433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (727) 493-2351

BrandPost: 5 Lessons Learned from Log4j

In December, a critical Log4j vulnerability known as Log4Shell impacted the world of security in ways that few vulnerabilities previously have. It’s clear by now that the potential for damage from this vulnerability is quite high, and will last for a very long time. It’s hard not to compare Log4Shell with the emergence of EternalBlue over five years ago. Both are critical code injection vulnerabilities requiring patching, with severe consequences for those who ignore it. But unlike EternalBlue, which is only found in Windows, Log4Shell is present in a myriad of applications and is notoriously difficult to track. Those infected by EternalBlue were seen as victims, while those infected by Log4Shell are considered much more culpable by regulators. And while EternalBlue was almost immediately abused for the widespread infection of WannaCry, Log4Shell has yet to manifest a high-profile attack. To read this article in full, please click here
http://news.poseidon-us.com/SHW0X2

BrandPost: 5 Lessons Learned from Log4j

In December, a critical Log4j vulnerability known as Log4Shell impacted the world of security in ways that few vulnerabilities previously have. It’s clear by now that the potential for damage from this vulnerability is quite high, and will last for a very long time. It’s hard not to compare Log4Shell with the emergence of EternalBlue over five years ago. Both are critical code injection vulnerabilities requiring patching, with severe consequences for those who ignore it. But unlike EternalBlue, which is only found in Windows, Log4Shell is present in a myriad of applications and is notoriously difficult to track. Those infected by EternalBlue were seen as victims, while those infected by Log4Shell are considered much more culpable by regulators. And while EternalBlue was almost immediately abused for the widespread infection of WannaCry, Log4Shell has yet to manifest a high-profile attack. To read this article in full, please click here
http://news.poseidon-us.com/SHW0X2

BrandPost: 5 Lessons Learned from Log4j

In December, a critical Log4j vulnerability known as Log4Shell impacted the world of security in ways that few vulnerabilities previously have. It’s clear by now that the potential for damage from this vulnerability is quite high, and will last for a very long time. It’s hard not to compare Log4Shell with the emergence of EternalBlue over five years ago. Both are critical code injection vulnerabilities requiring patching, with severe consequences for those who ignore it. But unlike EternalBlue, which is only found in Windows, Log4Shell is present in a myriad of applications and is notoriously difficult to track. Those infected by EternalBlue were seen as victims, while those infected by Log4Shell are considered much more culpable by regulators. And while EternalBlue was almost immediately abused for the widespread infection of WannaCry, Log4Shell has yet to manifest a high-profile attack. To read this article in full, please click here
http://news.poseidon-us.com/SHW0X2

BrandPost: Financial Services Malware Just Won’t Die. What to Do About It.

“Emotet has been one of the most professional and long-lasting cybercrime services out there,” according to Europol. It was thought the malware, first discovered in 2014, had been vanquished by law enforcement agencies from eight countries in January 2021. However, it reportedly resurfaced this past November. To read this article in full, please click here
http://news.poseidon-us.com/SHVvk6

BrandPost: Financial Services Malware Just Won’t Die. What to Do About It.

“Emotet has been one of the most professional and long-lasting cybercrime services out there,” according to Europol. It was thought the malware, first discovered in 2014, had been vanquished by law enforcement agencies from eight countries in January 2021. However, it reportedly resurfaced this past November. To read this article in full, please click here
http://news.poseidon-us.com/SHVvk6

BrandPost: 5 Cyber Criminal Ransomware Mistakes to Make You Smile

Even criminals have an off day. After all, human-led ransomware attacks are just that; human. Which means the criminals behind them can often make errors. While ransomware adversaries can appear scary to defenders, with a lot of bravado to back up their threats, mistakes reveal that there are many examples of ransomware attacks that, unfortunately for the criminals, didn’t go according to plan. Here are the top five ransomware adversary mishaps Sophos Rapid Response incident responders recently spotted during investigations. 1 – Go Ahead, Make My Day To read this article in full, please click here
http://news.poseidon-us.com/SHVsrm