopped.
Iceland is one of the most active volcanic regions in the world, but its seismic nature is part of a much broader geological history.
In a groundbreaking discovery, scientists, supported by an ESA-funded project, have uncovered the underlying forces that forged the North Atlantic’s fiery volcanic past – shedding light on the vast geological region that spans from Greenland to western Europe, which is home to iconic natural wonders like the Giant’s Causeway in Northern Ireland.
#news #space #science #esa #europeanspaceagency
posted by pod_feeder_v2
N. E. Felibata 👽 likes this.
The Iranian forces launched a major missile attack on the US Al-Udeid base in Qatar in in response to the recent American aggression that targeted Iranian nuclear facilities.Follow ups – Al-Khabar Al-Yemeni:Sources reported violent explosions in theDAILY YEMEN
🌐 Can you help translate Bonfire into your language?
We’re looking for translators and bilingual folks to help localise Bonfire extensions and UI into as many languages as possible — especially before the 1.0 release!
No coding needed — just a love of words.
🔥 Join here: app.transifex.com/bonfire/bonf…
P.S. You can also help by translating this very message and/or sharing it! The more communities we reach, the more accessible Bonfire becomes. 🌍💬
#Bonfire #Translation #Localization #FOSS #Fediverse
Join Bonfire project in Transifex, and contribute to the world's largest localization communityapp.transifex.com
🌐 Puoi aiutarci a tradurre Bonfire?
Cerchiamo traduttori o persone bilingue per localizzare le estensioni e l’interfaccia di Bonfire in quante più lingue possibile — soprattutto prima del rilascio della versione 1.0!
Non serve saper programmare — basta amare le parole.
🔥 Unisciti a noi: app.transifex.com/bonfire/bonf…
Join Bonfire project in Transifex, and contribute to the world's largest localization communityapp.transifex.com
🌐 Kannst du helfen, Bonfire in deine Sprache zu übersetzen?
Wir sind auf der Suche nach Übersetzenden und zweisprachigen Menschen, die helfen mögen, Erweiterungen und die Benutzer*innen-Oberfläche von Bonfire in so viele Sprachen wie möglich zu übersetzen. Insbesondere vor der Veröffentlichung der Version 1.0!
Keine Programmier-Kenntnisse nötig — nur eine Liebe für Wörter.
🔥 Schliess dich hier an: app.transifex.com/bonfire/bonf…
P.S. Du kannst auch helfen, indem du diese Nachricht übersetzst und/oder teilst. Je mehr Gemeinschaften wir erreichen, desto zugänglicher wird Bonfire. 🌍💬
Join Bonfire project in Transifex, and contribute to the world's largest localization communityapp.transifex.com
O inocente aqui estava animado porque colegas da infraestrutura estavam testando possibilidades — Proxmox entre elas — para substituir #VMware que domina o centro de dados desde sua concepção.
Até que um deles repassa a demais responsáveis, sem qualquer pudor, conversa em que solicita a um fornecedor de software privativo, que já teria fornecido à instituição, há anos, a versão de VMware em execução, quais produtos seriam recomendáveis hoje.
Se perguntar aos envolvidos, vão responder que são favoráveis a software livre: que até gostam de "Ubuntu"! Acrescentam, porém, que, por mais que tenham boa vontade, buscam aderir a supostas "práticas de mercado".
Assim, conclui-se que, perante essa equipe, jamais houve real chance para software livre e dificilmente haverá. No máximo, em algumas partes que sejam convenientes meramente para "reduzir custos".
We now have tees! Designed by our friends at Transverse Co-operative, featuring a diverse flock of birds 🐦⬛ perched as notes on sheet music.
mirlo.space/team/merch/bird-no…
Printed by unionized worker co-op Worx Printing. 💪
libertytree.ca/quotes/Claudius…
"He who wants peace must prepare for war."
-- Claudius
[Tiberius Claudius Caesar Augustus Germanicus] (10 BC-54 AD) fourth Roman Emperor of the Julio-Claudian dynasty
Rose reshared this.
Good for the Co-op
thecanary.co/trending/2025/06/…
Israeli products should have been removed from all supermarkets a long time ago. The Co-op is leading the way. Others must now follow.Ed Sykes (The Canary)
Well this is friggin cool!
"each text piece changes—adapts—depending on various conditions, like what time of day you access it or how many times you’ve viewed it. Some pieces change every few minutes, while others update every time a user looks at it"
404media.co/queer-online-zine-…
New Session publishes poetry via Telnet, rejecting the internet’s fast-paced enshittification.Janus Rose (404 Media)
NATO Secretary General Rutte Hypes Ukrainian Importance to Netherlands Summit After Kiev Is Told It Will NOT Be Part of the Alliance, and Zelensky Is Kept Out of Leaders’ Meeting
thegatewaypundit.com/2025/06/n…
As the leaders of the North Alliance Treaty Organization converge to The Hague, in the Netherlands, for today’s Summit, there’s still a side issue creating a lot of confusion: Ukraine.Paul Serran (Where Hope Finally Made a Comeback)
Today's threads (a thread)
Inside: Surveillance pricing lets corporations decide what your dollar is worth; and more!
Archived at: pluralistic.net/2025/06/24/pri…
1/
The surveillance changes more than the price. If the customer is rich or desperate enough, the system will jack the price up indeed. But if the customer is poor and not willing to pay, the system will then present junk which is cheaper to manufacture.
The system always optimizes profit taken from the customer's pockets.
"A ceasefire with Israel means you cease, they fire"
(allegedly from @zei_squirrel at Xitter)
Microplastics shed by food packaging are contaminating our food, study finds
Link: cnn.com/2025/06/24/health/micr…
Discussion: news.ycombinator.com/item?id=4…
libertytree.ca/quotes/George.W…
“To be prepared for war is one of the most effectual means of preserving peace.”
