Bro, Thank you so much for your kind words and for appreciating my video on Citrix Bleed! I'm thrilled to hear that you found it informative and valuable. If you'd like to see more content like this, please consider sharing this video with others who might benefit from it and subscribing to the channel. Your support helps immensely in growing our community and enables me to continue producing quality cybersecurity content. Thanks again for your encouragement!"
Thank you for your kind words! I'm thrilled to hear that my videos have been helpful to you. I wanted to let you know that I've just uploaded a new 'Advanced Malware Tactics' playlist series that takes a deep dive into process injection. It's available in both Hindi and English, and I uploaded it yesterday. I hope you find this series just as useful. Your support for my channel means a lot. Thanks again!
@deusx.machinaanime3072 Hi there, thank you so much for pointing out that detail in the illustration. I appreciate your keen eye and will ensure more accurate visuals in future content. Your feedback is invaluable in helping me improve the quality of my videos. Thanks for supporting the channel!
The stages involved in resolving issues related to CVE-2023-4966 include identification of the vulnerability, publication of advisories by Citrix, observation of exploitation in the wild, and addition of the vulnerability to the Known Exploited Vulnerabilities catalog by the U.S. Cybersecurity and Infrastructure Security Agency (CISA).
Bro, this by far is the best video that I have seen on Citrix Bleed. You nailed it with this video, exceptional work.
Bro, Thank you so much for your kind words and for appreciating my video on Citrix Bleed! I'm thrilled to hear that you found it informative and valuable. If you'd like to see more content like this, please consider sharing this video with others who might benefit from it and subscribing to the channel. Your support helps immensely in growing our community and enables me to continue producing quality cybersecurity content. Thanks again for your encouragement!"
Something new I’ve learnt 👍🏼. Thank you 🙏
Great job explaining Citrix Bleed. You are a very good teacher. Thank you for the video, and please continue to make videos.
Thank you for your kind words! I'm thrilled to hear that my videos have been helpful to you. I wanted to let you know that I've just uploaded a new 'Advanced Malware Tactics' playlist series that takes a deep dive into process injection. It's available in both Hindi and English, and I uploaded it yesterday. I hope you find this series just as useful. Your support for my channel means a lot. Thanks again!
Perfectly Explained ! 👏 thanks 👍
Commendable job! Very well explained
Great explanation!
👍good explained!
5:47. BTW: The illustration of the large gear is incorrect. It should be counter clockwise
@deusx.machinaanime3072
Hi there, thank you so much for pointing out that detail in the illustration. I appreciate your keen eye and will ensure more accurate visuals in future content. Your feedback is invaluable in helping me improve the quality of my videos. Thanks for supporting the channel!
✨✨
The stages involved in resolving issues related to CVE-2023-4966 include identification of the vulnerability, publication of advisories by Citrix, observation of exploitation in the wild, and addition of the vulnerability to the Known Exploited Vulnerabilities catalog by the U.S. Cybersecurity and Infrastructure Security Agency (CISA).
Absolutely, the stages you've outlined are critical in the response to security vulnerabilities. It's a continuous process to keep systems secure.