arstechnica.com
Open in
urlscan Pro
3.130.231.34
Public Scan
Submitted URL: https://arstechnica.com/security/2023/10/critical-citrix-bleed-vulnerability-allowing-mfabypass-comes-under-mass-exploit...
Effective URL: https://arstechnica.com/security/2023/10/
Submission: On November 22 via api from IN — Scanned from DE
Effective URL: https://arstechnica.com/security/2023/10/
Submission: On November 22 via api from IN — Scanned from DE
Form analysis
1 forms found in the DOMGET /search/
<form action="/search/" method="GET" id="search_form">
<input type="hidden" name="ie" value="UTF-8">
<input type="text" name="q" id="hdr_search_input" value="" aria-label="Search..." placeholder="Search...">
</form>
Text Content
Skip to main content * Biz & IT * Tech * Science * Policy * Cars * Gaming & Culture * Store * Forums Subscribe Close NAVIGATE * Store * Subscribe * Videos * Features * Reviews * RSS Feeds * Mobile Site * About Ars * Staff Directory * Contact Us * Advertise with Ars * Reprints FILTER BY TOPIC * Biz & IT * Tech * Science * Policy * Cars * Gaming & Culture * Store * Forums SETTINGS Front page layout Grid List Site theme light dark Sign in SECURITY 1. “THIS VULNERABILITY IS NOW UNDER MASS EXPLOITATION.” CITRIX BLEED BUG BITES HARD By some estimates, 20,000 devices have already been hacked. Dan Goodin – 10/30/2023, 10:39 PM 22 comments with 2. MICROSOFT PROFILES NEW THREAT GROUP WITH UNUSUAL BUT EFFECTIVE PRACTICES Octo Tempest employs tactics that many of its targets aren't prepared for. Dan Goodin – 10/28/2023, 1:20 AM 74 comments with 3. IPHONES HAVE BEEN EXPOSING YOUR UNIQUE MAC DESPITE APPLE’S PROMISES OTHERWISE “From the get-go, this feature was useless,” researcher says of feature put into iOS 14. Dan Goodin – 10/26/2023, 11:48 PM 139 comments with 4. PRO-RUSSIA HACKERS TARGET INBOXES WITH 0-DAY IN WEBMAIL APP USED BY MILLIONS Previously unknown XSS in Roundcube let Winter Vivern steal government emails. Dan Goodin – 10/26/2023, 12:21 AM 42 comments with 5. HACKERS CAN FORCE IOS AND MACOS BROWSERS TO DIVULGE PASSWORDS AND MUCH MORE iLeakage is practical and requires minimal resources. A patch isn't (yet) available. Dan Goodin – 10/25/2023, 7:00 PM 71 comments with 6. 1PASSWORD DETECTS “SUSPICIOUS ACTIVITY” IN ITS INTERNAL OKTA ACCOUNT 1Password CTO says investigation found no compromise of user data or sensitive systems. Dan Goodin – 10/23/2023, 10:56 PM 105 comments with 7. FEEL-GOOD STORY OF THE WEEK: TWO RANSOMWARE GANGS MEET THEIR DEMISE One is fatally hacked, the other shut down in international police dragnet. Dan Goodin – 10/21/2023, 1:09 AM 48 comments with 8. OKTA SAYS HACKERS BREACHED ITS SUPPORT SYSTEM AND VIEWED CUSTOMER FILES Hackers obtained valid credentials, but Okta doesn't say how. Dan Goodin – 10/21/2023, 12:45 AM 42 comments with 9. THE LATEST HIGH-SEVERITY CITRIX VULNERABILITY UNDER ATTACK ISN’T EASY TO FIX If you run a Netscaler ADC or Gateway, assume it's compromised and take action... fast. Dan Goodin – 10/19/2023, 11:56 PM 37 comments with 10. THERE’S A NEW WAY TO FLIP BITS IN DRAM, AND IT WORKS AGAINST THE LATEST DEFENSES New technique produces lots of bitflips and could one day help form an attack. Dan Goodin – 10/19/2023, 2:30 PM 65 comments with 11. GOOGLE-HOSTED MALVERTISING LEADS TO FAKE KEEPASS SITE THAT LOOKS GENUINE Google-verified advertiser + legit-looking URL + valid TLS cert = convincing lookalike. Dan Goodin – 10/19/2023, 6:50 AM 174 comments with 12. “CISCO BURIED THE LEDE.” >10,000 NETWORK DEVICES BACKDOORED THROUGH UNPATCHED 0-DAY An unknown threat actor