Welcome to Friendica.Eskimo.Com
Home of Censorship Free Hosting

E-mail, Web Hosting, Linux Shell Accounts terminal or full remote desktops.
Sign Up For A Free Trial Here
Please tell your friends about federated social media site that speaks several fediverse protocols thus serving as a hub uniting them, hubzilla.eskimo.com, also check out friendica.eskimo.com, federated macroblogging social media site, mastodon.eskimo.com a federated microblogging site, and yacy.eskimo.com an uncensored federated search engine. All Free!
Basic Facts about GPUs
Link: damek.github.io/random/basic-f…
Discussion: news.ycombinator.com/item?id=4…
In the face of war and violence that disrupts and even extinguishes the lives of people, paradoxically I look for humanity in the birds I see every day. Sometimes it’s in the ingenuity of a jay, or in the apparent playfulness of a hummingbird. It’s easy to forget that to survive, a hummingbird needs to find food every ten to fifteen minutes. A reminder that while we’re trying our best just to survive, there’s still time to pay attention to other things, even a brief moment of relief.
mas.to/@Jgbird/114739000968562…
Jerome G (@Jgbird@mas.to)
Attached: 1 image In the face of war and violence that disrupts and even extinguishes the lives of people, paradoxically I look for humanity in the birds I see every day.mas.to
like this
pernilla, Samuel Smith, John Hummel, Tony Langmach, Dan d'Auge, Khurram Wadee and whuffo like this.
Function Health update:
I think I have all of the bookmarkers in from both sets of tests.
Turns out I have some work to do, and my general feeling that my bad diet, lack of sleep, stressed out life style and self-tyrannical attitude of just working harder at things is killing me.
And now I can see the evidence in my blood work.
I have a lot of work to do.
The app and process however have been great. And while it’s hard to be confronted with this info, it’s probably news I needed.
1/2
Israeli Drone Strike Kills Three in Southern Lebanon amid Ongoing Violations
TEHRAN (Tasnim) – In a fresh act of aggression, the Israeli regime carried out a drone strike targeting a civilian vehicle in southern Lebanon, resulting in the martyrdom of three individuals, according to Lebanon’s Ministry of Health.Tasnim News Agency
I could use some troubleshooting help for a Linux laptop
I was helping my friend install Mint on his laptop, it all went well and the installation finished, but the driver for the wi-fi module wouldn't turn on properly, or something. I assumed this was due to secure boot messing with the drivers, so I tried to disable it in the BIOS (it's an older laptop, no UEFI). But I have spent the last 3 hours trying and failing to open BIOS, and even GRUB. Nothing I try seems to work.
I tried all the function keys, as well as delete, escape, and enter, and the only thing I found is that F12 opens a boot options menu.
I tried holding and mashing shift throughout the boot procedure to get to GRUB.
I tried using the novo button (it's a Lenovo laptop) which did open a new menu allowing me to select a "BIOS options" button, but it just rebooted after showing me a few rolling lines of text.
I tried plugging in the installation media I used before, which does take me to it's GRUB, but choosing the UEFI options option there just causes a reboot.
I tried disconnecting the battery and the CMOS battery and waiting for 30 seconds in hopes of disabling fast boot, which didn't work.
I edited GRUB config files to change the timeout to 10 and the type away from hidden, which didn't do anything.
I disconnected the disk in hopes of it defaulting to the BIOS, which works for some laptops.
No option worked. I just cannot access BIOS or GRUB. I really don't know where to go next, and could use some help.
Broadcom chipsets are notoriously lacking in any sort of open driver operation or collaboration. I'd honestly just replace it with a $25 Intel chipset, but if you want to fight through it: help.ubuntu.com/community/Wifi…
You'll notice that your specific chipset isn't mentioned, but it might be different now, so I'd double check.
Does that mean that even with secure boot turned off I would have no more luck?
Also, USB dongles should work though, right?
Secure Boot has nothing to do with, Broadcom keeps their drivers completely closed, and just doesn't support this chipset anywhere except Windows.
USB dongles would work fine, but probably cost more than an internal module. It sounded from your post like you're fine with opening the machine and navigating the internals, so swapping the WiFi module would only take 5m.
Just stay away from Broadcom in general. Intel has the best performing WiFi chipsets at current, but Atheros and Realtek work just fine as well.
Otherwise agree, but I did run into pain with Realtek on my Thinkpad - the module would sometimes crash and disconnect entirely (on a PCI-e level) from the system.
I did manage to find a fix, but I would not recommend Realtek to someone.
You're right that it was power-related - one of the options was an ASPM modification - but the issue seemed to be common to this chipset accross laptop brands.
The fix I used came from this post: bbs.archlinux.org/viewtopic.ph…
My machine was a Thinkpad, but this article was also talking about problems on HP, Asus, etcetera. I think the 8852BE might just be cursed
To be fair, I was using an E series Thinkpad, but in my defense, the E series seems to have improved a lot in the past few years - this was luckily the only issue I've had. I've had much more difficult times with Linux on other laptops. Heck, even my desktop had more setup than this when I was first starting out, though it was because I was using a Broadcom Wi-Fi card, as I also dual-booted with a Hackintosh and macOS only supports Broadcom Wi-Fi chipsets.
Yeah, if you want to understand the dual-edged sword of Broadcom, just go look at the hardware support matrices of open source router platforms. NONE will support Broadcom, because they want to nab licensing for their drivers. You can't install a working ddrt, tomato, opensense, openwrt...etc on ANY Broadcom hardware platforms, but the manufacturers using them still are many.
It's finally starting to subside, but there was a decade where they ruled the wireless space. They refuse to capitulate on the open drivers issue though, it's insane.
Check the section here that details disabling power management for the WiFi device: easylinuxtipsproject.blogspot.…
You also need to make sure you disable the internal card as well.
Speed Up your Mint!
