• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH

Search Results: Log4j

Cybercriminals Target Linux-based Systems With Ransomware and Cryptojacking Attacks

February 9, 2022 TechDecisions Staff Leave a Comment

VMware report finds more than half of Cobalt Strike users are using the tool illicitly PALO ALTO, Calif.–(BUSINESS WIRE)–As the most common cloud operating system, Linux is a core part of digital infrastructure and is quickly becoming an attacker’s ticket into a multi-cloud environment. Current malware countermeasures are mostly focused on addressing Windows-based threats, leaving […]

Read More

SBOMs, Microsoft, Salus

SBOMs Will Become A Necessity In IT Ecosystem

New research suggests that a software bill of materials (SBOM) will become a critical piece of software supply chain security.

February 4, 2022 Zachary Comeau Leave a Comment

IT professionals and software developers should prepare for Software Bills of Materials (SBOMs) to become a regular part of the IT ecosystem, according to new research from the Linux Foundation. The term, while already known to IT professionals, became more popular in the wake of several software supply chain security crises, including the SolarWinds compromise, […]

Read More

Immutability Specialist Codenotary Now Offers Trusted Software Supply Chain Assurance in a Fast, Easy, Inexpensive Cloud

February 1, 2022 TechDecisions Staff Leave a Comment

Codenotary Cloud reduces cost to identify vulnerabilities in software by 80% HOUSTON–(BUSINESS WIRE)–#Immutability—Codenotary, the immutability specialist that can instantly identify untrusted components in software, today announced Codenotary Cloud, a fast, easy, inexpensive way to determine where a vulnerability, such as Log4j, exists. Codenotary Cloud reduces the cost to almost instantly identify and remove unwanted artifacts […]

Read More

Trellix Sees Advanced Persistent Threat Actors and Ransomware Groups Focus on Financial Services in Third Quarter of 2021

January 31, 2022 TechDecisions Staff Leave a Comment

Key Findings In Q3 2021, the financial sector was the most targeted seeing 22% of ransomware and 37% of APT detections Publicly reported cyber incidents in the financial sector increased 21% compared to Q2 2021 Nearly half of APT activity monitored appears to originate from Russian and Chinese backed groups Cobalt Strike attack suite abused […]

Read More

Software Supply Chain Security Specialist Codenotary Raises $12.5 Million in Series B Round

January 20, 2022 TechDecisions Staff Leave a Comment

Founder of Xen and KVM hypervisors turns his sights to security during year highlighting critical vulnerabilities in software delivery HOUSTON–(BUSINESS WIRE)–#SBOM—Codenotary, the immutability specialist that can instantly identify untrusted components in software, today announced that it has raised $12.5 million in series B funding by new and existing investors Bluwat, Elaia and others. The financing […]

Read More

White House Open Source Security Summitt

What Tech Firms Are Saying About The White House’s Open-Source Security Summit

White House's Open-Source Security Summit renews calls for software code transparency and more support for the open-source community.

January 13, 2022 Zachary Comeau Leave a Comment

After the Log4j vulnerabilities threw a wrench into the holiday plans of IT and cybersecurity folks last month, the federal government has taken swift action to address the issue, including instructing federal agencies to quickly patch and mitigate the vulnerability and making other resources available to the larger IT community. Now, the issue has been […]

Read More

DDoS, NETSCOUT Arbor Insight

DDoS Attacks Combined With Extortion Attempts Exploded in Q4

According to new data from Cloudflare, the amount of DDoS attacks being layered with a ransom demand increased by 175% in the fourth quarter.

January 12, 2022 Zachary Comeau Leave a Comment

According to new data from web infrastructure and security firm Cloudflare, the amount of DDoS attacks being layered with a ransom demand are increasing significantly. The company’s DDoS Attack Trends report for the fourth quarter of 2021 revealed a ransom DDoS attack increase of 29% for the year and a whopping 175% for the quarter. […]

Read More

Microsoft Nobelium AD FS

Cyberattacks Increased By 50% In 2021

Researchers with Check Point say cyberattacks in 2021 increased by 50% when compared to 2020.

January 11, 2022 Zachary Comeau Leave a Comment

Not that anyone assumed differently, but cyberattacks proliferated the internet in 2021, with researchers noting 50% more attacks per week on corporate networks compared to 2020, according to cybersecurity firm Check Point. The 2021 data comes just a few months after the company reported in October a 40% increase in cyberattacks globally. However, the fourth […]

Read More

Data Theorem Releases Critical Insight into Log4Shell Vulnerability to Assist Security Teams in Addressing the Exploit

December 23, 2021 TechDecisions Staff Leave a Comment

Data Theorem Analyzer Engine Discovers Unique Mutation of Log4Shell to Help Research Teams Detect APIs and Servers Vulnerable to Attack PALO ALTO, Calif.–(BUSINESS WIRE)–#AppSec–Data Theorem, Inc., a leading provider of modern application security, today announced it has uncovering specific scenarios that can help IT teams discover the Log4Shell vulnerability exploit and stop it from causing […]

Read More

Finite State Boosts Velocity and Depth of IoT Vulnerability Discovery Through New Advanced Search

December 15, 2021 TechDecisions Staff Leave a Comment

Advanced search capability provides holistic contextual view of everything within IoT devices COLUMBUS, Ohio–(BUSINESS WIRE)–Finite State, the product security leader for connected devices, has released a search function for its platform that allows users to gain full visibility into their embedded devices and identify whether a known vulnerability is present. Internet of Things (IoT) devices […]

Read More

  • « Go to Previous Page
  • Go to page 1
  • Interim pages omitted …
  • Go to page 4
  • Go to page 5
  • Go to page 6
  • Go to page 7
  • Go to Next Page »

Primary Sidebar

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial Integrator Security Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2023 Emerald X, LLC. All rights reserved.