Log4j Forced a Cybersecurity Wake-Up Callby ITECHNEWS March 4, 2022 0 0 It’s been nearly four months since Alibaba Cloud’s security team first reported a remote code execution (RCE) vulnerability within Apache ...
Log4j Showed Us That Public Disclosure Still Helps Attackersby ITECHNEWS February 8, 2022 0 0 At 2:25 pm on December 9, an infamous (now deleted) tweet linking a zero-day proof of concept exploit for the ...
Log4j, SBOMs and Secure Code Librariesby ITECHNEWS January 26, 2022 0 0 Last year (2021) was a tough year for the software supply chain. And in December, the year’s parting gift was ...
After Log4j, Open-Source Software Is Now a National Security Issueby ITECHNEWS January 14, 2022 0 0 For years, developers of free, open-source software have been telling anyone who will listen that their projects needs better financial ...
Detecting log4j using ShiftLeft COREby ITECHNEWS January 12, 2022 0 0 Over the last few weeks, log4j has been the focus in most organizations. It continues to dominate tech media as ...
WhiteSource Automates Remediation of Log4j Vulnerabilitiesby ITECHNEWS January 6, 2022 0 1 WhiteSource this week made good on a promise to add Log4j vulnerability remediation capabilities to both its free and commercial ...
Log4j flaw attack levels remain high, Microsoft warnsby ITECHNEWS January 6, 2022 0 0 Microsoft has warned Windows and Azure customers to remain vigilant after observing state-sponsored and cyber-criminal attackers probing systems for the ...
FTC to Companies: Patch Log4j ASAP or Suffer Our Wrathby ITECHNEWS January 5, 2022 0 0 The Federal Trade Commission has a message for companies that aren’t taking the threat posed by log4j to heart: Patch ...
Experts: Log4j Bug Could Be Exploited for “Years”by ITECHNEWS December 30, 2021 0 0 Security experts have warned that the Log4j vulnerability could still enable threat actors to launch attacks years from now, if ...
Instant Log4j protection. Shield and hunt with Traceable AIby ITECHNEWS December 29, 2021 0 0 One of the reasons the Log4j vulnerability is so dangerous is that it is so widespread in applications literally everywhere. ...