Easy tips, tweaks and tricks for Linux Mint and Ubuntu, both for beginners and for advanced users. Complete starter's guide with simple how-to's.easylinuxtipsproject.blogspot.com
If you haven't solved this yet I would try using the novo button again with your camera ready to get the text and see if it's useful. Beyond that, I'm not sure how to get into the bios. Assuming it still boots and doesn't have a soldered wifi card you could always get an AX210 for fairly cheap off of ebay. Should have good linux support.
Edit: Nvm the card suggestion, I see your comment on that.
systemctl reboot --firmware-setup
should tell your laptop to reboot into the UEFI ui
-Κλάουζεβιτς
Gaza: Over 400 Palestinians killed around private aid hubs, UN rights office says
At least 410 Palestinians have been killed by the Israeli military while trying to fetch from controversial new aid hubs in Gaza – a likely war crime – the UN human rights office, OHCHR, said on Tuesday.www.globalissues.org
The United States is at almost $1 Trillion Dollars — This is incredible! Will be discussing it soon with the Members of NATO.
Sadiq Khan joins growing Labour rebellion against disability benefit cuts
Exclusive: London mayor is most senior party figure to call for plans to be dropped, as Starmer vows to press aheadAletha Adu (The Guardian)
Here’s How the Palestine Action Ban Could Affect You
Meeting with even two other people and expressing support for the protest group could land you in prison for up to 14 years if Yvette Cooper's proscription of it goes into effect. Simon Childs on what the ban could mean for you.Novara Media
Labour Rebellion Snowballs Against Disability Cuts Bill
Opposition to Labour's disability benefit cuts is snowballing. More than 120 Labour MPs have signed — and the pressure could topple the bill.Mike Sivier (Vox Political)
Israel breaches Trump ‘ceasefire’ with Iran within minutes (of course – just as it did daily in Gaza)
Zionist regime makes fool of Trump, to the surprise of no one, and says it plans to continue Israel breached US president Donald Trump’s claimed ‘agreement’ for a ceasefire betwee…SKWAWKBOX
Finding a 27-year-old easter egg in the Power Mac G3 ROM
Link: downtowndougbrown.com/2025/06/…
Discussion: news.ycombinator.com/item?id=4…
Israel Expands Al Jazeera Ban To Foreign Broadcasters
The following article was made possible by paid subscribers of The Dissenter. Become a subscriber and support journalism that defends press freedom.Kevin Gosztola (The Dissenter)
Good grief..no wonder the Tories are done for..
independent.co.uk/news/uk/home…
Ex-Tory councillor banned after saying white men should have black slaves
Andrew Edwards had initially claimed the voice recording was a ‘deep fake’Holly Evans (The Independent)

Hacked Denver Traffic Boards Tell Drivers "Bring the Heat Fuck ICE"
"I know Denver is holding firm, but this was another f-word altogether."Bennito L. Kelty (Denver Westword)
like this
John Hummel and whuffo like this.
N. E. Felibata 👽 reshared this.
like this
Andrew Pam, stefani banerian, Michael Fenichel and hummingbird like this.
like this
John Hummel and whuffo like this.
N. E. Felibata 👽 reshared this.
pernilla likes this.
N. E. Felibata 👽 reshared this.
dorumon likes this.
nypost.com/2025/06/15/opinion/…
static-assets-1.truthsocial.co…
Nearly 1 million illegal immigrants have 'self-deported' under Trump, which has led to higher wages
DHS can’t arrest and deport 15.4 million illegal aliens, but if it simply enforces the law, many aliens will get the message and leave on their own — as hundreds of thousands apparently already hav…Andrew Arthur (New York Post)
OIC Forms Ministerial Working Group To Respond to Attacks on Iran
The Foreign Ministers of the Organization of Islamic Cooperation (OIC), with 57 member nations, the second largest international organization in the world after the United Nations, met in Istanbul, Türkiye over June 21-22 this past weekend.Gretchen Small (EIR News)
Dangerous Show: America on Stage
#cartoon by Muzaffar #Yulchiboev
like this
John Hummel and whuffo like this.
like this
Benedikt Bauer, Tony Langmach, Aladár Mézga, Torsten Appelhagen, Elias Schwerdtfeger and whuffo like this.
like this
Kenny Chaffin, suseoddvibes, John Hummel, whuffo and samuel like this.
like this
Kenny Chaffin, suseoddvibes, Stefan H., born at 322 ppmv and whuffo like this.
Heute war es schon das zweite Mal, dass am Klavier im Bahnhof Südkreuz ein Mann saß, vom Aussehen her, Jacke, Hose, Füße ohne Socken in fragwürdigen Schuhen, vom Aussehen her einer auf der Straße. Und zum zweiten Mal saß er da an dem Klavier und spielte mit einer wunderschönen Eleganz und Leichtigkeit #Chopin. Als ich reinkam in die Halle, begrüßte mich der Minutenwalzer, und danach kam der da:Das sind so die Momente in der Stadt.
Chopin - Waltz Op. 64 No. 2 (Rubinstein)
Waltz No. 2 from Waltzes, Op. 64Arthur Rubinstein, pianoWaltz in C-sharp minor is the second work of Chopin's opus 64 and the companion to the Minute Waltz (...YouTube
like this
Stefan H., born at 322 ppmv, Aladár Mézga, Elias Schwerdtfeger and whuffo like this.