~ George Washington
(1732-1799) Founding Father, 1st US President, 'Father of the Country'
(An obvious reference to a Latin phrase, "Si vis paceum, parabellum.")
First Annual Message To Congress, New York City, January 8. 1790
"To be prepared for war is one of the most effectual means of preserving peace." ~ George WashingtonLibertyQuotes
Rose reshared this.
By Phil Broq. Wars are no longer meant to be won; they're meant to last. Like Hollywood franchises with innocent blood, special effects, a bit of social media outrage, and, most importantly, guaranteed cash flow.Réseau International
Abbott is 100% correct on this one. Regulate it. Don't ban it.
texastribune.org/2025/06/22/te…
The move infuriated Lt. Gov. Dan Patrick, the powerful head of the Senate, who had called the ban among his top five bills over 17 years in the Legislature.Kayla Guo (The Texas Tribune)
libertytree.ca/quotes/Albert.W…
“We must contemplate some extremely unpleasant possibilities, just because we want to avoid them and achieve something better. Nobody, however, likes to think about anything unpleasant, even to avoid it. And so the crucial problem of thermonuclear war is frequently dispatched with the label 'War is unthinkable' -- which, translated freely, means we don't want to think about it.”
~ Albert Wohlstetter
(1913-1997) Professor, nuclear strategist
Rose reshared this.
America's full of shit and loves violence.
middleeasteye.net/trending/ira…
A renewed debate around the portrayal of Muslim women, particularly in Iran, has gained traction on social media in recent days, with users critiquing and ridiculing long-standing western narratives that frame women in the region as in need of libera…MEE staff (Middle East Eye)
The latest update to #Xorg on #Linux - brought to you by the #RedHat people who are trying to kill Xorg - breaks Nvidia drivers and other stuff. Force the earlier version and wait for #XLibre to find it's way to your distro. It was released on June 21st, and it _doesn't break stuff.
Nvidia and Xorg is a long “I hate you” story. When I was using linux (between 2006 and 2025), I avoided nvidia hardware like the plague. ATI/AMD drivers are far better… And they work with the ancestral Xorg or the younger Wayland.
Xlibre? I won't hold my breath for it. Let's see if it is still alive in 6 months from now. I doubt it.
ℝ𝕠𝕓𝕚𝕟 likes this.
Why did ancient warriors name their swords? Discover the legends behind famous blades like Excalibur and Muramasa, and the power those names carried.G. Merchant (Fire and Steel)
Medea Benjamin and Nicolas J. S. Davies call for IAEA chief Rafael Grossi's resignation for letting the agency be used by Israel and the U.S. to manufacture a pretext for attacking Iran. By Medea Benjamin and Nicolas J. S.Consortium News
Paid subscribers get an archive cartoon about the U.S. military before TrumpGary Varvel (Views From The Right)
I feel like this is the world's nichest tip, but I've recently realized that I much prefer writing the markdown files for my static site in Joplin vs. in a coding editor.
Historically, I've loved writing in a coding editor, but Joplin is a friendly enough interface and so much easier to sync these posts across multiple computers... I can work on a blog post on my personal laptop at night and my work laptop by day and never touch git!!!
[do not reply to tell me to use another version control]
George E. 🇺🇸♥🇺🇦🇵🇸🏳️🌈🏳️⚧️ likes this.
— we’re all super excited and grateful! And look forward to what the actual church will look like!
Andrew Gould is our building designer:
newworldbyzantine.com/sacred/
Sacred Projects Holy Ascension, Mount Pleasant, SC Saint John of the Ladder, Greenville, SC Saint Gregory Palamas Monastery, Perrysville, OH Holy Cross Hermitage, Wayne, WV Saint John the Baptist, Beaverton, OR Saint James, Beaufort, SC Saint Maximus…New World Byzantine
@MountainJay okay this is AMAZING. He designed our local Orthodox church - which I thought had been closed down a few years ago. Turns out it is still there. Been wanting to check out Orthodox service in person. Very exciting. If you hadn't sent that I'd not known!
Holy Ascencion, Mt Pleasant SC
— ooo, that church looks like it will be beautiful inside! I’m excited for you!
In case you might find it helpful, this series of super short videos has some good introductory info about the services, traditions, theology, etc.
For many Americans, it can be a bit of a culture shock at first. 😆 I know it was for me!
-- while looking for more recent pictures of the exterior of that church (to see if the copper roof has turned green yet 😃), I found this recent Yelp review.
Hamilton perfectly describes my experience with our parish here in Missouri. And also how it's very unlikely I would now be a Christian if not for Orthodoxy. 😀
-- wow, absolutely gorgeous!
The only place I've ever lived with any density of churches was in Utah, with one every 20 square blocks or so. But those buildings are so plain and utilitarian. 😛
I attended a Unitarian Church off and on in Nebraska in the late nineties, during my "metaphysical spiritual" phase. Whiffs of the coming woke madness were definitely there already. I can totally see a spook running one of those congregations. 😂
Our socials: fediverse.blog/~/ActaPopuli/fo…
If you're passionate about enjoying the great outdoors without sacrificing comfort, then “How to Camp and Stay Comfortable” by Andy Reven is an absolute must-have addition to your collection.
This outstanding book redefines what it means to experience nature while maintaining a sense of homey ease. From beginners just starting out to seasoned outdoor enthusiasts, this work offers invaluable insights that will transform your approach to camping into an enjoyable, hassle-free adventure.
Andy Reven masterfully combines practical advice with engaging storytelling, creating a read that is both informative and highly enjoyable. You will learn innovative strategies for selecting the perfect gear, setting up camp efficiently, and ensuring your environment remains cozy regardless of the surroundings. Every chapter is packed with actionable tips that you can put into practice immediately, making your outdoor excursions more comfortable and enjoyable than ever before. It's rare to find a guide that combines such depth of knowledge with an engaging narrative, but Reven does so seamlessly, making this book genuinely hard to put down.
