News

If you're not certain whether your Java project is free from Log4j vulnerabilities, you should try this easy-to-use scanning tool immediately.
A group of developers and maintainers scrambled to secure the Log4j vulnerability over the weekend, but there is still a lot of work to do to clean up the mess.
As cybercriminals scan for susceptible servers, there are steps you can take to mitigate the Log4j critical vulnerability.
Why you may already be at risk, how to detect and mitigate the Log4j vulnerabilities now, and how to improve your code security in the future.
NSCS warns that the Log4j flaw won't be fixed overnight and that defenders could suffer burnout during the process.
Using its integration with PowerBI, Device42 has built dashboards designed to help IT teams find and remediate Log4j issues in real time.
Attackers are actively exploiting a critical vulnerability in Apache Log4j, a logging library that’s used in potentially millions of Java-based applications, including web-based ones.
The Log4j 2 vulnerability was a black eye for the Java community. Here's how to protect yourself today, and how the community can protect itself in the future.
Open-source software is everywhere now, but the Log4j flaw that affects Java enterprise applications is a reminder of what can go wrong in the complicated modern software supply chain.
The vulnerability itself is named, Log4Shell. Log4j Critical Log4Shell Vulnerability Log4j is a Java library that adds a drop-in functionality to many online software products.