is exploiting the vulnerability to create admin accounts. Dan Goodin – 10/17/2023, 8:40 PM 108 comments with FOLLOW US * Follow us on Facebook * Follow us on Twitter * Follow us on YouTube * Follow us on Instagram LATEST ARS VIDEO > PAUL SUTTER WALKS US THROUGH THE FUTURE OF CLIMATE CHANGE—AND THINGS AREN’T GREAT Paul Sutter walks us through the future of climate change—and things aren’t great PAUL SUTTER WALKS US THROUGH THE FUTURE OF CLIMATE CHANGE—AND THINGS AREN’T GREAT This episode of Edge of Knowledge focuses on our rapidly transforming world. Read Full Article Advertisement 1. BIGGEST DDOSES OF ALL TIME GENERATED BY PROTOCOL 0-DAY IN HTTP/2 More than 8 years after the adoption of HTTP/2, DDoSers devise rapid reset attack. Dan Goodin – 10/13/2023, 2:50 PM 24 comments with 2. THOUSANDS OF WORDPRESS SITES HAVE BEEN HACKED THROUGH TAGDIV PLUGIN VULNERABILITY If a site is redirecting visitors to scam sites, it was likely hacked by Balada. Dan Goodin – 10/9/2023, 10:48 PM 29 comments with 3. THOUSANDS OF ANDROID DEVICES COME WITH UNKILLABLE BACKDOOR PREINSTALLED Somehow, advanced Triada malware was added to devices before reaching resellers. Matt Burgess, wired.com – 10/7/2023, 12:32 PM 190 comments with 4. 23ANDME SAYS PRIVATE USER DATA IS UP FOR SALE AFTER BEING SCRAPED Records reportedly belong to millions of users who opted in to a relative-search feature. Dan Goodin – 10/7/2023, 1:58 AM 172 comments with 5. VULNERABILITIES IN SUPERMICRO BMCS COULD ALLOW FOR UNKILLABLE SERVER ROOTKITS With the ability to manage huge fleets of servers, BMCs are ideal places to stash malware. Dan Goodin – 10/5/2023, 12:21 AM 66 comments with 6. THEY’VE BEGUN: ATTACKS EXPLOITING VULNERABILITY WITH MAXIMUM 10 SEVERITY RATING Will attacks be as big as those targeting MOVEit? Maybe not, but they still can be plenty bad. Dan Goodin – 10/3/2023, 11:53 PM 75 comments with 7. VULNERABLE ARM GPU DRIVERS UNDER ACTIVE EXPLOITATION. PATCHES MAY NOT BE AVAILABLE Vulnerability allows attackers to tamper with data stored in device memory. Dan Goodin – 10/2/2023, 9:37 PM 54 comments with * Store * Subscribe * About Us * RSS Feeds * View Mobile Site * Contact Us * Staff * Advertise with us * Reprints NEWSLETTER SIGNUP Join the Ars Orbital Transmission mailing list to get weekly updates delivered to your inbox. Sign me up → CNMN Collection WIRED Media Group © 2023 Condé Nast. All rights reserved. Use of and/or registration on any portion of this site constitutes acceptance of our User Agreement (updated 1/1/20) and Privacy Policy and Cookie Statement (updated 1/1/20) and Ars Technica Addendum (effective 8/21/2018). Ars may earn compensation on sales from links on this site. Read our affiliate link policy. Your California Privacy Rights | Manage Preferences The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast. Ad Choices WE CARE ABOUT YOUR PRIVACY We and our 140 partners store and/or access information on a device, such as unique IDs in cookies to process personal data. You may accept or manage your choices by clicking below or at any time in the privacy policy page. These choices will be signaled to our partners and will not affect browsing data.More information about your privacy WE AND OUR PARTNERS PROCESS DATA TO PROVIDE: Use precise geolocation data. Actively scan device characteristics for identification. Store and/or access information on a device. Personalised advertising and content, advertising and content measurement, audience research and services development. List of Partners (vendors) I Accept Show Purposes