In June of last year, Cox Media Group (CMG) IT systems and live streams were the targets of a ransomware attack. The Microsoft Threat Intelligence Center (MSTIC) has attributed the attack to an …
APT ‘Aquatic Panda’ Targets Universities with Log4Shell Exploit Tools
Researchers at CrowdStrike recently released a report detailing an attempt by the advanced persistent threat group Aquatic Panda to steal industrial intelligence and military secrets. Aquatic Panda …
Continue Reading about APT ‘Aquatic Panda’ Targets Universities with Log4Shell Exploit Tools
Alibaba Suffers Government Crackdown Over Log4j
Alibaba, a Chinese tech giant, has reportedly been criticized by China's top tech regulator for failing to report the infamous Log4j vulnerability quick enough. The firm's Alibaba Cloud business did …
Continue Reading about Alibaba Suffers Government Crackdown Over Log4j
Five Eyes Issue Joint Log4Shell Advisory: “Agencies Strongly Urge All Organizations Take Immediate Action to Protect their Networks”
The Five Eyes intelligence allies - government agencies in the United States, United Kingdom, Australia, Canada, and New Zealand - issued a joint Cybersecurity advisory (CSA) days before the Christmas …
Conti Ransomware Gang Has Full Log4Shell Attack Chain
According to new reports, the sophisticated Russia-based Conti ransomware group has become the first group to weaponize Log4j2 with a full attack chain. Last week, the group became the first …
Continue Reading about Conti Ransomware Gang Has Full Log4Shell Attack Chain
SAP Kicks Log4Shell Vulnerability Out of 20 Apps
SAP has been working around the clock to patch apps vulnerable to the Log4Shell flaw, releasing 21 fixes in its Patch Tuesday update. SAP has identified 32 different apps that have been affected by …
Continue Reading about SAP Kicks Log4Shell Vulnerability Out of 20 Apps
CISA Apache Log4j Vulnerability Guidance Webpage Up and Running with Mitigation Guidance from JCDC Partners
Relative to other cyber incidents in the last few months, Log4j is proving severely problematic. If you are in the middle of your impact and mitigation assessment, hands down the most important …