Find out how to deal with the Log2Shell vulnerability right across your estate. Yes, you need to patch, but that helps everyone else along with you!
Read moreWhat to Do While Waiting for the Log4J Updates
December 11 2021This Tech Tip outlines how enterprise defenders can mitigate the risks of the Log4j vulnerabilities for the short-term while waiting for updates.
Read moreFriday Squid Blogging: The Far Side Squid Comic
December 10 2021The Far Side is always good for a squid reference. Here’s a recent one. As usual, you can also use this squid post to talk about the security stories in...
Read moreSecurity Experts Sound Alarm on Zero-Day in Widely Used Log4j Tool
December 10 2021A remote code execution vulnerability in Log4j presents a bigger threat to organizations than even the infamous 2017 Apache Struts vulnerability that felled Equifax, they say.
Read moreNIST Cyber-Resiliency Framework Extended to Include Critical Infrastructure Controls
December 10 2021The latest NIST publication outlines how organizations can build systems that can anticipate, withstand, recover from, and adapt to cyberattacks.
Read moreRussian National Sentenced for Role in Kelihos Botnet
December 10 2021Oleg Koshkin was sentenced for running a crypting service used to hide the Kelihos malware from antivirus software.
Read moreDark Reading Reflects on a Legacy and Life Well-Written: Tim Wilson
December 10 2021The Dark Reading editorial team, along with contributing writers and editors, share their favorite stories and memories of co-founder and editor-in-chief Tim Wilson, an influential editor and well-respected thought...
Read more“Log4Shell” Java vulnerability – how to safeguard your servers
December 10 2021Just when you thought it was safe to relax for the weekend... a critical bug showed up in Apache's Log4j product
Read moreExploring ransomware and other data integrity risks from accelerated digital transformation in the wake of COVID-19.
Read more
Recent Comments