<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Citrix Breached in Industry News</title>
    <link>https://community.isc2.org/t5/Industry-News/Citrix-Breached/m-p/20193#M2392</link>
    <description>Only time will tell - some are very keen to attribute without reviewing holistically, for the sheer idea of being famous.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;Caute_cautim</description>
    <pubDate>Sun, 17 Mar 2019 05:42:23 GMT</pubDate>
    <dc:creator>Caute_cautim</dc:creator>
    <dc:date>2019-03-17T05:42:23Z</dc:date>
    <item>
      <title>Citrix Breached</title>
      <link>https://community.isc2.org/t5/Industry-News/Citrix-Breached/m-p/20105#M2384</link>
      <description>&lt;P&gt;Forbes article on the&amp;nbsp;Citrix Breach.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.forbes.com/sites/kateoflahertyuk/2019/03/10/citrix-data-breach-heres-what-to-do-next/#6bb679971476" target="_blank"&gt;https://www.forbes.com/sites/kateoflahertyuk/2019/03/10/citrix-data-breach-heres-what-to-do-next/#6bb679971476&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From Resecurity:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://resecurity.com/blog/supply-chain-the-major-target-of-cyberespionage-groups/" target="_blank"&gt;https://resecurity.com/blog/supply-chain-the-major-target-of-cyberespionage-groups/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have heard some in the podcasting community wonder about the claims made by Resecurity.&amp;nbsp; They say that there are doubts in&amp;nbsp;Resecurity's&amp;nbsp;disclosure and they&amp;nbsp;say that the company has only a few employees.&amp;nbsp; One person claims that the website for Resecurity&amp;nbsp;was originally built from a Russian IP address.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It just seems odd that Resecurity&amp;nbsp;has provided attribution so quickly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;RT&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 14 Mar 2019 13:46:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Citrix-Breached/m-p/20105#M2384</guid>
      <dc:creator>Radioteacher</dc:creator>
      <dc:date>2019-03-14T13:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: Citrix Breached</title>
      <link>https://community.isc2.org/t5/Industry-News/Citrix-Breached/m-p/20193#M2392</link>
      <description>Only time will tell - some are very keen to attribute without reviewing holistically, for the sheer idea of being famous.&lt;BR /&gt;&lt;BR /&gt;Regards&lt;BR /&gt;&lt;BR /&gt;Caute_cautim</description>
      <pubDate>Sun, 17 Mar 2019 05:42:23 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Industry-News/Citrix-Breached/m-p/20193#M2392</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2019-03-17T05:42:23Z</dc:date>
    </item>
  </channel>
</rss>