Quand le patronat dépossède les ouvriers de leur savoir-faire ( Taylor ) - Danièle Linhart - À gauche
♲ Jost Maurin - 2025-06-24 06:31:14 GMT
Bauernverband will weniger #Mindestlohn für ausländische #Erntehelfer als für Deutsche. Landwirte sollten Saisonarbeitern aus dem europäischen Ausland nur 80 % des normalen Mindestlohns zahlen müssen, so die Unternehmerorganisation. taz.de/Mindestlohn-fuer-Ernteh… #Landwirtschaft
N. E. Felibata 👽 reshared this.
N. E. Felibata 👽 likes this.
like this
M-J-Revenge ✮☮★━NOK 4 U 2━★☮✮, billyidle, Aladár Mézga, HU Art Sound (2) and Jochen bei Geraspora* like this.
givehim15.com/post/june-24-202…
GH15 prayer for June 24, 2025
Order Into Chaos, Light Into Darkness
Dutch Sheets
Order Into Chaos, Light Into Darkness | Give Him 15: Daily Prayer with Dutch | June 24, 2025
The set is now complete. Order your copies today! https://dutchsheets.mybigcommerce.com/Learn more about Give Him Fifteen here:Website: https://www.givehim15...YouTube
Both countries are winners.
whuffo likes this.
Jony and Sam are both suddenly real quiet; wonder how their honeymoon is going
Oh
pivot-to-ai.com/2025/06/23/iyo…
*Nelson laugh*
h/t @davidgerard
Iyo vs. Io — OpenAI and Jony Ive get sued
In May, legendary Apple designer Jony Ive hooked up with OpenAI to announce an unspecified gadget. [WSJ, archive] To promote this complete vaporware, OpenAI released a video of Sam Altman and Ive b…Pivot to AI
#TheArgyleSweater by #ScottHilburn on GoComics
gocomics.com/theargylesweater/…
The Argyle Sweater by Scott Hilburn for June 24, 2025 | GoComics
Read The Argyle Sweater—a comic strip by creator Scott Hilburn—for today, June 24, 2025, and check out other great comics, too!www.gocomics.com
like this
Susan ✶✶✶✶, Andrew Pam, Tony Langmach, John Hummel, HU Art Sound (2) and whuffo like this.
reshared this
billyidle and N. E. Felibata 👽 reshared this.
Stephen McNallen, the founder of the Asatru movement here in the United States, produced a series of 17 different presentations and interviews with Odinist luminaries a few years ago called Gods, Folk and Destiny.
TalieVision maintains the complete list:
bitchute.com/playlist/n4lYXpZJ…
They're both informative and entertaining. I wish he had done more.
TalieVision is television for a Whiter future. It's a growing archive of almost 600 pro-White and White-friendly (mostly) full-length videos, featuring news, interviews, speeches, lectures, documentary films, concerts & other live performances, movies, and much more.
Already 92F here and it's not yet 11AM.
Fuuuuuuuuuuuuck
I'm dreading the 50 yard walk to my shop.
Chinese researchers have released QiMeng, the world’s 1st fully automated processor chip design system, making AI-designed chips a reality.
#china #technology #ai
QiMeng: Fully Automated Hardware and Software Design for Processor Chip
Processor chip design technology serves as a key frontier driving breakthroughs in computer science and related fields.arXiv.org
Want to join the B-2 bomber team? Here’s what it’ll take
defensenews.com/smr/global-str…
civil-war.net/how-hard-is-it-t…
My guess is that the average B-2 pilot is not 20 yrs old. Just saying.
Want to join the B-2 bomber team? Here’s what it’ll take
B-2 wings are increasingly bringing on pilots directly from Air Education and Training Command — and they have to keep training and developing their skills.Stephen Losey (Defense News)
UptownGirl reshared this.
UptownGirl reshared this.
foxnews.com/politics/trump-nom…
static-assets-1.truthsocial.co…
Trump nominated for Nobel Peace Prize over Iran-Israel ceasefire deal
Rep. Buddy Carter nominated President Donald Trump for the Nobel Peace Prize, citing his role in brokering a ceasefire between Israel and Iran and preventing Iran's nuclear ambitions.Elizabeth Elkind (Fox News)
Funeral of martyrs of Israeli aggression against Iran
TEHRAN, Jun. 23 (MNA) – The funeral ceremony of a number of martyrs killed as a result of Israeli aggression against Iran was held at Behesht-e-Zahra Cemetery late on Sunday.Morteza Ahmadi Al Hashem (Mehr News Agency)
Trump nominated for Nobel Peace Prize over Iran-Israel ceasefire deal
Rep. Buddy Carter nominated President Donald Trump for the Nobel Peace Prize, citing his role in brokering a ceasefire between Israel and Iran and preventing Iran's nuclear ambitions.Elizabeth Elkind (Fox News)
Israel has subverted our government and embedded themselves 100x worse than they did in Iran, yet people want you to talk about literally ANYTHING else.
“Pay no attention to the man behind the curtain!”
Nick Fuentes on his America First Show on Rumble last night
#linux #update #release #foss #nanovllm #llm #server
GitHub - GeeeekExplorer/nano-vllm: Nano vLLM
Nano vLLM. Contribute to GeeeekExplorer/nano-vllm development by creating an account on GitHub.GitHub
@redwhitebluedude
Truly sad.
I'm reading that the HMS Queen Elizabeth & HMS Prince of Wales turned tail & fled towards the Suez Canal afore Operation Midnight Hammer began in full.
Spatooey!
@redwhitebluedude @redwhitebluedude @spinmaven @Stefanie @Donjanusgjrdrm
🚨 BREAKING:
Trump on Iran-Israel:
“We basically have two countries that have been fighting so long and so hard that they don’t know what the f*ck they’re doing”
This is what I voted for.
😎 🇺🇸 💪
@redwhitebluedude @spinmaven @Donjanusgjrdrm
It seems to be real.
Israel knows exactly what they're doing, so for that reason I didn't like what he said. But I trust Trump, so am accepting there was a method to the madness.
> Israel knows exactly what they're doing
Fine, but don't drag the US into it.
#linux #update #release #foss #terminal #shartship #prompt
Starship: Cross-Shell Prompt
Starship is the minimal, blazing fast, and extremely customizable prompt for any shell! Shows the information you need, while staying sleek and minimal.starship.rs
That's also pretty high on the f scale there, bub. (All psycho analytics are for the purpose of political, soft warfare, to keep the right wing illegal, perfected in the Soviet Union, brought to us by the escapees, and instituted by Ewan Cameron and mk ultra docs)
Anyone wonder when our lives will ever become "supposedly" normal again. Whatever normal we thought we were living in? Just curious.
