Tag: vulnerabilities
How We Were Able to Help Our Customers With the Log4j 0Day
Many security teams are still working overtime to patch and protect against any log4j-related...
VIEW MOREDigital Hygiene Tip From Our SOC: Update Your Cipher Suites and Certificates
It’s January, and most of us are hitting the gym, eating salads, and resolving to take better...
VIEW MORELog4j2: What We’ve Seen, What We Expect
We’re about a week and a half into the release of the Log4j2 vulnerability,...
VIEW MORETips From the ThreatX SOC: Managing the Log4j Vulnerability
The Log4j vulnerability has created a lot of chaos for security professionals. While there is no...
VIEW MORELog4j Update: Threat to Local Hosts – ThreatX Response
Researchers have discovered a new attack vector that may allow an attacker to trigger the Log4j...
VIEW MOREDetecting and Blocking Log4j2: ThreatX Retro
Security pros are having a week. “No rest for the weary” would be an...
VIEW MOREWhy Security Teams Need to Virtual Patch
We live in a world where new application security vulnerabilities are discovered daily....
VIEW MOREAPI Vulnerability Lives at the Heart of the Breach
*We are thrilled to introduce and feature David Geer on the ThreatX Blog. David is a content...
VIEW MORE