News
To help enterprise users dig up hidden cloud misconfigurations so as to avoid log4j-like catastrophic vulnerabilities, Orca Security has introduced a new cloud asset search option on its cloud ...
Cybersecurity professionals and IT vendors spent the weekend scrambling to shore up systems before hackers exploited a zero-day vulnerability in the popular Apache Log4j open source logging tool.
ExtraHop threat researchers have observed attackers in the wild using encrypted traffic to avoid detection of Log4Shell attacks. This is consistent with the general trend of cyberattackers using ...
Organizations are still exposed to critical vulnerabilities in Log4j, two years after a maximum severity bug was found in the popular utility, according to Veracode. The application security vendor ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results