Remove support log4j
article thumbnail

From Log4j to Long4j

Security Boulevard

Veracode reports that more than a third of Java application still use vulnerable versions of Log4j despite efforts to eradicate it. The post From Log4j to Long4j appeared first on Azul | Better Java Performance, Superior Java Support. The post From Log4j to Long4j appeared first on Security Boulevard.

59
article thumbnail

First CSRB Report Tackles on Ongoing Log4j Risk

Security Boulevard

The Log4j vulnerabilities discovered in 2021 continue to pose significant risks to organizations worldwide. The Cyber Safety Review Board (CSRB) released a series of recommendations aimed at addressing that risk and underscoring the need for additional funding to support the open source software community.

Risk 119
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Lazarus APT Continues to Exploit Log4j Vulnerability

SecureWorld News

Lazarus, the notorious North Korean hacking group, has once again made headlines, this time by exploiting the Log4j vulnerability, despite it being disclosed two years ago. The Log4j vulnerability, initially disclosed in 2021, shook the cybersecurity community due to its critical nature.

article thumbnail

FTC to penalize companies hit by Log4J Vulnerability

CyberSecurity Insiders

Going with the latest Log4j News, US Federal Trade Commission (FTC) has warned all the companies that it will take stern action against firms that fail to protect critical information related to Log4j vulnerability. The post FTC to penalize companies hit by Log4J Vulnerability appeared first on Cybersecurity Insiders.

Backups 128
article thumbnail

CISA releases a scanner to identify web services affected by Apache Log4j flaws

Security Affairs

US CISA release of a scanner for identifying web services affected by two Apache Log4j remote code execution vulnerabilities. We published an open-sourced log4j-scanner derived from scanners created by other members of the open-source community. Below is the list of features implemented in the log4j-scanner: Support for lists of URLs.

DNS 112
article thumbnail

Two Linux botnets already exploit Log4Shell flaw in Log4j

Security Affairs

Immediately after the disclosure of the Log4Shell flaw in Log4j library threat actors started including the exploit code in Linux botnets. Researchers at NetLab 360 reported that their Anglerfish and Apacket honeypots were already hit by attacks attempting to trigger the Log4Shell flaw in the Log4j library. Pierluigi Paganini.

DDOS 131
article thumbnail

Apache releases the third patch to address a new Log4j flaw

Security Affairs

Multiple flaws in the Log4J library are scaring organizations worldwide while threat actors are already exploiting them. While the experts were warning that threat actors are actively attempting to exploit a second vulnerability, tracked as CVE-2021-45046 , disclosed in the Log4j library a third security vulnerability made the headlines.

Software 140