Plato Data Intelligence.
Vertical Search & Ai.

Tag: Log4j

WordPress plugin lets users become admins – Patch early, patch often!

by Paul Ducklin If you run a WordPress site with the Ultimate Members plugin installed, make sure you’ve updated it...

SSH Servers Hit in ‘Proxyjacking’ Cyberattacks

Threat actors are exploiting vulnerable secure shell protocol (SSH) servers to launch Docker services that take advantage of an emerging and lucrative attack vector...

A CISO’s Guide to Paying Down Software Supply Chain Security Debt

There has always been a tradeoff in IT between shipping new features and functionality versus paying down technical debt, which includes things like reliability,...

Tanium Platform Advances Threat Identification Capabilities and Enhances Endpoint Reach

Tanium, the industry’s only provider of converged endpoint management (XEM), today released major enhancements to the Tanium Software Bill of Materials (SBOM) that now...

‘Very Noisy:’ For the Black Hat NOC, It’s All Malicious Traffic All the Time

BLACK HAT ASIA – Singapore – When you're in an environment where the overwhelming majority of network traffic is classified as posing a severe...

APT41 Subgroup Plows Through Asia-Pacific, Utilizing Layered Stealth Tactics

After months of inactivity, Earth Longzhi — a suspected subgroup of the notorious APT41 — is again attacking organizations across industry targets in Southeast...

Building a Better SBOM

Software is an important part of every business in 2023. And whether you are building it or deploying it, it's absolutely crucial you know...

VMware patches break-and-enter hole in logging tools: update now!

by Paul Ducklin Logging software has made cyberinsecurity headlines many times before, notably in the case of the Apache Log4J...

Software-Dependency Data Delivers Security to Developers

Developers interested in gauging the security of the open source components have an abundant number of choices, but still have to choose to use...

Bad Actors Will Use Large Language Models — but Defenders Can, Too

AI is dominating headlines. ChatGPT, specifically, has become the topic du jour. Everyone is taken by the novelty, the distraction. But no one is addressing...

What to Discuss at RSA Conference — and It’s Not ChatGPT

The security community is always pressured to jump to the next thing. So, it's easy to guess what will likely dominate conversations at the...

Open Source Vulnerabilities Still Pose a Big Challenge for Security Teams

Across all industry sectors, open source software continues to pose a challenge for software security. We're all aware that vulnerabilities in commercial and open...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?