The clarity with which Andy Reven presents complex ideas makes this guide accessible and inviting. Whether you're interested in lightweight packing, managing different weather conditions, or creating a relaxing campsite atmosphere, you will learn techniques that will elevate your camping experience. The book also offers creative ideas for enhancing comfort through simple modifications, which can make all the difference during extended stays in the wild. This isn't just a manual; it's a comprehensive resource that empowers you to camp smarter, safer, and more comfortably.
Readers will appreciate the thoughtful organization and fresh perspective that Reven provides. His enthusiasm for outdoor living shines through every chapter, inspiring confidence and curiosity in those eager to explore nature without feeling overwhelmed. The guidance on selecting the right equipment, maintaining hygiene, and even creating cozy sleeping arrangements makes this book a true treasure trove of ideas. It’s a perfect companion for anyone who wants to enjoy the beauty of the outdoors without the discomfort that often accompanies it.
The writing style is engaging and approachable, making complex concepts easy to grasp. You will find yourself eagerly turning each section, eager to uncover new tips and tricks that will make your adventures more pleasurable. The book's practical approach ensures that every suggestion is realistic and attainable, regardless of your experience level. It’s a rare find in outdoor literature—a guide that is as inspiring as it is highly useful.
Considering all its qualities, “How to Camp and Stay Comfortable” is undeniably a standout publication. Many readers will undoubtedly call it the book of the year for outdoor enthusiasts. Its blend of comprehensive advice, compelling storytelling, and actionable insights sets it apart from other guides. This book will quickly become your go-to resource for all things camping, transforming your outdoor experiences into moments of genuine relaxation and joy.
Don't miss out on this exceptional work. Pick up a copy today and discover how enjoyable camping can truly be when you have the right guidance. You will learn how to turn roughing it into an art form, all while creating memories that last a lifetime. This is more than just a book; it's your new best friend for outdoor adventures. Get ready to be inspired by the expert advice and engaging narration that make this work a true standout.
Χρησιμοποιησε ανθρωπους σε καταναγκαστικα έργα, τους εβαλε να μενουν σε περιφραγμένα γκέτο, τους δολοφονησε με καθε πιθανό τρόπο, τους εσπρωξε στην πείνα εξοντώνοντας τους με λιμό, τους στερησε νερό και φαρμακα με αποτέλεσμα αρρωστιες που τους ξεπαστρευαν, τους εκλεψε τη γη και τις περιουσίες δηλωνοντας πως χρειαζεται ζωτικο χώρο για ασφαλεια καθώς είναι ο περιούσιος άριος λαός,τους στοχοποίησε ως "υπανθρωπους" και υπεύθυνους για καθε κακό που περνάει..
Δεν ειναι η ναζιστική Γερμανία.
La loi définit "forte chaleur" à partir de l'alerte jaune canicule de Météo France, jusqu'à l'alerte rouge
- Mise à dispo OBLIGATOIRE d'eau fraîche à proximité du poste de travail
- 3L d'eau fraîche par personne et par jour si pas de point d'eau accessible
- Adaptation des postes de travail pour ne pas faire les tâches les plus dures aux heures les plus chaudes
- Limiter la durée du travail, prévoir plus de pauses
1/2
L'employeur doit *fournir* des EPI pour protéger au mieux de la chaleur et des rayonnements solaires : chapeau, crème solaire, casquette...
Pour un travail dans un local fermé l'employeur n'est plus seulement obligé de chauffer les locaux en hiver mais également de refroidir en été (ventilation, pare soleil...)
2/3
L'inspection du travail peut intervenir en cas de non mise en place de conditions adaptées au travail sous la chaleur. Si le patron n'a toujours rien fait dans les 8 jours, il risque un PV.
C'est bien mais ça n'est pas assez !
La loi c'est pas magique. C'est un outil mais ce qui compte le plus c'est le rapport de force, c'est nous !
Organisons nous !
En réseaux, en syndicats
Notre pouvoir c'est notre force de travail. Luttons pour notre santé, pour nos droits, pour notre dignité !
3/3
Europe said will hand Ukraine out to Russia, kick out US bases, break up NATO in exchange for cheap oil and gas, IOW the middle east can go screw itself
Immediately all became friends again, Islamists, Zionists, Oily-garchs and war-mongers
Fun times ahead in Europe 🙄
"The @EUCommission has set out its plans to give #police access to digital information, including by cracking down on “non-cooperative” messaging services [like @signalapp and #Telegram] and helping build technologies to break #encryption."
#DigitalRights #privacy #HumanRights #confidentiality #cybersecurity
Rose reshared this.
Toulouse veut moderniser son système de « vidéo protection » via l’implémentation de « solutions d’analyse algorithmique », et plus particulièrement l’ « intégration de modules d’intelligence artificielle permettant d’identifier en temps réel les com…Jean-Marc Manach (Next)
VSA La surveillancebâtit son empire tout sur laVSA kitaffiches et flyers Pas de VSA dans ma ville Pas de VSA dans ma ville ! Marseille, Montpellier, Paris...La Quadrature du Net
**The case for a Canadian wealth tax**
By @pluralistic
A major problem with letting billionaires decide how your country is run is that they will back whichever psycho promises the lowest taxes and least regulation, no matter how completely batshit and unfit that person is
Pakistan is the 5th most populated country on the planet, and they have nuclear weapons. India has the largest population, and hey have nuclear weapons.
Trump negotiated a peace deal in a hot war between 2 nuclear powers who hate each other along ancient cultural lines.
That's a big deal.
