Managing the National Vulnerability Database (NVD) Issue: Solutions for Improved Vulnerability Management

Read More >

Close

Platform
Solutions
Resources
Company

The only AI-enabled Continuous Threat Exposure Management Solution (CTEM)

AI guarding your business 24x7, alerting on emerging threats and exploits across the deep and dark web.

Citrix Bleed
CVE-2023-4966
borderCenter
Threat Activity

Ransomware

True

Exploitation Status

Active

Threat Actors

MEDUSA (FROZEN SPIDER)ROYALALPHVNITRO

Impacted Industries

OIL AND GASGOVERNMENTFINANCIAL SERVICES
borderCenter
Industry News
Malware

LockBit Ransomware Affiliates Leverage Citrix Bleed Vulnerability (CVE-2023-4966)

Threat Actor

Citrix Bleed: Two ransomware groups now exploiting bug for initial access

Threat Actor

Mass exploitation in progress (CVE-2023-4966)

borderCenter
Remediation

Proof Of Concept

Impacted Softwares

netscaler_application_delivery_controller (13.1 - 13.1-37.163)
netscaler_gateway (13.1 - 13.1-49.14)
netscaler_application_delivery_controller (13.1 - 13.1-49.14)
netscaler_application_delivery_controller (3.0 - 13.0-92.18)

Complete Risk Posture Visibility inminutes,
Not Months

Code to cloud coverage through our integrated ecosystem

LaceWork

LaceWork

BitBucket

BitBucket

Azure

Azure

Gitlab

Gitlab

Slack

Slack

Amazon Web Services

Amazon Web Services

Git hub

Git hub

Microsoft Teams

Microsoft Teams

Jenkins

Jenkins

Google Cloud

Google Cloud

Netsparker

Netsparker

Platform features

Evolved Solutions for evolving threats

CORE: Cyber Optimized Research Engine

Robust intelligence acquisition using NLP, Neural Networks, LLMs, and ML/AI technologies to deliver AI-driven multilayered defense, including analytics, prioritization, and notification engines.

RiskTrends

Real-time action across your entire attack surface, increasing time to detection by 28 days compared to solutions relying on NVD.

Complete visibility over your evolving threat ecosystem

24/7 coverage of emerging threats across the deep and dark web.

Tuned feeds based on your risk posture, only see relevant threats to you

Full workflow integration, triage and action in real time across your code to cloud attack surface

RiskGPT

Don't get caught off guard by the next actively exploited vulnerability. With RiskHorizon's RiskTrends, stay ahead of emerging threats. Our AI and ML-driven platform provides a real-time feed of vulnerabilities, helping security teams focus on the critical 2-5% that are actively exploited.

Predict high-likelihood threats, prevent exploitation, and protect your organization from threat actors. Inquire now, enhance your vulnerability management with RiskTrends.

Continuous Threat Exposure Management (CTEM): Proactive Cyber Defense

Stay 3 steps ahead of adversaries with real-time threat intelligence on emerging risks mapped to your evolving attack surface.

Blogs & Articles

We are passionate about sharing valuable insights, industry trends, and expert perspectives to keep you informed and inspired.

Blog

Understanding APT29: A Closer Look at the Cyber Threat Landscape

Recently, Microsoft disclosed a concerning security breach involving, APT 29, also known a

Blog

China Nation State (All Threat Actors)

Recent reports from FBI Director Christopher Wray underscore an alarming surge in Chinese-affiliated hacking activities

Blog

Managing the National Vulnerability Database (NVD) Issue

Recent reports have revealed a significant issue with the National Vulnerability Database

Some of the things you may want to know

We answered questions so you don’t have to ask them.

Ready for action

Stay informed and ready for action with an AI monitoring service that covers you
24x7 and alerts on emerging threats and exploits.

The only AI-enabled Continuous Threat Exposure Management Solution (CTEM)

Stay informed and ready for action with an AI monitoring service that covers you 24x7 and alerts on emerging threats and exploits.

Copyright © 2024. All Rights Reserved. RiskHorizon and the RiskHorizon logo are trademarks of RiskHorizon, Inc.