Plato Data Intelligence.
Vertical Search & Ai.

Tag: Log4Shell

S3 Ep109: How one leaked email password could drain your business [Audio + Transcript]

by Paul Ducklin DON’T LET ONE LOUSY EMAIL PASSWORD SINK THE COMPANY Microsoft’s tilt at the MP3 marketplace. Apple’s not-a-zero-day emergency....

Dangerous hole in Apache Commons Text – like Log4Shell all over again

by Paul Ducklin Java programmers love string interpolation features. If you’re not a coder, you’re probably confused by the word “interpolation” here, because it’s been borrowed as...

8 months on, US says Log4Shell will be around for “a decade or longer”

by Paul Ducklin Remember Log4Shell? It was a dangerous bug in a popular open-source Java programming toolkit called Log4j, short for “Logging for Java”, published by the...

Log4Shell Makes the Case for Runtime Application Self-Protection

Dive into the case for RASP to combat Log4Shell and why Web app firewalls aren't great for these types of attacks.

Invicti Security Adds Software Composition Analysis to Its Industry- Leading AppSec Platform

Invicti SCA enables users to track and secure open-source components to reduce security risk.

Why Developers Should Care About Log4j

Unless you can gain full visibility into how data flows to and through your dependencies, you can’t be sure if you are affected by this vulnerability.

Iranian Hackers Targeting VMware Horizon Log4j Flaws to Deploy Ransomware

A "potentially destructive actor" aligned with the government of Iran is actively exploiting the well-known Log4j vulnerability to infect unpatched VMware Horizon servers with ransomware. Cybersecurity firm SentinelOne dubbed the group "TunnelVision" owing to their heavy reliance on tunneling tools, with overlaps in tactics observed to that of a broader group tracked under the moniker Phosphorus

3 Critical Software Development Security Trends and Best Practices

Organizations should focus on proactive, development-based approaches to security.

What CISOs Should Tell the Board About Log4j

It's time for a reset with the board of directors. Very few have a dedicated, board-level cybersecurity committee, which means cybersecurity isn't viewed as a critical executive function.

Credential-Stuffing Attacks on Remote Windows Systems Took Off in 2021

Password-guessing became last year's weapon of choice, as attackers attempted to brute-force vulnerable Remote Desktop Protocol (RDP) servers, SQL databases, and SMB file shares.

Dynatrace Adds Real-Time Attack Detection and Blocking, Advancing Cloud Application Security

Application Security Module unifies multicloud observability and advanced AIOps with real-time vulnerability management and defense.

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?