News
Cybersecurity researchers warn on the growing pace of scans and attempted attacks looking to exploit the Java logging library security flaw.
First detailed in December, the vulnerability (CVE-2021-44228) allows attackers to remotely execute code and gain access to systems that use Log4j, a widely used Java logging library.
As cybercriminals scan for susceptible servers, there are steps you can take to mitigate the Log4j critical vulnerability.
“The log4j vulnerability is the most serious vulnerability I have seen in my decades-long career,” Jen Easterly, the director of the US Cybersecurity and Infrastructure Security Agency, said.
Here’s what you should know: What is Log4j and why does it matter? Log4j is one of the most popular logging libraries used online, according to cybersecurity experts.
If you're not certain whether your Java project is free from Log4j vulnerabilities, you should try this easy-to-use scanning tool immediately.
A new Apache Log4j vulnerability and a major attack on a military body using Log4Shell have come to light as security teams work to patch.
Microsoft said that a new family of ransomware, Khonsari, has been used to attack Minecraft servers by exploiting the Log4j vulnerability.
Here’s what you should know: What is Log4j and why does it matter? Log4j is one of the most popular logging libraries used online, according to cybersecurity experts.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results