It deserves the Nobel Peace Prize.
this leads me to what i hate most about LLMs. not the lies or the ecological evil, but the personal hatred of the field's utter disregard for any actual science of linguistics and languages. techniques of refining models do not represent advancements in processing language or generating useful responses. it's fancy guesswork that lies about being language.
i maintain that the responses generated by LLMs does not qualify as "language".
Kevin Beaumont
in reply to Kevin Beaumont • • •An update on CVE-2025-5777, explaining why orgs should identify systems and patch.
doublepulsar.com/citrixbleed-2…
CitrixBleed 2: Electric Boogaloo — CVE-2025–5777 - DoublePulsar
Kevin Beaumont (DoublePulsar)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Don't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attack
Jessica Lyons (The Register)fuzzyfuzzyfungus
in reply to Kevin Beaumont • • •I hope nobody is still misled by the pre-correction CVE into thinking that this is just a 'mitigate by controlling access to management interface like you should probably do anyway' thing that they can just defer to lower priority maintenance.
Relatively severe either way; but that teensy little correction was not loud enough for how dramatically an otherwise plausible mitigation turned out to be useless.
Kevin Beaumont
in reply to Kevin Beaumont • • •Citrix on this one:
"At this time, there have been no reports or indications that the vulnerabilities described in CTX693420 (CVE-2025-5349 and CVE-2025-5777) are being actively exploited in the wild. However, due to the critical severity of these issues (CVSS scores of 8.7 and 9.3), We strongly recommends that affected customers apply the updated patches immediately to mitigate any potential risks."
Kevin Beaumont
in reply to Kevin Beaumont • • •NHS Digital's cyber alert database has been updated too. digital.nhs.uk/cyber-alerts/20…
I highly recommend bookmarking this site for the alerts, they're really good at filtering noise:
digital.nhs.uk/cyber-alerts
E.g. if you select 'high' category, there's only one a month on average
Dennis Haverkamp
in reply to Kevin Beaumont • • •Citrix just published a new Bulletin for CVE-2025-6543 (CVSS 9.2)
support.citrix.com/support-hom…
Loading...
support.citrix.comalg0w
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Threat Spotlight: CVE-2025-5777: Citrix Bleed 2 Opens Old Wounds - ReliaQuest
ReliaQuestKevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •NetScaler Critical Security Updates for CVE-2025-6543 and CVE-2025-5777
Anil Shetty (NetScaler Blog)Kevin Beaumont
in reply to Kevin Beaumont • • •If you see this GitHub PoC for CVE-2025-5777 doing the rounds:
github.com/mingshenhk/CitrixBl…
It’s not for CVE-2025-5777. It’s AI generated. The links in the README still have ChatGPT UTM sources.
The PoC itself is for a vuln addressed in 2023 - ChatGPT has hallucinated (made up) the cause of the vuln using an old BishopFox write up of the other vuln.
GitHub - mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-: 详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件
GitHubKevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •I’ve heard that Citrix are complaining me billing this CitrixBleed 2 is causing them reputational damage, and isn’t related in any way to CitrixBleed.
For the record - it was a dumb joke name to attraction attention for patching. I know it isn’t exactly the same cause.
But, ya know, it is a memory disclosure vuln which reveals sensitive info, and it does require ICA sessions be reset.. which only happened before with CitrixBleed.
ineedsleeps
in reply to Kevin Beaumont • • •Various_Canaries
in reply to Kevin Beaumont • • •Amar Kulo
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Only Pentesting Platform Proven in Production | Horizon3.ai
Horizon3.aiKevin Beaumont
in reply to Kevin Beaumont • • •I've published my scan in progress of CVE-2025-5777 patching status, listing IPs, hostnames, Citrix Netscaler build numbers and if they're vulnerable to CitrixBleed2.
The scan isn't finished yet so these are only about a quarter of the results - unfortunately my coding skills are shite and it's really slow - should be finished over weekend or early next week.
Also, the SSL certificate hostnames are separated by comma which throws out CSV - sorry, I'll fix that later.
github.com/GossiTheDog/scannin…
scanning/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt at main · GossiTheDog/scanning
GitHubKevin Beaumont
in reply to Kevin Beaumont • • •If anybody is wondering btw it's 4047 definitely vulnerable (so far) from 17021 scanned instances - so 24% unpatched after about 3 weeks.
But scan is still running obvs so the vuln number will keep growing.
Kevin Beaumont
in reply to Kevin Beaumont • • •If anybody likes stats
- Of the 42 identified NHS Netscalers so far, 37 are patched🥳 The NHS are really good at this nowadays.
- Of the 65 identified .gov.uk Netscalers so far, only 48 are patched 😅 All of the unpatched are councils, which are obviously severely budget constrained in many cases - I'm also not sure they actually know they're supposed to be patching.
Ketumbra
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •First exploitation details for CVE-2025-5777 - the Netscaler vuln - are out. labs.watchtowr.com/how-much-mo…
If you call the login page, it leaks memory in the response 🤣
I don’t want to specify too much extra technical info on this yet - but if you keep leaking the memory via requests, there’s a way to reestablish existing ICA sessions from the leaked memory.
How Much More Must We Bleed? - Citrix NetScaler Memory Disclosure (CitrixBleed 2 CVE-2025-5777)
Sina Kheirkhah (@SinSinology) (watchTowr Labs)Christoffer S.
in reply to Kevin Beaumont • • •Cyberstern
in reply to Kevin Beaumont • • •Robert Gützkow
in reply to Kevin Beaumont • • •IntensityCubed
in reply to Kevin Beaumont • • •Alex
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Updated scan results for CVE-2025-5777: github.com/GossiTheDog/scannin…
It's still partial due to bugs, but about 18k servers.
scanning/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt at main · GossiTheDog/scanning
GitHubSanCla 🤘
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •kcarruthers
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •CVE-2025-5777 (Citrix Netscaler vuln) has been under active exploitation since mid June, with people dumping memory and using this to try to access sessions.
