Blog

log4j vulnerability

log4j vulnerability

The ubiquitous nature of Log4j is part of what makes CVE-2021-44228 so dangerous. Millions of applications, such as iCloud, Steam, and Minecraft, use Log4j for logging. An attacker simply needs to get the app to log a special string to successfully exploit this vulnerability.

Read More
Top cloud security takeaways from RSA 2022

Top cloud security takeaways from RSA 2022

Key cloud security takeaways from RSA 2022 include the need to shore up cloud application security, consolidate tools and mitigate cybersecurity skills shortages, according to ESG

Read More
Unauthenticated XXE to RCE in ManageEngine ADAudit Plus

Unauthenticated XXE to RCE in ManageEngine ADAudit Plus

CVE-2022-28219 is an unauthenticated remote code execution vulnerability affecting Zoho ManageEngine ADAudit Plus, a compliance tool used by enterprises to monitor changes to Active Directory

Read More
DHS Issues Emergency Directive To Prevent Hacking Attack

DHS Issues Emergency Directive To Prevent Hacking Attack

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolorer

Read More