Anyone wonder if they will live to see that day? Just curious.
I guess the same as the rest of us- read the Bible, live like our grandparents did and be mostly fine.
Common parasite may be affecting your brain without symptoms - Earth.com
Toxoplasma gondii, a parasite, is silently affects brain signaling - possibly altering neural balance even in people without symptoms.Rodielon Putol (Earth.com)
A one-and-a-half-year-old Palestinian baby was shot by Israeli forces near a Gaza Humanitarian Foundation (GHF) aid site while in her mother's arms.
The GHF has become a death trap for tens of thousands of starving Palestinians, with hundreds shot dead while trying to reach aid distribution points.
#Gaza #SaveGaza #StopIsrael #SanctionIsrael #BDS #starvation #warcrime
#palestine #Israel #Politics #Genocide #PeaceNow #StopTheWar #CeasefireNow @palestine @israel
SourceHut moves business operations from US to Europe
Link: lists.sr.ht/~sircmpwn/sr.ht-de…
Discussion: news.ycombinator.com/item?id=4…
Interview: Lessons from China's Ascent - Friends of Socialist China
Embedded below is an interview with Friends of Socialist China co-editor Carlos Martinez on the CGTN Radio podcast The Bridge, hosted by Jason Smith.Friends of Socialist China
BREAKING: Hospital sources in Gaza report 71 people killed in a series of Israeli massacres in the Gaza Strip since dawn today, including 50 aid seekers.
#starvation #FoodAsWeapon #Gaza #SaveGaza #StopIsrael #SanctionIsrael #BDS
#palestine #Israel #Politics #Genocide #PeaceNow #StopTheWar #CeasefireNow @palestine@a.gup.pe @israel @palestine@lemmy.ml
FDA, CDC advisers say lost pregnancies higher than expected following early mRNA vaccination
freerepublic.com/focus/f-chat/…
Comments from below the link above, check them all:
"They should sue the government and the drug companies..."
justthenews.com/politics-polic…
FDA, CDC advisers say lost pregnancies higher than expected following early mRNA vaccination
Lower-than-expected pregnancy loss following flu vaccine, however. HHS wants 18-month hold on FOIA litigation related to vaccines including for COVID, litigant's lawyer says.Greg Piper (Just The News)
Citrix Netscaler customers - keep calm and patch CVE-2025-5777 from Tuesday.
It allows unauth memory reads, has similarities to CitrixBleed (CVE-2023-4966) as may allow session token theft.
An update on CVE-2025-5777, explaining why orgs should identify systems and patch.
doublepulsar.com/citrixbleed-2…
CitrixBleed 2: Electric Boogaloo — CVE-2025–5777 - DoublePulsar
Remember CitrixBleed, the vulnerability where a simple HTTP request would dump memory, revealing session tokens? CVE-2023–4966 You may have missed it, as the original CVE on 17th June 2025 referred…Kevin Beaumont (DoublePulsar)
Don't panic, but it's only a matter of time before critical 'CitrixBleed 2' is under attack
: Why are you even reading this story? Patch now!Jessica Lyons (The Register)
I hope nobody is still misled by the pre-correction CVE into thinking that this is just a 'mitigate by controlling access to management interface like you should probably do anyway' thing that they can just defer to lower priority maintenance.
Relatively severe either way; but that teensy little correction was not loud enough for how dramatically an otherwise plausible mitigation turned out to be useless.
Citrix on this one:
"At this time, there have been no reports or indications that the vulnerabilities described in CTX693420 (CVE-2025-5349 and CVE-2025-5777) are being actively exploited in the wild. However, due to the critical severity of these issues (CVSS scores of 8.7 and 9.3), We strongly recommends that affected customers apply the updated patches immediately to mitigate any potential risks."
NHS Digital's cyber alert database has been updated too. digital.nhs.uk/cyber-alerts/20…
I highly recommend bookmarking this site for the alerts, they're really good at filtering noise:
E.g. if you select 'high' category, there's only one a month on average
Citrix just published a new Bulletin for CVE-2025-6543 (CVSS 9.2)
Threat Spotlight: CVE-2025-5777: Citrix Bleed 2 Opens Old Wounds - ReliaQuest
CVE-2025-5777 poses serious threats to Citrix Netscaler devices—discover recommended actions to block exploitation and protect accounts from Citrix Bleed 2.ReliaQuest
NetScaler Critical Security Updates for CVE-2025-6543 and CVE-2025-5777
Over the past two weeks, Cloud Software Group has released builds to address CVE-2025-6543 and CVE 2025-5777, which affect NetScaler ADC and NetScaler Gateway if they are configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR an …Anil Shetty (NetScaler Blog)
If you see this GitHub PoC for CVE-2025-5777 doing the rounds:
github.com/mingshenhk/CitrixBl…
It’s not for CVE-2025-5777. It’s AI generated. The links in the README still have ChatGPT UTM sources.
The PoC itself is for a vuln addressed in 2023 - ChatGPT has hallucinated (made up) the cause of the vuln using an old BishopFox write up of the other vuln.
GitHub - mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC-: 详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件
详细讲解CitrixBleed 2 — CVE-2025-5777(越界泄漏)PoC 和检测套件. Contribute to mingshenhk/CitrixBleed-2-CVE-2025-5777-PoC- development by creating an account on GitHub.GitHub
I’ve heard that Citrix are complaining me billing this CitrixBleed 2 is causing them reputational damage, and isn’t related in any way to CitrixBleed.
For the record - it was a dumb joke name to attraction attention for patching. I know it isn’t exactly the same cause.
But, ya know, it is a memory disclosure vuln which reveals sensitive info, and it does require ICA sessions be reset.. which only happened before with CitrixBleed.
