Home Search

log - search results

If you're not happy with the results, please do another search
Proactive Cybersecurity Paradigm, cyberwar, IoT, 5G, Boardroom, Identity Detection and Response, Predictions, supply chains, hybrid workforce

Adopt Modern Tools and Technologies to Protect Supply Chains and the Hybrid Workforce

In security, you always need to be thinking ahead about what might come down the pipeline. As we wrapped up the year 2021, I...
CISA vulnerabilities, Microsoft Vulnerabilities, HP Device Manager Susceptible to Dictionary Attacks

CISA Adds 15 New Flaws to its Actively Exploited Vulnerabilities Catalog

Unresolved security issues serve as frequent attack vectors for opportunistic cybercriminals. It is known that threat actors often target publicly known or unpatched security...
Cybersecurity Predictions

Blockchain Technologies Will Be Integrated with Information Security and Cybersecurity Products

Making predictions in cybersecurity or any discipline or field can be quite challenging. First, it is virtually impossible to predict the future – consider...
ONUS Log4j, Cryptocurrency Wallet Security

Hackers Exploit Log4j Flaw to Hijack Crypto Platform ONUS

Recently, the popular Vietnamese  crypto trading platform ONUS sustained a large-scale cyberattack after threat actors exploited its payment system running on a vulnerable Log4j version....
blockchain

How Blockchain Is Shaping Cyber Security and Causing Technology Disruptions for Global Enterprises

The Blockchain industry continues to change the lives of not just enterprises but also individuals, helping them lay the foundations of their services and...
Log4j Vulnerability, Log4Shell

Hackers Exploit Log4j Bug to Attack Belgium Defense Ministry

The ripples of Log4j vulnerability have been reaching various sectors across the globe. Belgium Defense Ministry is the latest victim to join the bandwagon...
CISA, CISA Log4j scanner

CISA Announces Scanner for Apache Log4j RCE Vulnerabilities

In an attempt to assist organizations, The Cybersecurity and Infrastructure Security Agency (CISA) has announced the release of a scanner for identifying web services...
log4j

Expert Opinion: Key Questions About Log4j Answered

Sysadmins and DevOps had a demanding 2020 due to the pandemic. They are always on the alert for new things cropping up, however, Log4j...
Log4j, Iranian Ransomware Actors, SpoofedSccholars, second-tier targets, NIOPDC

Iranian Nation-State Adversaries Exploit Log4j Flaw Against Israeli Firms

Ever since the Apache Log4j flaw (CVE-2021-44228) was disclosed, cybercriminals looked for opportunities to exploit it and bypass security protections. Security experts from Check...
Log4j

Conti Ransomware Group Exploits Log4j Flaw to Compromise VMware Servers

While organizations and security admins worldwide are immersed in mitigating the Log4j vulnerability effects, new exploits are being weaponized to entice more fear. Recently,...

MOST POPULAR

RECENT POSTS