Content Paint

log4shell

3 trillion open source downloads, a 633% rise in malicious activity -- and a worrying sense of security

IT managers say their orgs are better prepared - infosec pros are less confident...

The 10 most-exploited vulnerabilities of 2021: Not patched? Likely pwned...

Attackers continue to accelerate their weaponisation of newly-discovered flaws, the Five Eyes list of most-exploited vulnerabilities of 2021 shows. Contrary to some reports suggesting fears of mass-exploitation had been over-indexed, the flaw in Log4j joined the most widely-exploited vulnerabilities last year, despite only being discovered at the year's

CrowdStrike names Turkey and Colombia as significant new sources of cyber-attacks

New state actors, labelled Wolf and Ocelot, identified in threat report

Log4j DIDN’t result in mass abuse – but VMware Horizon attacks continue

"Only a handful of customers faced attempted intrusions where Log4j was... the initial entry point

VMware vCenter “trivial to exploit” using Log4Shell, POC available

"All VCenter instances trivially exploitable by a remote and unauthenticated attacker."

Critical bug in ubiquitous Java framework sets off an internet cluster bomb

AWS, Red Hat, VMware, more affected with pre-auth RCE exploits circulating

Search the site

Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Your link has expired. Please request a new one.
Great! You've successfully signed up.
Great! You've successfully signed up.
Welcome back! You've successfully signed in.
Success! You now have access to additional content.