Only Pentesting Platform Proven in Production | Horizon3.ai
Continuously assess, fix, and verify your security posture. Securing enterprises across many attack surfaces.Horizon3.ai
I've published my scan in progress of CVE-2025-5777 patching status, listing IPs, hostnames, Citrix Netscaler build numbers and if they're vulnerable to CitrixBleed2.
The scan isn't finished yet so these are only about a quarter of the results - unfortunately my coding skills are shite and it's really slow - should be finished over weekend or early next week.
Also, the SSL certificate hostnames are separated by comma which throws out CSV - sorry, I'll fix that later.
github.com/GossiTheDog/scannin…
scanning/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt at main · GossiTheDog/scanning
Contribute to GossiTheDog/scanning development by creating an account on GitHub.GitHub
If anybody is wondering btw it's 4047 definitely vulnerable (so far) from 17021 scanned instances - so 24% unpatched after about 3 weeks.
But scan is still running obvs so the vuln number will keep growing.
If anybody likes stats
- Of the 42 identified NHS Netscalers so far, 37 are patched🥳 The NHS are really good at this nowadays.
- Of the 65 identified .gov.uk Netscalers so far, only 48 are patched 😅 All of the unpatched are councils, which are obviously severely budget constrained in many cases - I'm also not sure they actually know they're supposed to be patching.
First exploitation details for CVE-2025-5777 - the Netscaler vuln - are out. labs.watchtowr.com/how-much-mo…
If you call the login page, it leaks memory in the response 🤣
I don’t want to specify too much extra technical info on this yet - but if you keep leaking the memory via requests, there’s a way to reestablish existing ICA sessions from the leaked memory.
How Much More Must We Bleed? - Citrix NetScaler Memory Disclosure (CitrixBleed 2 CVE-2025-5777)
Before you dive into our latest diatribe, indulge us and join us on a journey. Sit in your chair, stand at your desk, lick your phone screen - close your eyes and imagine a world in which things are great.Sina Kheirkhah (@SinSinology) (watchTowr Labs)
Updated scan results for CVE-2025-5777: github.com/GossiTheDog/scannin…
It's still partial due to bugs, but about 18k servers.
scanning/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt at main · GossiTheDog/scanning
Contribute to GossiTheDog/scanning development by creating an account on GitHub.GitHub
CVE-2025-5777 (Citrix Netscaler vuln) has been under active exploitation since mid June, with people dumping memory and using this to try to access sessions.
TTPs to hunt for:
- In Netscaler logs, repeated POST requests to *doAuthentication* - each one yields 126 bytes of RAM
- In Netscaler logs, requests to doAuthentication.do with "Content-Length: 5"
- In Netscaler user logs, lines with *LOGOFF* and user = "*#*" (i.e. # symbol in the username). RAM is played into the wrong field.
Horizon3 have a good write up here, I don't think they were aware this is already being exploited for almost a month: horizon3.ai/attack-research/at…
Worth noting I was only able to find exploitation activity due to the WatchTowr and Horizon3 write ups - Citrix support wouldn't disclose any IOCs and incorrectly claimed (again - happened with CitrixBleed) that no exploitation in the wild. Citrix have gotta get better at this, they're harming customers.
CVE-2025-5777: CitrixBleed 2 Exploit Deep Dive by Horizon3.ai
Explore the CVE-2025-5777 vulnerability in Citrix, dubbed CitrixBleed 2. Learn how it works, attack details, and defensive steps from Horizon3.ai experts.Jimi Sebree (Horizon3.ai)
Just to be super clear, although Citrix claim that CitrixBleed 2 is in no way related to CitrixBleed, it allows direct session token theft - Citrix are wrong. Horizon3 have the POC and it's already being exploited - Citrix were also wrong.
"Not the most novel thing in the world… but this is much much worse than it initially appears. Take a look at the following video where you’ll see that it’s possible to receive legitimate user session tokens via this vector. "
Exploitation IOCs for CVE-2025-5777 aka CitrixBleed 2, these are actively stealing sessions to bypass MFA for almost a month. Some are also doing Netscaler fingerprint scanning first.
64.176.50.109
139.162.47.194
38.154.237.100
38.180.148.215
102.129.235.108
121.237.80.241
45.135.232.2
HT @ntkramer and the folks at @greynoise
Look for lots of connections to your Netscaler devices over past 30 days. More IPs coming as also under mass exploitation. More IPs: viz.greynoise.io/tags/citrixbl…
My own honeypot only sees activity from Private VPN. No fingerprinting first. Most POST /p/u/doAuthentication.do, some POST /nf/auth/doAuthentication.do. User-Agent: "Vuln3rableVuln3rable..."
2025-07-07
190.60.16.26
103.27.203.82
45.9.249.58
185.94.192.162
128.1.160.146
200.110.153.22
2025-07-06
193.37.253.202
200.110.153.22
217.138.222.66
82.221.113.209
80.239.140.197
I wrote up a thing on how to hunt for CitrixBleed 2 exploitation
doublepulsar.com/citrixbleed-2…
CitrixBleed 2 exploitation started mid-June — how to spot it
CitrixBleed 2 — CVE-2025–5777 — has been under active exploitation to hijack Netscaler sessions, bypassing MFA, globally for a month. At the time, I noted the similarities to CitrixBleed, and noted…Kevin Beaumont (DoublePulsar)
Pretty sure that's not what you meant ;)
“Citrix declined to say if it's aware of active exploitation”
It is aware. arstechnica.com/security/2025/…
Critical CitrixBleed 2 vulnerability has been under active exploit for weeks
Exploits allow hackers to bypass 2FA and commandeer vulnerable devices.Dan Goodin (Ars Technica)
First Victims in Switzerland and Germany
borncity.com/blog/2025/07/09/i…
Ameos-Klinikverbund: IT-Ausfall Folge eines Hacker-/Cyberangriffs
Ich kann nun eine weitere Informationen zu den IT-Ausfällen bei Ameos-Kliniken und Einrichtungen beitragen. Nachdem ich über die IT-Probleme berichtete…Günter Born (Borns IT- und Windows-Blog)
I believe Citrix may have made a mistake in the patching instructions for CitrixBleed2 aka CVE-2025-5777.
