Akamai CTO Charlie Gero shows how the Log4j threat surface could extend to unpatchable embedded and IoT devices.
Installing Rogue-jndi on Kali Linux
Following the previous tutorial in which we looked at the log4j vulnerability in VMWare vSphere server, I got some questions about how to set up a malicious LDAP server on Linux. The attacker controlled LDAP server is required to provide the malicious …
Cyber-Attack on New Mexico County
Bernalillo County is investigating a suspected ransomware attack
Cerberus Sentinel Acquires True Digital Security
Cerberus Cyber Sentinel Corporation purchases American cybersecurity operations and compliance company
Monsanto Employee Stole Trade Secret
Agribusiness worker stole intellectual property from employer and tried to sell it to China
A Log4j Retrospective Part 1: Vulnerability Background
Learn about the widely used Java-based logging library Log4j and how its vulnerability and other capabilities presented a major opportunity to attackers.
Abuse and Fraud Prevention’s Co-Created Future ? Predictions for 2022 and Beyond
Explore some of the Akamai Abuse and Fraud Prevention team?s predictions for the future of abuse and fraud protection in 2022 and beyond.
Election Fraud Firm to Shut Down After Claims Debunked
Security business closes following legal dispute and error-strewn report
Thousands of Schools Impacted After IT Provider Hit by Ransomware
Finalsite said the attack occurred on Tuesday
Researchers Warn of New Log4Shell-Like Java Vulnerability
RCE bug found in popular H2 database console