News
If you're not certain whether your Java project is free from Log4j vulnerabilities, you should try this easy-to-use scanning tool immediately.
A group of developers and maintainers scrambled to secure the Log4j vulnerability over the weekend, but there is still a lot of work to do to clean up the mess.
As cybercriminals scan for susceptible servers, there are steps you can take to mitigate the Log4j critical vulnerability.
Why you may already be at risk, how to detect and mitigate the Log4j vulnerabilities now, and how to improve your code security in the future.
Using its integration with PowerBI, Device42 has built dashboards designed to help IT teams find and remediate Log4j issues in real time.
Attackers are actively exploiting a critical vulnerability in Apache Log4j, a logging library that’s used in potentially millions of Java-based applications, including web-based ones.
The Log4j 2 vulnerability was a black eye for the Java community. Here's how to protect yourself today, and how the community can protect itself in the future.
The vulnerability itself is named, Log4Shell. Log4j Critical Log4Shell Vulnerability Log4j is a Java library that adds a drop-in functionality to many online software products.
Open-source software is everywhere now, but the Log4j flaw that affects Java enterprise applications is a reminder of what can go wrong in the complicated modern software supply chain.
A critical flaw in a popularly used Java library is being exploited by malicious actors to deliver malware, while security researchers are scanning for vulnerable servers.
Results that may be inaccessible to you are currently showing.
Hide inaccessible results