TTPs to hunt for:
- In Netscaler logs, repeated POST requests to *doAuthentication* - each one yields 126 bytes of RAM
- In Netscaler logs, requests to doAuthentication.do with "Content-Length: 5"
- In Netscaler user logs, lines with *LOGOFF* and user = "*#*" (i.e. # symbol in the username). RAM is played into the wrong field.
Kevin Beaumont
in reply to Kevin Beaumont • • •Horizon3 have a good write up here, I don't think they were aware this is already being exploited for almost a month: horizon3.ai/attack-research/at…
Worth noting I was only able to find exploitation activity due to the WatchTowr and Horizon3 write ups - Citrix support wouldn't disclose any IOCs and incorrectly claimed (again - happened with CitrixBleed) that no exploitation in the wild. Citrix have gotta get better at this, they're harming customers.
CVE-2025-5777: CitrixBleed 2 Exploit Deep Dive by Horizon3.ai
Jimi Sebree (Horizon3.ai)Kevin Beaumont
in reply to Kevin Beaumont • • •Just to be super clear, although Citrix claim that CitrixBleed 2 is in no way related to CitrixBleed, it allows direct session token theft - Citrix are wrong. Horizon3 have the POC and it's already being exploited - Citrix were also wrong.
"Not the most novel thing in the world… but this is much much worse than it initially appears. Take a look at the following video where you’ll see that it’s possible to receive legitimate user session tokens via this vector. "
Emory
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Exploitation IOCs for CVE-2025-5777 aka CitrixBleed 2, these are actively stealing sessions to bypass MFA for almost a month. Some are also doing Netscaler fingerprint scanning first.
64.176.50.109
139.162.47.194
38.154.237.100
38.180.148.215
102.129.235.108
121.237.80.241
45.135.232.2
HT @ntkramer and the folks at @greynoise
Look for lots of connections to your Netscaler devices over past 30 days. More IPs coming as also under mass exploitation. More IPs: viz.greynoise.io/tags/citrixbl…
Darses
in reply to Kevin Beaumont • • •My own honeypot only sees activity from Private VPN. No fingerprinting first. Most POST /p/u/doAuthentication.do, some POST /nf/auth/doAuthentication.do. User-Agent: "Vuln3rableVuln3rable..."
2025-07-07
190.60.16.26
103.27.203.82
45.9.249.58
185.94.192.162
128.1.160.146
200.110.153.22
2025-07-06
193.37.253.202
200.110.153.22
217.138.222.66
82.221.113.209
80.239.140.197
Kevin Beaumont
in reply to Kevin Beaumont • • •Martin S 🚩❤️✊ 🇵🇸🇺🇦
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •I wrote up a thing on how to hunt for CitrixBleed 2 exploitation
doublepulsar.com/citrixbleed-2…
CitrixBleed 2 exploitation started mid-June — how to spot it
Kevin Beaumont (DoublePulsar)Ketumbra
in reply to Kevin Beaumont • • •Pretty sure that's not what you meant ;)
Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •“Citrix declined to say if it's aware of active exploitation”
It is aware. arstechnica.com/security/2025/…
Critical CitrixBleed 2 vulnerability has been under active exploit for weeks
Dan Goodin (Ars Technica)CatButtes
in reply to Kevin Beaumont • • •TheTomas
in reply to Kevin Beaumont • • •First Victims in Switzerland and Germany
borncity.com/blog/2025/07/09/i…
Ameos-Klinikverbund: IT-Ausfall Folge eines Hacker-/Cyberangriffs
Günter Born (Borns IT- und Windows-Blog)Kevin Beaumont
in reply to Kevin Beaumont • • •I believe Citrix may have made a mistake in the patching instructions for CitrixBleed2 aka CVE-2025-5777.
They say to do the instructions on the left, but they appear to have missed other session types (e.g. AAA) which have session cookies that can be stolen and replayed with CitrixBleed2. On the right is the CitrixBleed1 instructions.
The net impact is, if you patched but a threat actor already took system memory, they can still reuse prior sessions.
Tell anybody you know at Citrix.
Emory
in reply to Kevin Beaumont • • •fuzzyfuzzyfungus
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Chilly 🛡️
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •CVE-2025-5777 aka CitrixBleed 2 has been added to CISA KEV now over evidence of active exploitation.
Citrix are still declining to comment about evidence of exploitation as of writing.
cisa.gov/news-events/alerts/20…
Kevin Beaumont
in reply to Kevin Beaumont • • •Now everybody but Citrix agrees that CitrixBleed 2 is under exploit
Jessica Lyons (The Register)Kevin Beaumont
in reply to Kevin Beaumont • • •This is how Citrix are styling Citrix Bleed 2 btw. In the blog there’s no technical details or detection details or acknowledgement of exploitation. They also directly blame NIST for their CVE description.
From Netflow I can see active victims - including systems owned by the US federal government - so strap in to see where this goes.
Steve Scott
in reply to Kevin Beaumont • • •this feels very much like a corp Comms team in crisis management mode, thinking obfuscation will make the situation better. It's a natural reaction, but not one that helps mitigation.
A brutally honest 'we screwed up, here is what we can share without making the situation worse' along with some willingness to offer hotfixes rather than full releases is the better path forward.
On the plus side, I did get to read their latest Tolly report for lolz
Wouter Hindriks
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Some CitrixBleed2 IOCs; this is a cluster of what appears to be China going brrr, going on for weeks.
