PRODUCT UPDATE
All Invicti (formerly Netsparker) and Acunetix products now detect the CVE-2021-44228 Log4j-related vulnerability (known as Log4Shell or LogJam). More in our official statement.
OUR PERSPECTIVE
Invicti President and COO Mark Ralls and Chief Product Officer Sonali Shah on the Log4Shell vulnerability, how the Invicti engineering teams have been responding, and what organizations need to be thinking about in the bigger picture.
ON-DEMAND WEBINAR
Join Invicti Chief Product Officer Sonali Shah for a special webinar: Log4j Lessons Learned: How to Prepare Your Company to Respond to the Next Zero-Day Vulnerability. Watch here.
ADDITIONAL RESOURCES
December 21: Log4j: A forcing function to adopt long-overdue continuous security
December 17: Why Log4Shell could be the worst software vulnerability ever
IN THE NEWS
- BetaNews: 2022 will be the year of broadened supply chain security — here’s why
- VentureBeat: “With Log4j vulnerability, the full impact has yet to come”
- Ars Technica: Hackers launch over 840,000 attacks through Log4J flaw
- Security Boulevard: SHARED INTEL: LogJ4 vulnerability presents a gaping attack vector companies must heed in 2022
- ThreatPost: What the Log4Shell bug means for SMBs: experts weigh In
- The Cyberwire: Log4j is now undergoing active exploitation
TECHNICAL CUSTOMER RESOURCES