News

If you're not certain whether your Java project is free from Log4j vulnerabilities, you should try this easy-to-use scanning tool immediately.
Iran-backed hacking group Phosphorous or APT35 is using the Log4j vulnerability to distribute a new modular PowerShell toolkit, according to security firm Check Point. APT35 is one of several ...
Why you may already be at risk, how to detect and mitigate the Log4j vulnerabilities now, and how to improve your code security in the future.
Log4j pushed systems, customers and ERP managers to their limits. Brenton O'Callaghan and the team at Avantra share their helpful answers to some burning questions for SAP operations teams on the ...
NSCS warns that the Log4j flaw won't be fixed overnight and that defenders could suffer burnout during the process.
A bug in the ubiquitous Log4j library can allow an attacker to execute arbitrary code on any system that uses Log4j to write logs. Does yours?
Security teams around the world are on high alert dealing with the Log4j vulnerability, but how risky is it, really?
Check Point Software Technologies Ltd., a publicly traded cybersecurity provider, said it has blocked more than 800,000 Log4j-related breach attempts.
As cybercriminals scan for susceptible servers, there are steps you can take to mitigate the Log4j critical vulnerability.