Skip to content
Apache Log4j vulnerability actively exploited, impacting millions of Java-based apps.
Views expressed in this cybersecurity-intelligence update are those of the reporters and correspondents.
Accessed on 12 December 2021, 2344 UTC.
Please click link or scroll down to read your selections.
Copy generated by “Reader Mode.”
The vulnerability affects not only Java-based applications and services that use the library directly, but also many other popular Java components and development frameworks that rely on it.
Penetration testing is a means of evaluating the security of a network or computer system by attempting to break into it. It is an exercise undertaken by professional pen testers (aka ethical hackers) with the permission of the…
The cybersecurity market is hot, and vendors are buying competitors to solidify their position or acquiring other firms to expand their offerings.
VMware’s Carbon Black Cloud Managed Detection and Response (MDR) is designed to help company security operations centers (SOCs) gain efficiency with improved threat advisory and containment.
The botnet take-down is believed to be temporary as the criminal group has a backup command-and-control mechanism based on Bitcoin blockchain.
It’s time to inventory your network to identify systems to replace or migrate away from.
If you want people to follow proper security practices, they need to understand why. That’s best done by telling a good story.
Each of two flaws allow attackers to bypass authentication, leaving customers of MSPs that use ManageEngine at risk. Patches are available.
All encrypted data will eventually become vulnerable to quantum computing along with the secrets they hold.
The actions, which temporarily took down REvil, raise questions about using the military to combat ransomware.
Investigators claim Ubiquiti employee Nikolas Sharp stole company data and then played the role of whistleblower to draw attention away from is actions.
The new CISA playbooks provide sound guidance on incident and vulnerability response, but mainly from a process perspective.
More malware is designed to be variable, choosing which computers to infect or even the type of attack to execute.
For the latest cybersecurity news and information, please check the blog sidebar, links, and twitter posts. Thanks for joining us today.