The new Log4j vulnerability is similar to Log4Shell in that it also affects the logging library, but this DoS flaw has to do with Context Map lookups, not JNDI.
Threatpost
Posts tagged "Third"
IOTW: End-Of-Life Third Party Software Responsible For Singtel Hack
Bank account information was stolen from 28 former employees. A few dozen credit card numbers belonging to staff members of a Singtel corporate customer and information from 23 related enterprises wer…
IOTW: World’s Third Most Valuable Football Club Hit By Cyber Attack
Man. United is being praised for its quick response to the threat and transparency surrounding the incident. An incident response plan was followed, which helped quickly disseminate information to key…
IOTW: World’s Third Largest Music Company Falls Prey To Magecart Attack
Protecting against Mageware attacks isn’t automatic or easily applied. It takes a team to develop a zero-trust strategy specifically regarding JavaScript that only allows specific scripts to access se…