They say to do the instructions on the left, but they appear to have missed other session types (e.g. AAA) which have session cookies that can be stolen and replayed with CitrixBleed2. On the right is the CitrixBleed1 instructions.
The net impact is, if you patched but a threat actor already took system memory, they can still reuse prior sessions.
Tell anybody you know at Citrix.
CVE-2025-5777 aka CitrixBleed 2 has been added to CISA KEV now over evidence of active exploitation.
Citrix are still declining to comment about evidence of exploitation as of writing.
This is how Citrix are styling Citrix Bleed 2 btw. In the blog there’s no technical details or detection details or acknowledgement of exploitation. They also directly blame NIST for their CVE description.
From Netflow I can see active victims - including systems owned by the US federal government - so strap in to see where this goes.
this feels very much like a corp Comms team in crisis management mode, thinking obfuscation will make the situation better. It's a natural reaction, but not one that helps mitigation.
A brutally honest 'we screwed up, here is what we can share without making the situation worse' along with some willingness to offer hotfixes rather than full releases is the better path forward.
On the plus side, I did get to read their latest Tolly report for lolz
"Can I fix these vulnerabilities using Web Application Firewall signatures?
No, it is not possible to fix the vulnerabilities with Web Application Firewall signatures.
The second one, posted later, says:
"App & API Protector mitigation
In response to CitrixBleed 2, the WAF Threat Research Team released a new Rapid Rule on July 7, 2025, with a default action set to "Alert":
- 3000967-Citrix NetScaler Memory Disclosure Detected (CVE-2025-5777)".
Some CitrixBleed2 IOCs; this is a cluster of what appears to be China going brrr, going on for weeks.
38.154.237.100
38.54.59.96
github.com/GossiTheDog/scannin…
scanning/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt at main · GossiTheDog/scanning
Contribute to GossiTheDog/scanning development by creating an account on GitHub.GitHub
CISA is giving all civilian agencies 1 day to remediate CitrixBleed 2. It is encouraging all other organisations in the US to do this too.
therecord.media/cisa-orders-ag…
CISA orders agencies to immediately patch Citrix Bleed 2, saying bug poses ‘unacceptable risk’
The one-day deadline issued by CISA on Thursday appears to be the shortest one ever issued. Federal civilian agencies are typically given three weeks to patch bugs added to the known exploited vulnerability catalog.Jonathan Greig (The Record)
Set up lab of Netscalers just now & owned them.
Two learnings:
1) the default logging isn’t enough to know if you’ve been exploited. So if you’re wondering where the victims are, they don’t know they’re victims as checks will come back clean unless they increased logging before. FW logs w/ IOCs fall back option.
2) the Citrix instructions post patch to clear sessions don’t include the correct session types - ICA will just reconnect as you (threat actor) still have the valid NSC_AAAC cookie.
Right script, different CVE? 😁
Updated CitrixBleed 2 scan results: github.com/GossiTheDog/scannin…
It's down from 24% unpatched to 17% unpatched
The results are partial still, the actual numbers still vuln will be higher.
scanning/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt at main · GossiTheDog/scanning
Contribute to GossiTheDog/scanning development by creating an account on GitHub.GitHub
Imperva WAF have added detection and blocking for CitrixBleed 2 this weekend.
They see it being widely sprayed across the internet today - almost 12 million requests, log4shell level.
The only major vendor I’ve seen who hasn’t added a WAF rule is Citrix - they sell a WAF upsell module for Netscaler, but failed to add detection for their own vulnerability.
CitrixBleed 2 update.
- Citrix have finally, quietly admitted exploitation in the wild -- by not commenting to press and then editing an old blog post and not mentioning it on their security update page.
- Orgs have been under attack from threat actors in Russia and China since June
- It's now under spray and pray, wide exploitation attempts.
doublepulsar.com/citrixbleed-2…
CitrixBleed 2 situation update — everybody already got owned
The ‘good news’, I suspect, is that most orgs will be too lacking in logs to have evidence. So they get to hope nothing too bad happened, I guess. The reason for this is the exploitation activity…Kevin Beaumont (DoublePulsar)
Perhaps time to refer to it using the more appropriately descriptive word... Wild.
This vulnerability is WILDLY EXPLOITED.
As a bonus "exploited in the wild" can be changed to "wild exploitation observed".
Citrix Netscaler internet scan still running, it's found another 1k vulnerable instances so far - will probably update Github later today or tomorrow morning.
It looks like we're back up to 18% of boxes being still vulnerable when the new list is out. It looks like a lot of orgs are patching from my list.
New CitrixBleed 2 scan data:
raw.githubusercontent.com/Goss…
+7000 extra hosts added this round, host list is so large you need to use the raw view to see it.
Next set of data publication likely Friday, a month since the patch became available.
3832 orgs/hosts still unpatched.
Exploitation of CitrixBleed 2 (CVE-2025-5777) Began Before PoC Was Public
GreyNoise has observed active exploitation attempts against CVE-2025-5777 (CitrixBleed 2), a memory overread vulnerability in Citrix NetScaler. Exploitation began on June 23 — nearly two weeks before a public proof-of-concept was released on July 4.www.greynoise.io
I’m fairly certain the threat actor is Chinese and they reversed the patch to make the exploit.
Citrix continue to be MIA. They still have no detection guidance for customers, and haven’t told customers the extent of the issue.
With the #CitrixBleed2 patch data I publish it's possible to view the history on Github for each new scan and see when hosts change from vuln to patched.
