资讯

Iran-backed hacking group Phosphorous or APT35 is using the Log4j vulnerability to distribute a new modular PowerShell toolkit, according to security firm Check Point. APT35 is one of several ...
If you're not certain whether your Java project is free from Log4j vulnerabilities, you should try this easy-to-use scanning tool immediately.
The Department of Homeland Security (DHS) has announced that the 'Hack DHS' program is now also open to bug bounty hunters willing to track down DHS systems impacted by Log4j vulnerabilities.
Log4j flaw: Attackers are making thousands of attempts to exploit this severe vulnerability Log4j RCE activity began on December 1 as botnets start using vulnerability Editorial standards Show ...
Internet companies scramble to fix the scary Log4j hack, but there’s not much end-users can do to reduce attack risks.
Conti ransomware operation is using the critical Log4Shell exploit to gain rapid access to internal VMware vCenter Server instances and encrypt virtual machines.
Cybersecurity experts struggled Tuesday to answer lawmakers’ basic questions about the danger of a flaw in the open-source logging platform Apache Log4J that could plague computer network ...
They weren’t able to patch the Log4j binary itself, and instead faced a tricky decision: Turn off that specific application and stop using it, potentially refiguring their entire IT ...
The Log4j patch issued last week to fix the massive Log4Shell hack has security vulnerabilities of its own, which hackers can exploit.
Log4j pushed systems, customers and ERP managers to their limits. Brenton O'Callaghan and the team at Avantra share their helpful answers to some burning questions for SAP operations teams on the ...
Why you may already be at risk, how to detect and mitigate the Log4j vulnerabilities now, and how to improve your code security in the future.