38.154.237.100
38.54.59.96
#threatintel
Kevin Beaumont
in reply to Kevin Beaumont • • •github.com/GossiTheDog/scannin…
scanning/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt at main · GossiTheDog/scanning
GitHubKevin Beaumont
in reply to Kevin Beaumont • • •CISA is giving all civilian agencies 1 day to remediate CitrixBleed 2. It is encouraging all other organisations in the US to do this too.
therecord.media/cisa-orders-ag…
CISA orders agencies to immediately patch Citrix Bleed 2, saying bug poses ‘unacceptable risk’
Jonathan Greig (The Record)Kevin Beaumont
in reply to Kevin Beaumont • • •Set up lab of Netscalers just now & owned them.
Two learnings:
1) the default logging isn’t enough to know if you’ve been exploited. So if you’re wondering where the victims are, they don’t know they’re victims as checks will come back clean unless they increased logging before. FW logs w/ IOCs fall back option.
2) the Citrix instructions post patch to clear sessions don’t include the correct session types - ICA will just reconnect as you (threat actor) still have the valid NSC_AAAC cookie.
Kevin Beaumont
in reply to Kevin Beaumont • • •M Schommer
in reply to Kevin Beaumont • • •Right script, different CVE? 😁
Chad Brigance
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Updated CitrixBleed 2 scan results: github.com/GossiTheDog/scannin…
It's down from 24% unpatched to 17% unpatched
The results are partial still, the actual numbers still vuln will be higher.
scanning/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt at main · GossiTheDog/scanning
GitHubKevin Beaumont
in reply to Kevin Beaumont • • •Imperva WAF have added detection and blocking for CitrixBleed 2 this weekend.
They see it being widely sprayed across the internet today - almost 12 million requests, log4shell level.
The only major vendor I’ve seen who hasn’t added a WAF rule is Citrix - they sell a WAF upsell module for Netscaler, but failed to add detection for their own vulnerability.
System Adminihater
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Updated Citrix scan results will go on Github in a few days, I've found a bug in the scan results setup which should add ~33% more hosts when fixed.
Spoiler:
Kevin Beaumont
in reply to Kevin Beaumont • • •CitrixBleed 2 update.
- Citrix have finally, quietly admitted exploitation in the wild -- by not commenting to press and then editing an old blog post and not mentioning it on their security update page.
- Orgs have been under attack from threat actors in Russia and China since June
- It's now under spray and pray, wide exploitation attempts.
doublepulsar.com/citrixbleed-2…
CitrixBleed 2 situation update — everybody already got owned
Kevin Beaumont (DoublePulsar)Christoffer S.
in reply to Kevin Beaumont • • •Perhaps time to refer to it using the more appropriately descriptive word... Wild.
This vulnerability is WILDLY EXPLOITED.
As a bonus "exploited in the wild" can be changed to "wild exploitation observed".
Kevin Beaumont
in reply to Kevin Beaumont • • •Citrix Netscaler internet scan still running, it's found another 1k vulnerable instances so far - will probably update Github later today or tomorrow morning.
It looks like we're back up to 18% of boxes being still vulnerable when the new list is out. It looks like a lot of orgs are patching from my list.
Alan Miller 🇺🇦
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •New CitrixBleed 2 scan data:
raw.githubusercontent.com/Goss…
+7000 extra hosts added this round, host list is so large you need to use the raw view to see it.
Next set of data publication likely Friday, a month since the patch became available.
3832 orgs/hosts still unpatched.
OracleOfApollo
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Exploitation of CitrixBleed 2 (CVE-2025-5777) Began Before PoC Was Public
www.greynoise.ioKevin Beaumont
in reply to Kevin Beaumont • • •I’m fairly certain the threat actor is Chinese and they reversed the patch to make the exploit.
Citrix continue to be MIA. They still have no detection guidance for customers, and haven’t told customers the extent of the issue.
#CitrixBleed2
Kevin Beaumont
in reply to Kevin Beaumont • • •With the #CitrixBleed2 patch data I publish it's possible to view the history on Github for each new scan and see when hosts change from vuln to patched.
It's proving incredibly effective at getting orgs to patch. I tried private notifications via HackerOne and such for CitixBleed1 in 2023 and it took months to get orgs to patch. Putting the data public brings accountability for orgs who later get breached - so there's a rush to patch.
It's definitely interesting and may need a scale out.
Vickie Gray 🍁
in reply to Kevin Beaumont • • •JP
in reply to Kevin Beaumont • • •Dick Telder
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Citrix have a blog out about hunting for #CitrixBleed2
netscaler.com/blog/news/evalua…
It's what was in my earlier blog - look for invalid characters in the username field and duplicate sessions with different IPs
Evaluating NetScaler logs for indicators of attempted exploitation of CVE-2025-5777
Anil Shetty (NetScaler Blog)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •This bit is still incomplete in the patching instructions btw - if it's a HA pair you need to additionally reset other session types or you're still vulnerable to session hijack after patching.
I'm still trying to get Citrix to update the instructions.
Kevin Beaumont
in reply to Kevin Beaumont • • •The Dutch Public Prosecution Office have shut down their Citrix Netscaler and removed all internet access, Dutch media speculating CitrixBleed 2 exploitation.
techzine.eu/news/security/1331…
Justice minister David van Weel told MPs in a briefing that it appears the weakness had been used by third parties to access the department systems.
The justice ministry said the department had applied Citrix’s recommended patches, but these failed to fully eliminate the flaw. dutchnews.nl/2025/07/prosecuti…
Dutch Department of Justice offline after Citrix vulnerability - Techzine Global
Berry Zwets (Techzine)Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •nemo™ 🇺🇦
in reply to Kevin Beaumont • • •meriksson
in reply to Kevin Beaumont • • •NosirrahSec 🏴☠️ guillotine enthusiast
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Update on the situation at The Hague and the shutdown of the Dutch Public Prosecution Service internet access, NCSC Netherlands issued an update today saying all orgs should hunt for CitrixBleed 2 activity, citing my blog.
