News

In fact, 60.8 percent of all Java-based applications use Log4j in some sort of third-party application, but it’s often buried under layers of other software. According to U.S. cybersecurity officials, ...
The Log4j exploit, called Log4Shell or CVE-2021-44228 by some, has been in the news this past few weeks. It’s bad! It’s everywhere! But just what is it, really? How did it make its way onto ...
APT35 is one of several state-backed hacking groups known to have been developing tools to exploit public-facing Java applications that use vulnerable versions of the Log4j error-logging component.
The patch from Log4J basically disables the local mechanism and makes it a default configuration, unless people explicitly say we actually want to use that local mechanism.
NSCS warns that the Log4j flaw won't be fixed overnight and that defenders could suffer burnout during the process.
Internet companies scramble to fix the scary Log4j hack, but there’s not much end-users can do to reduce attack risks.
Two MSPs who were not impacted still took the vulnerability as serious as possible, saying you must stay ready and assume the vulnerability is there.
A vulnerability in a widely used Apache library has caused Internet-wide chaos—and the trouble may just be starting.
A year since SolarWinds set the security world on fire, the Log4j vulnerability is the latest exploit with the potential to incur significant economic and national security harm. These exploits ...