No Authorization Needed For this Microsoft Feature – Threat Wire
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
@endingwithali →
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev
Want to work with Ali? endingwithalicollabs@gmail.com
[❗] Join the Patreon→ https://patreon.com/threatwire
00:00 0 – Intro
00:10 Microsoft 365 Direct Send Spoofing
01:19 Unfixable Printer Vulnerability Found
03:15 CitrixBleed2 Fast 2 Furious
05:15 Outro
LINKS
🔗 Story 1: Microsoft 365 Direct Send Spoofing
https://www.varonis.com/blog/direct-send-exploit
🔗 Story 2: Unfixable Printer Vulnerability Found
https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed/
https://www.bleepingcomputer.com/news/security/brother-printer-bug-in-689-models-exposes-default-admin-passwords/
🔗 Story 3: CitrixBleed2 Fast 2 Furious
https://www.cisa.gov/guidance-addressing-citrix-netscaler-adc-and-gateway-vulnerability-cve-2023-4966-citrix-bleed
https://reliaquest.com/blog/threat-spotlight-citrix-bleed-2-vulnerability-in-netscaler-adc-gateway-devices/
https://doublepulsar.com/citrixbleed-2-electric-boogaloo-cve-2025-5777-c7f5e349d206
https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420
—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Community → https://www.hak5.org/community
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
____________________________________________
Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.Hak5Read More