Tag: Log4j
-
Vulnerable instances of Log4j still being used nearly 3 years later
Editor’s note: This article originally appeared in our sister publication SC Magazine …
-
Exploitation of Log4j flaw continues in the wild
The vulnerability, tagged as CVE-2021-44228, was first reported in November 2021 and led to a global scramble to implement patches. Despite …
-
Log4Shell continues to threaten organizations…
EXECUTIVE SUMMARY: The notorious North Korea-linked hacking group known as Lazarus is believed to be the mastermind behind a new global …
-
Vulnerable Log4j instances persist two years after patches
TechRadar reports that vulnerable versions of the Apache Log4j software have been observed across 38% of apps between Aug. 15 and …
-
North Korean hackers Lazarus Group takes new Telegram tactics
Cisco Systems Inc.’s Talos Intelligence unit posted today new findings about the North Korean hacking group called Lazarus that outline …
-
Two-Fifths of Log4j Apps Use Vulnerable Versions
Organizations are still exposed to critical vulnerabilities in Log4j, two years after a maximum severity bug was found in the popular …
-
The hidden costs of Java, and the impact of pricing changes
An overwhelming 98% of all the businesses surveyed use Java in their software applications or infrastructure, and 57% of those …
-
Log4j bug exploited to push novel EarlyRat malware
Researchers have discovered a new remote access trojan (RAT) called EarlyRat that has been used by North Korean threat actors in attacks …
-
The Log4j vulnerability – how can we all do better next time?
Friday the 10 of December 2021 is etched in the memory of many IT professionals, but not for reasons they will look back on with fondness. …
-
Log4j bug being used in new malicious attacks
It has been more than a year since Apache released details on a critical vulnerability in Log4j, which made headlines and impacted …
-
With 40% of Log4j Downloads Still Vulnerable, Security Retrofitting Needs to Be a Full-Time Job
Vulnerabilities like Log4j remain responsible for security breaches a full year after the discovery of the flaw. In the months after …
-
Log4j Vulnerabilities Are Here to Stay — Are You Prepared?
Don’t make perfect the enemy of good in vulnerability management. Context is key — prioritize vulnerabilities that are actually …
●●●