• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Project of the Week
  • About Us
    SEARCH

Search Results: Log4j

Microsoft Fortra healthcare ransomware

Ransomware Attacks Increase 105% In 2021, SonicWall Report Finds

SonicWall's Cyber Threat Report reveals that ransomware volume has exploded over the last two years, rising 232% since 2019.

February 17, 2022 Zachary Comeau Leave a Comment

Ransomware actors had a field day last year, conducting over 623 million ransomware attacks around the world, resulting in a 105% increase from the year prior, according to cybersecurity firm SonicWall. The company’s 2022 Cyber Threat Report released Thursday also finds that ransomware volume has exploded since before the pandemic, rising 232% since 2019. That […]

Read More

Cassandra Apache vulnerability

Patch This Apache Cassandra Vulnerability

Researchers at JFrog Security have released details of a remote code execution issue with the popular NoSQL database, Apache Cassandra.  

February 17, 2022 TD Staff Leave a Comment

Researchers at JFrog Security have released details of a remote code execution vulnerability with the popular NoSQL database, Apache Cassandra. The popular database is used by enterprises such as Netflix, Twitter, Constast Contact, Cisco, Reddit and many more. The open source database is also used by devOps and cloud-native development circles and companies that provide […]

Read More

Proofpoint CISO, CISOs cyberattack

Red Canary Adds 24/7 Remediation, Protection Features

Cybersecurity firm Red Canary has added new protections for systems beyond the endpoint and a new active 24/7 threat response offering.

February 15, 2022 Zachary Comeau Leave a Comment

Threat detection provider Red Canary has added new capabilities and active remediation features to its cybersecurity offerings, including protections for systems beyond the endpoint and a new active 24/7 threat response offering. According to the company, the new threat investigation and active remediation features are designed to help customers investigate, triage and respond to threats, […]

Read More

ZeroFox Releases 2022 Forecast Report Anticipating Increases in Ransomware, Third-Party Compromises and Malware-as-a-Service

February 10, 2022 TechDecisions Staff Leave a Comment

New report details expected threat activity trends and recommendations for security teams to address external threats WASHINGTON–(BUSINESS WIRE)–ZeroFox, a leading external cybersecurity provider, today published the “2022 Threat Intelligence Forecast,” detailing expected cybercriminal behavior trends including ransomware, malware-as-a-service, vulnerabilities and exploits. Within the report, the ZeroFox Intelligence team reviews 12 months of threat actor activity […]

Read More

Cybercriminals Target Linux-based Systems With Ransomware and Cryptojacking Attacks

February 9, 2022 TechDecisions Staff Leave a Comment

VMware report finds more than half of Cobalt Strike users are using the tool illicitly PALO ALTO, Calif.–(BUSINESS WIRE)–As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current malware countermeasures are mostly focused on addressing Windows-based threats, leaving […]

Read More

SBOMs, Microsoft, Salus

SBOMs Will Become A Necessity In IT Ecosystem

New research suggests that a software bill of materials (SBOM) will become a critical piece of software supply chain security.

February 4, 2022 Zachary Comeau Leave a Comment

IT professionals and software developers should prepare for Software Bills of Materials (SBOMs) to become a regular part of the IT ecosystem, according to new research from the Linux Foundation. The term, while already known to IT professionals, became more popular in the wake of several software supply chain security crises, including the SolarWinds compromise, […]

Read More

Immutability Specialist Codenotary Now Offers Trusted Software Supply Chain Assurance in a Fast, Easy, Inexpensive Cloud

February 1, 2022 TechDecisions Staff Leave a Comment

Codenotary Cloud reduces cost to identify vulnerabilities in software by 80% HOUSTON–(BUSINESS WIRE)–#Immutability—Codenotary, the immutability specialist that can instantly identify untrusted components in software, today announced Codenotary Cloud, a fast, easy, inexpensive way to determine where a vulnerability, such as Log4j, exists. Codenotary Cloud reduces the cost to almost instantly identify and remove unwanted artifacts […]

Read More

Trellix Sees Advanced Persistent Threat Actors and Ransomware Groups Focus on Financial Services in Third Quarter of 2021

January 31, 2022 TechDecisions Staff Leave a Comment

Key Findings In Q3 2021, the financial sector was the most targeted seeing 22% of ransomware and 37% of APT detections Publicly reported cyber incidents in the financial sector increased 21% compared to Q2 2021 Nearly half of APT activity monitored appears to originate from Russian and Chinese backed groups Cobalt Strike attack suite abused […]

Read More

Software Supply Chain Security Specialist Codenotary Raises $12.5 Million in Series B Round

January 20, 2022 TechDecisions Staff Leave a Comment

Founder of Xen and KVM hypervisors turns his sights to security during year highlighting critical vulnerabilities in software delivery HOUSTON–(BUSINESS WIRE)–#SBOM—Codenotary, the immutability specialist that can instantly identify untrusted components in software, today announced that it has raised $12.5 million in series B funding by new and existing investors Bluwat, Elaia and others. The financing […]

Read More

White House AI Regulations, ChatGPT, Generative AI

What Tech Firms Are Saying About The White House’s Open-Source Security Summit

White House's Open-Source Security Summit renews calls for software code transparency and more support for the open-source community.

January 13, 2022 Zachary Comeau Leave a Comment

After the Log4j vulnerabilities threw a wrench into the holiday plans of IT and cybersecurity folks last month, the federal government has taken swift action to address the issue, including instructing federal agencies to quickly patch and mitigate the vulnerability and making other resources available to the larger IT community. Now, the issue has been […]

Read More

  • « Go to Previous Page
  • Page 1
  • Interim pages omitted …
  • Page 4
  • Page 5
  • Page 6
  • Page 7
  • Go to Next Page »

Primary Sidebar

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Contact Us
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSYour Privacy ChoicesTERMS OF USEPRIVACY POLICY

© 2025 Emerald X, LLC. All rights reserved.