It's proving incredibly effective at getting orgs to patch. I tried private notifications via HackerOne and such for CitixBleed1 in 2023 and it took months to get orgs to patch. Putting the data public brings accountability for orgs who later get breached - so there's a rush to patch.
It's definitely interesting and may need a scale out.
Citrix have a blog out about hunting for #CitrixBleed2
netscaler.com/blog/news/evalua…
It's what was in my earlier blog - look for invalid characters in the username field and duplicate sessions with different IPs
The Dutch Public Prosecution Office have shut down their Citrix Netscaler and removed all internet access, Dutch media speculating CitrixBleed 2 exploitation.
techzine.eu/news/security/1331…
Justice minister David van Weel told MPs in a briefing that it appears the weakness had been used by third parties to access the department systems.
The justice ministry said the department had applied Citrix’s recommended patches, but these failed to fully eliminate the flaw. dutchnews.nl/2025/07/prosecuti…
Dutch Department of Justice offline after Citrix vulnerability - Techzine Global
Public Prosecution Service offline after security breach: hackers may exploit vulnerability in digital environment. Crisis meeting leads to complete internet shutdown.Berry Zwets (Techzine)
Update on the situation at The Hague and the shutdown of the Dutch Public Prosecution Service internet access, NCSC Netherlands issued an update today saying all orgs should hunt for CitrixBleed 2 activity, citing my blog.
They also advise clearing all session types, not just the ones Citrix say in their security advisory.
Updated #CitrixBleed2 scans github.com/GossiTheDog/scannin…
Fields - IP, SSL certification hostnames, Netscaler firmware, if vulnerable to CVE-2025-5777
I've had a few orgs contest that they're not vulnerable and the scan is wrong. I've assisted each org, and in each case they've been wrong - they'd patched the wrong Netscaler, the passive HA node etc.
scanning/CVE-2025-5777-CitrixBleed2-ElectricBoogaloo-patching.txt at main · GossiTheDog/scanning
Contribute to GossiTheDog/scanning development by creating an account on GitHub.GitHub
I might move the Dutch Public Prosecution Service (OM) Citrix Netscaler incident out to a different thread, but the latest update an hour ago from local media is that they are still without internet and remote access, and they're working on several alternatives to continue criminal trials.
I expect we're going to see a wave of Netscaler incidents over the coming months, although how many will publicly disclose is another issue - the Dutch are culturally transparent.
nltimes.nl/2025/07/18/dutch-pr…
Dutch prosecutor disconnects internal systems from internet over vulnerability
The Public Prosecution Service (OM) has disconnected all internal systems from the internet. The reason for this is a warning from the National Cyber Security Centre (NCSC) that there is "a vulnerability" in the system that gives users access to the …NL Times
Vulnerabilities impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2025-5349, CVE-2025-5777 and CVE-2025-6543 – Update 2 - Canadian Centre for Cyber Security
Vulnerabilities impacting Citrix NetScaler ADC and NetScaler Gateway - CVE-2025-5349, CVE-2025-5777 and CVE-2025-6543 – Update 2Canadian Centre for Cyber Security
Looks like Arctic Wolf referenced your info as well! arcticwolf.com/resources/blog/…
Meanwhile still have yet to hear from Citrix…😭
Updates on Actively Exploited Information Disclosure Vulnerability “Citrix Bleed 2” in Citrix NetScaler ADC and Gateway I Arctic Wolf
In late June 2025, Arctic Wolf issued a security bulletin addressing a critical out-of-bounds read vulnerability in Citrix NetScaler ADC and Gateway that Citrix disclosed, tracked as CVE-2025-5777.Andres Ramos (Arctic Wolf Networks)
Referenced Double Pulsar article.
You fuckin’ legend!!
Openbaar Ministerie mogelijk nog weken afgesloten van internet
Het OM koppelde zijn systemen vorige week los van het internet na vermoedens van een cyberaanval.NOS Nieuws
Public Prosecution Service may be closed off from the internet for weeks
The Public Prosecution Service (OM) expects that it may be closed off from the internet for weeks to come. Last week, the Public Prosecution Service disconnected its systems after suspicions of a hack.
This means that Public Prosecution Service employees cannot be reached by email and cannot log in remotely. That already had consequences for lawsuits last week. Public prosecutors could not look into the files, so the papers had to be printed.
Officers can now consult a number of files, but do not work in them, as spokesperson said. "They can read the files, but not edit or print them, for example." The spokesperson could not say whether this will affect lawsuits scheduled for today or the coming weeks.
Aristotelis Tzafalias (@aristot73@infosec.exchange)
The Netherlands faced a significant Citrix related incident in 2019. The Dutch Safety Board investigated... report linked below. It is now 2025, and another Citrix related incident has led to the NL public prosecutor office going offline.Infosec Exchange
There’s a bit more in situation at the OM on Netscaler here: volkskrant.nl/binnenland/openb…
The OM say they patched quickly (and my scan data backs this up - they patched around June 24th) however it appears somebody got in (or took a session cookie) before patching took place and now they’re trying to contain the situation.
Openbaar Ministerie mogelijk nog weken afgesloten van internet, probeert impact op rechtszaken te beperken
Het Openbaar Ministerie blijft mogelijk nog weken afgesloten van het internet. Donderdag haalde het OM alle interne systemen offline vanwege een gat in de beveiliging van bepaalde software.Daan de Vries (DPG Media)
You'll be remembered for the yolo cowboy styled action advice regardless.
But I would be more impressed if you leveled up towards Notepad and started doing ASCII art instead.
I think this thread exposes something about the cybersecurity industry and org posture btw - it almost all runs on Windows and EDR telemetry, hence why there’s little info on this from vendors (Netscaler is closed box appliance - they’re flying blind) and why orgs aren’t seeing anything, they don’t know how without vendors.
I keep contacting orgs and they have no idea they are compromised or how to investigate.
