CITRIX WORKSPACE VULNERABILTIY ALLOWS REMOTE HACKING OF DEVICES

It is a new trend that has been adopted by many corporates and organization in this outbreak is the Work from home strategy. There is no doubt that this strategy has resulted in generating quite a lot of profit for the corporates as they don’t have to feed their employees by hiring a physical workspace,spending on their transport, electricity bills, etc. They just need to ask employees to work more.

It’s a tradition that every profit too has it’s own consequences. If a employer is working from home, all the work is done remotely. As the work is done remotely, security concerns takes place as now the organization’s intranet is being extended. While some popular applications like Zoom get popularized for remote video conferencing, bad actors do not leave any chance to disturb their functioning. There are many kinds of attacks explored against this application and thus many organization switch over to its other alternatives like Microsoft Teams, Google Meets, Cisco Webex, Citrix Workspace. They all are considered to be trusted but bad actors still not stop doing attacks against these application. They continue launching phishing campaigns and other types of attacks to these application, thus making working from home a threat more than an advantage.

In one of the above mentioned applications, recently researchers from Pentester Partners found out a vulnerability in Citrix Workspace that allows your device to be compromised remotely.

--

--

--

Debuggers covering infosec news,cyber security tutorials, data breaches, malware, threat analysis, ethical hacking, bugs, vulnerabilities and much more.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Tutorial 1: setting up your MetaMask wallet for AGA yield farming

The hypocrisy of Pegasus

Why is security so hard?

InfoSec Basics — Scans vs. Assessments vs. Pentests

Guest Post — The EU General Data Protection Regulation (GDPR) — Why?

SIEM VS XDR cybersecurity

What is Grogu.Finance?

Binary X on Cheersland #Stake2Earn

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ethical Debuggers

Ethical Debuggers

Debuggers covering infosec news,cyber security tutorials, data breaches, malware, threat analysis, ethical hacking, bugs, vulnerabilities and much more.

More from Medium

Write-up: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data @…

Whats up hackers and penetration testers.

Executing earlier python exploit on python3

LET’S REMOVE RENSOMEWARE/TROJON/VIRUS FROM PC