Skip to content
  Saturday 11 April 2026
Trending
June 13, 2025<h3>Why Agentic AI Isn’t the SOC Savior Just Yet</h3> July 14, 2025<h3>Gemini Email Summaries: Stay Alert to Prompt Injection Risks!</h3> March 25, 2025<h3>Half a Million Alerted in Wheelchair Company Email Hack Scandal</h3> November 29, 2025Full Stack Cybersecurity Engineer II February 5, 2025Senior Director, Cybersecurity July 1, 2025Microsoft Revamps Authenticator App: Say Goodbye to Passwords by 2025! January 1, 202211 Best WiFi Hacking Apps for Android Smartphones in 2022 July 3, 2024Senior Manager – Aircraft Cybersecurity Operations April 10, 2024First Native Spectre v2 Exploit Discovered for Linux Kernel by Researchers September 5, 2025Senior Cybersecurity Analyst
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  In-the-Wild Attacks Lead CISA to Include Citrix ShareFile Flaw in KEV Catalog
Industry News

In-the-Wild Attacks Lead CISA to Include Citrix ShareFile Flaw in KEV Catalog

Mister CybersecurityMister Cybersecurity—August 17, 20230
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Cato Networks Boosts AI Defense with Aim Security Acquisition

September 3, 2025

How Quickly Can Modern Hackers Crack Hashing Algorithms?

January 28, 2025

Stay Ahead of the Game: Top 5 Malware Threats for 2025

January 8, 2025

Scientists Uncover Extensive Puma’s Secret URL Trimming Platform

November 1, 2023



The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a vital safety flaw in Citrix ShareFile storage zones controller to its Known Exploited Vulnerabilities (KEV) catalog. Tracked as CVE-2023-24489, the flaw permits unauthenticated attackers to compromise susceptible cases remotely. The vulnerability stems from ShareFile’s dealing with of cryptographic operations, enabling adversaries to add arbitrary information and obtain distant code execution. The first indicators of exploitation emerged in July 2023, with the risk actors behind the assaults remaining unknown. Notably, the Cl0p ransomware gang has beforehand focused zero-day vulnerabilities in managed file switch options. Threat intelligence agency GreyNoise noticed a spike in exploitation makes an attempt concentrating on the Citrix ShareFile flaw on August 15, 2023.
Federal Civilian Executive Branch (FCEB) companies have been mandated to apply vendor-provided fixes to remediate the vulnerability by September 6, 2023. Another vital vulnerability affecting Citrix NetScaler merchandise, CVE-2023-3519, has additionally been actively exploited to deploy PHP net shells on compromised home equipment and acquire persistent entry.



Source hyperlink

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Mister Cybersecurity

New Malware Campaign Focuses on Inexperienced Cyber Criminals, Leveraging OpenBullet Configs
Diplomatic Phishing Attacks Employ Zulip Chat App as Covert Command and Control by Russian Hackers
Related posts
  • Related posts
  • More from author
Industry News

AI Is Transforming EDI Compliance Services

March 27, 20260
Industry News

5 Reasons AI-Driven Business Need Dedicated Servers – SmartData Collective

October 14, 20250
Industry News

The Future of Cyberthreat Sharing Post-CISA 2015: What’s Next?

October 1, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Careers

Cybersecurity Resilience Specialist – Governance Risk and Compliance

April 11, 20260
Careers

Principal Cybersecurity – Cloud Security Strategy

April 11, 20260
Careers

Cybersecurity Engineer

April 11, 20260
Careers

Cybersecurity Engineer Principal

April 11, 20260
Careers

Cybersecurity Analyst III, Patch Management

April 11, 20260
Careers

Cybersecurity Engineering Support

April 11, 20260
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Cybersecurity Resilience Specialist – Governance Risk and Compliance
  • Principal Cybersecurity – Cloud Security Strategy
  • Cybersecurity Engineer
  • Cybersecurity Engineer Principal
  • Cybersecurity Analyst III, Patch Management

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures