The threat actor used a combination of open-source and publicly available tools to establish their attack framework Post navigation Rubrik acquires AI startup Predibase to boost agentic AI offerings Citrix Releases Emergency Patches for Actively Exploited CVE-2025-6543 in NetScaler ADC