They also advise clearing all session types, not just the ones Citrix say in their security advisory.
advisories.ncsc.nl/advisory?id…
NCSC Advisories
advisories.ncsc.nljb
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •Updated #CitrixBleed2 scans github.com/GossiTheDog/scannin…
Fields - IP, SSL certification hostnames, Netscaler firmware, if vulnerable to CVE-2025-5777
I've had a few orgs contest that they're not vulnerable and the scan is wrong. I've assisted each org, and in each case they've been wrong - they'd patched the wrong Netscaler, the passive HA node etc.
scanning/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt at main · GossiTheDog/scanning
GitHubKevin Beaumont
in reply to Kevin Beaumont • • •The Shadowserver Foundation
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •I might move the Dutch Public Prosecution Service (OM) Citrix Netscaler incident out to a different thread, but the latest update an hour ago from local media is that they are still without internet and remote access, and they're working on several alternatives to continue criminal trials.
I expect we're going to see a wave of Netscaler incidents over the coming months, although how many will publicly disclose is another issue - the Dutch are culturally transparent.
nltimes.nl/2025/07/18/dutch-pr…
Dutch prosecutor disconnects internal systems from internet over vulnerability
NL TimesKevin Beaumont
in reply to Kevin Beaumont • • •Vulnerabilities impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2025-5349, CVE-2025-5777 and CVE-2025-6543 – Update 2 - Canadian Centre for Cyber Security
Canadian Centre for Cyber Securityseasaltspray
in reply to Kevin Beaumont • • •Looks like Arctic Wolf referenced your info as well! arcticwolf.com/resources/blog/…
Meanwhile still have yet to hear from Citrix…😭
Updates on Actively Exploited Information Disclosure Vulnerability “Citrix Bleed 2” in Citrix NetScaler ADC and Gateway I Arctic Wolf
Andres Ramos (Arctic Wolf Networks)SensibleOtter
in reply to Kevin Beaumont • • •Referenced Double Pulsar article.
You fuckin’ legend!!
Kevin Beaumont
in reply to Kevin Beaumont • • •Openbaar Ministerie mogelijk nog weken afgesloten van internet
NOS NieuwsJoão Tiago Rebelo (NAFO J-121)
in reply to Kevin Beaumont • • •Public Prosecution Service may be closed off from the internet for weeks
The Public Prosecution Service (OM) expects that it may be closed off from the internet for weeks to come. Last week, the Public Prosecution Service disconnected its systems after suspicions of a hack.
This means that Public Prosecution Service employees cannot be reached by email and cannot log in remotely. That already had consequences for lawsuits last week. Public prosecutors could not look into the files, so the papers had to be printed.
Officers can now consult a number of files, but do not work in them, as spokesperson said. "They can read the files, but not edit or print them, for example." The spokesperson could not say whether this will affect lawsuits scheduled for today or the coming weeks.
Aristotelis Tzafalias
in reply to Kevin Beaumont • • •Aristotelis Tzafalias (@aristot73@infosec.exchange)
Infosec ExchangeKevin Beaumont
in reply to Kevin Beaumont • • •There’s a bit more in situation at the OM on Netscaler here: volkskrant.nl/binnenland/openb…
The OM say they patched quickly (and my scan data backs this up - they patched around June 24th) however it appears somebody got in (or took a session cookie) before patching took place and now they’re trying to contain the situation.
Openbaar Ministerie mogelijk nog weken afgesloten van internet, probeert impact op rechtszaken te beperken
Daan de Vries (DPG Media)Kevin Beaumont
in reply to Kevin Beaumont • • •Fritz Adalis
in reply to Kevin Beaumont • • •Christoffer S.
in reply to Kevin Beaumont • • •You'll be remembered for the yolo cowboy styled action advice regardless.
But I would be more impressed if you leveled up towards Notepad and started doing ASCII art instead.
Kevin Beaumont
in reply to Kevin Beaumont • • •I think this thread exposes something about the cybersecurity industry and org posture btw - it almost all runs on Windows and EDR telemetry, hence why there’s little info on this from vendors (Netscaler is closed box appliance - they’re flying blind) and why orgs aren’t seeing anything, they don’t know how without vendors.
I keep contacting orgs and they have no idea they are compromised or how to investigate.
#CitrixBleed2
Alan Miller 🇺🇦
in reply to Kevin Beaumont • • •tehfishman
in reply to Kevin Beaumont • • •colingilroymcguire
in reply to Kevin Beaumont • • •fuzzyfuzzyfungus
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •The Dutch Public Prosecution Service #CitrixBleed2 incident rolls on - NRC report on an email from the Director of their IT service, where they say “It is clear that it’s a massive and dramatic incident”.
nrc.nl/nieuws/2025/07/22/digit…
Digitale werkomgeving OM inderdaad gehackt, onderzoek moet uitwijzen welke informatie is gestolen
Rik Wassens (NRC)Anthropy
in reply to Kevin Beaumont • • •Kevin Beaumont
in reply to Kevin Beaumont • • •The Dutch Public Prosecution Service Citrix Netscaler incident is rumbling on. They are working on service recovery.
databreachtoday.com/dutch-pros…
#CitrixBleed2
Dutch Prosecutors Recover From Suspected Russian Hack
www.databreachtoday.com⠠⠵ avuko
in reply to Kevin Beaumont • • •Also see (Dutch) ncsc.nl/actueel/nieuws/2025/07…
The linked github.com/NCSC-NL/citrix-2025 page contains a detection script orgs can run on their Netscalers (which were) vulnerable to #CVE20256543
And if you find iffy/weird stuff, please let your national CSIRT/CERT/NCSC/WhatsItsName know.