The Dutch Public Prosecution Service #CitrixBleed2 incident rolls on - NRC report on an email from the Director of their IT service, where they say “It is clear that it’s a massive and dramatic incident”.
nrc.nl/nieuws/2025/07/22/digit…
Digitale werkomgeving OM inderdaad gehackt, onderzoek moet uitwijzen welke informatie is gestolen
Cybercrime: Het Openbaar Ministerie is gehackt. Het zou nog weken kunnen duren om het netwerk veilig te stellen, blijkt uit een interne toelichting van het hoofd ict. Er is aangifte gedaan en melding gemaakt van een eventueel datalek.Rik Wassens (NRC)
your name was in our newspaper on saturday. Electronic version volkskrant.nl/binnenland/inter…
Link in online article goes to 'CitrixBleed 2 situation update — everybody already got owned'
Interne systemen Openbaar Ministerie offline vanwege gat in softwarebeveiliging
Vanwege potentieel misbruik van een ‘kwetsbaarheid’ in bepaalde software heeft het Openbaar Ministerie (OM) donderdagavond alle interne systemen offline gehaald. Mogelijk zit een Chinese groep achter de hack.Jasper Daams (DPG Media)
Openbaar Ministerie mogelijk nog weken afgesloten van internet
Het OM koppelde zijn systemen vorige week los van het internet na vermoedens van een cyberaanval.NOS Nieuws
The great thing about "as far as I know"/"not as far as I know" class statements, unlike almost all other types of statements, is that you can increase their accuracy through the easy work of knowing less rather than the arduous task of knowing more.
It's epistemology's any% speedrun strat.
I had a look at network traffic from today and some of them are proxy exit nodes; some do broad IoT scanning.
Two of them really stick out as they seem to exclusively target Citrix endpoints: 78.128.113.30 and 38.54.59.96
Thanks so much for this info and for all the info provided prior to this. I was able to confirm with our Citrix team two weeks ago that we were patched already, and I'm just getting emails this week from higher ups to look into this, so I'm very much ahead of the game.
Aside from social media, is there anywhere you suggest keeping an eye on daily for vulnerability info?
(original: fosstodon.org/@husjon/11130838…)
husjon.dev (@husjon@fosstodon.org)
Attached: 1 image @GossiTheDog@cyberplace.social Patch appliedFosstodon
@privateger It's honestly darkly impressive. ICA vs. RDP was a pretty compelling beatdown at one time; but that was a no, of course I'm not that old, time ago; and basically everything they've touched since is a matter of indifference or distaste.
Normally I'd jump straight to blaming the private equity knackers; but in this case I can see why they were headed to the bone mill.
The hostnames field can be properly CSV'd by something like perl -pe 's/,/,"/; s/(,[^,]*,[^,]*$)/"$1/'
(Assuming a unix-ish shell. With cmd.exe you probably have to turn the inner "
into ^"
and the outer '
into "
.)
Thanks!
#RSS alert feed: digital.nhs.uk/feed/cyber-aler…
Other #NHS feeds: digital.nhs.uk/about-nhs-digit…
I was sent this for reference:
reliaquest.com/blog/threat-spo…
Threat Spotlight: CVE-2025-5777: Citrix Bleed 2 Opens Old Wounds - ReliaQuest
CVE-2025-5777 poses serious threats to Citrix Netscaler devices—discover recommended actions to block exploitation and protect accounts from Citrix Bleed 2.ReliaQuest
I also like Cloud Software Group does not provide forensic analysis; however, customers can contact Citrix Customer Support to get access to IoCs.
And
Does CVE 2025-6543 constitute a zero day vulnerability?Cloud Software Group became aware of limited exploitation activity before the patch was released.
support.citrix.com/support-hom…
CeceDuBois reshared this.
In the same conversation, this lady told me she doesn't eat fruits, vegetables, rice or meat. Also, she always orders the same thing when she goes to a restaurant.
It's nice to see someone with worse eating habits than me.
(I'm not a fussy eater - I fail to always plan a balanced meal.)
Pasta and milkshakes. That woman certainly knew her milkshakes.
- Πάνω από 900 συλλήψεις στο Λεκανοπέδιο ρε γκουμουνι.
- Τι? Greek Mafia?
- Χειρότερο ρε πλεμπες.
Χωρίς εισιτήριο στα ΜΜΜ.....
Καταναγκαστικά έργα μέχρι να ξεχρεωσουν την ζημιά που προκάλεσαν
Το ξεκαθαρίσαμε αυτό.
Ο καθένας νομιζει ότι θελει.
Εδώ υπάρχουν ακόμα FlatEarthers ανάμεσα μας.
Και εγώ δεν είπα ότι θα μας σώσει η αποχή, αν ψηφίσει.
Είπα ότι το 42,5 του Κούλη θα ήταν 28% η 32%
Αν έκανε η όχι κυβέρνηση με αυτά τα ποσοστά είναι άγνωστο αλλά τουλάχιστον δεν θα είχε αυτοδυναμία.
Ελπίζω τώρα να έγινε κατανοητό.
@Feleki
Consider The Raven
in reply to Consider The Raven • • •Function Health Cont:
They will have a doctor review my results and give me some recommendations. I’m already working a plan with Grok.
Finding these issues BEFORE they manifested as a serious life threatening health condition may have added years to my life span.
The trick will be not reacting to this the same way I normally do, just adding more things and working harder at it.
I’ve sacrificed rest in exchange for learning more and getting more done. I’ll have to learn to relax.
2/2
Peaceandprosperity
in reply to Consider The Raven • • •it's hard to learn to relax. But one thing that I've learned to do is pick a couple of hobbies that can keep me occupied but also relax. So I garden, do a daily yoga routine, pray, and I either cold plunge or sauna daily. I stay busy but I also am way healthier than I've ever been.
Life is a journey my brother.
Scott D Hansen
in reply to Consider The Raven • • •Partisan Night Slut
in reply to Consider The Raven • • •