CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Log4Shell Vulnerability
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Log4Shell Vulnerability

Security lock with a hole on computer circuit board showing Log4Shell vulnerability
Cyber SecurityNews

Despite a Year of Warnings and Patching, Nearly 3 Out of 4 Organizations Still Vulnerable to Log4Shell

December 8, 2022
The battle against Log4Shell is proceeding very slowly due to a confluence of factors. It remains buried in a number of assets, particularly legacy systems that are tougher to address. But it also continues to affect organizations via new devices.
Read More
Ilag on keyboard showing Iranian hackers installed crypto miner by exploiting Log4Shell vulnerability
Cyber SecurityNews

Iranian Hackers Installed Crypto Miner in Federal Agency After Exploiting Unpatched Log4Shell Vulnerability

November 25, 2022
Iranian hackers installed crypto miner on federal agency’s network after exploiting unpatched Log4Shell vulnerability on the VMWare Horizon server to gain access. The threat actors moved laterally to the domain controller, compromised credentials and implanted reverse proxies on several hosts to maintain persistence.
Read More

Latest

Hand on keyboard with virtual login screen showing identity and access management

CISA/NSA Identity and Access Management Guidelines Provide Cybersecurity Guidance for Administrators

API connections showing API security

3 Reasons Why CIOs Must Pay Attention to API Security

View of a large coal-fired power plant showing critical infrastructure warning of ransomware attacks by CISA

New CISA Program to Warn Critical Infrastructure Companies of Vulnerabilities That Could Invite Ransomware Attacks

Hand inserting dollar bills in Bitcoin ATM showing crypto theft

Bitcoin ATMs Hacked, Millions in Crypto Stolen as Threat Actors Exploit an Upload Vulnerability

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Categories

Data Privacy
Data Protection
Cyber Security
Tech
Insights
News
Resources

Stay Updated

© 2023 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results