GitHub - NCSC-NL/citrix-2025
GitHubKevin Beaumont
in reply to Kevin Beaumont • • •I've updated my CitrixBleed2 scan results for the first time in two weeks (I've been on holiday).
raw.githubusercontent.com/Goss…
2637 orgs still vuln
Cesca_w
in reply to Kevin Beaumont • • •Advanced Persistent Teapot
in reply to Kevin Beaumont • • •James Tinmouth
in reply to Kevin Beaumont • • •Alun Jones
in reply to Kevin Beaumont • • •gunstick
in reply to Kevin Beaumont • • •Koos van den Hout
in reply to Kevin Beaumont • • •your name was in our newspaper on saturday. Electronic version volkskrant.nl/binnenland/inter…
Link in online article goes to 'CitrixBleed 2 situation update — everybody already got owned'
Interne systemen Openbaar Ministerie offline vanwege gat in softwarebeveiliging
Jasper Daams (DPG Media)Maarten W
in reply to Kevin Beaumont • • •Openbaar Ministerie mogelijk nog weken afgesloten van internet
NOS NieuwsN Walker
in reply to Kevin Beaumont • • •Alex Hoffmann
in reply to Kevin Beaumont • • •Alex Savage
in reply to Kevin Beaumont • • •vampirdaddy
in reply to Kevin Beaumont • • •fuzzyfuzzyfungus
in reply to Kevin Beaumont • • •Joshua Small
in reply to Kevin Beaumont • • •CyberFrog
in reply to Kevin Beaumont • • •David Penington
in reply to Kevin Beaumont • • •Jacob Pedersen
in reply to Kevin Beaumont • • •Darses
in reply to Kevin Beaumont • • •Mr_K
in reply to Kevin Beaumont • • •fuzzyfuzzyfungus
in reply to Kevin Beaumont • • •The great thing about "as far as I know"/"not as far as I know" class statements, unlike almost all other types of statements, is that you can increase their accuracy through the easy work of knowing less rather than the arduous task of knowing more.
It's epistemology's any% speedrun strat.
Long Shot
in reply to Kevin Beaumont • • •Phil
in reply to Kevin Beaumont • • •Jérôme Meyer
in reply to Kevin Beaumont • • •I had a look at network traffic from today and some of them are proxy exit nodes; some do broad IoT scanning.
Two of them really stick out as they seem to exclusively target Citrix endpoints: 78.128.113.30 and 38.54.59.96
JJ
in reply to Kevin Beaumont • • •Thanks so much for this info and for all the info provided prior to this. I was able to confirm with our Citrix team two weeks ago that we were patched already, and I'm just getting emails this week from higher ups to look into this, so I'm very much ahead of the game.
Aside from social media, is there anywhere you suggest keeping an eye on daily for vulnerability info?
Lowlands
in reply to Kevin Beaumont • • •meriksson
in reply to Kevin Beaumont • • •husjon.dev
in reply to Kevin Beaumont • • •(original: fosstodon.org/@husjon/11130838…)
husjon.dev (@husjon@fosstodon.org)
FosstodonLatte macchiato
in reply to Kevin Beaumont • • •fuzzyfuzzyfungus
in reply to Latte macchiato • • •@privateger It's honestly darkly impressive. ICA vs. RDP was a pretty compelling beatdown at one time; but that was a no, of course I'm not that old, time ago; and basically everything they've touched since is a matter of indifference or distaste.
Normally I'd jump straight to blaming the private equity knackers; but in this case I can see why they were headed to the bone mill.
Edge 🇨🇦🇲🇽🇺🇦🏳️🌈
in reply to Kevin Beaumont • • •JP
in reply to Kevin Beaumont • • •Oriel Jutty
in reply to Kevin Beaumont • • •The hostnames field can be properly CSV'd by something like
perl -pe 's/,/,"/; s/(,[^,]*,[^,]*$)/"$1/'
(Assuming a unix-ish shell. With cmd.exe you probably have to turn the inner
"
into^"
and the outer'
into"
.)meriksson
in reply to Kevin Beaumont • • •Jason Haar
in reply to Kevin Beaumont • • •Ryosuke Eto
in reply to Kevin Beaumont • • •Martin Boller
in reply to Kevin Beaumont • • •Manuel Tejera
in reply to Kevin Beaumont • • •fuzzyfuzzyfungus
in reply to Kevin Beaumont • • •Bruce Heerssen
in reply to Kevin Beaumont • • •@CyberLeech
Doh!
Kevin Bowen 🐭
in reply to Kevin Beaumont • • •Thanks!
#RSS alert feed: digital.nhs.uk/feed/cyber-aler…
Other #NHS feeds: digital.nhs.uk/about-nhs-digit…
#Security
MemoryLeech
in reply to Kevin Beaumont • • •Bruce Heerssen
in reply to Kevin Beaumont • • •Luke Sheldrick // an0key 🤖
in reply to Kevin Beaumont • • •MemoryLeech
Unknown parent • • •MemoryLeech
Unknown parent • • •I was sent this for reference:
reliaquest.com/blog/threat-spo…
Threat Spotlight: CVE-2025-5777: Citrix Bleed 2 Opens Old Wounds - ReliaQuest
ReliaQuestcR0w
Unknown parent • • •I also like
Cloud Software Group does not provide forensic analysis; however, customers can contact Citrix Customer Support to get access to IoCs.
And
microwavetacos
in reply to cR0w • • •microwavetacos
Unknown parent • • •support.citrix.com/support-hom…
Loading...
support.citrix.comFabrice Roux
Unknown parent • • •Lowlands
Unknown parent • • •Jérôme Meyer
Unknown parent • • •tehfishman
Unknown parent • • •Fritz Adalis
Unknown parent • • •RootWyrm 🇺🇦
Unknown parent • • •