Category: Vulnerabilities
How We Were Able to Help Our Customers With the Log4j 0Day
Many security teams are still working overtime to patch and protect against any log4j-related...
VIEW MORELog4j2: What We’ve Seen, What We Expect
We’re about a week and a half into the release of the Log4j2 vulnerability,...
VIEW MORETips From the ThreatX SOC: Managing the Log4j Vulnerability
The Log4j vulnerability has created a lot of chaos for security professionals. While there is no...
VIEW MOREDetecting and Blocking Log4j2: ThreatX Retro
Security pros are having a week. “No rest for the weary” would be an...
VIEW MORECyberattacks in 2022 Will Look Familiar
We’re wrapping up another year and facing the inevitable questions of, what do you predict will...
VIEW MORELog4j2 Vulnerability Mitigation at ThreatX
On December 9, 2021, a vulnerability was reported in Log4j2, an open source tool widely used by...
VIEW MOREWhy Signature-Based Detection Struggles to Keep Up With the New Attack Landscape
Change is an inherent part of cybersecurity as attackers constantly look for new ways to evade and...
VIEW MOREVisibility into API Deployment
APIs are becoming increasingly prevalent in the web applications we use each day. As the number of...
VIEW MOREWhy Security Teams Need to Virtual Patch
We live in a world where new application security vulnerabilities are discovered daily....
VIEW MOREFacing the Apache Struts Vulnerability with Confidence Using ThreatX
Last week, the Apache Software Foundation announced a new Apache Struts vulnerability...
VIEW MOREUsing Android Proxy Browsers – Convenience without Web Application Security
Slow. Antiquated. Android. Remember the old Android device you used to use? Many of us have old...
VIEW MOREUsing & Protecting Microservices – A Double-Edged Sword
Microservices and containers are a hot topic right now – and for various reasons. They are...
VIEW MORE