News

Cybersecurity researchers warn on the growing pace of scans and attempted attacks looking to exploit the Java logging library security flaw.
First detailed in December, the vulnerability (CVE-2021-44228) allows attackers to remotely execute code and gain access to systems that use Log4j, a widely used Java logging library.
Log4j is patched, but the exploits are just getting started As updates to affected software slowly roll out, other quicker fixes are a crucial stopgap ...
As cybercriminals scan for susceptible servers, there are steps you can take to mitigate the Log4j critical vulnerability.
“The log4j vulnerability is the most serious vulnerability I have seen in my decades-long career,” Jen Easterly, the director of the US Cybersecurity and Infrastructure Security Agency, said.
Threat actors now exploit the critical Apache Log4j vulnerability named Log4Shell to infect vulnerable devices with the notorious Dridex banking trojan or Meterpreter.
A new Apache Log4j vulnerability and a major attack on a military body using Log4Shell have come to light as security teams work to patch.
New research released by security provider Cycognito finds that 70% of organizations are struggling to address Log4j.
Here’s what you should know: What is Log4j and why does it matter? Log4j is one of the most popular logging libraries used online, according to cybersecurity experts.