We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.
On 09 December 2021, the world was alerted to the Log4j vulnerability [CVE-2021-44228 aka Log4Shell]. It is likely that threat actors already knew about the vulnerability before this date, says Tom Bienkowski, NETSCOUT Product Marketing Director, because it’s been reported that the vulnerability had been exposed much earlier in Minecraft chat forums. How does Log4j work – and what lessons does it bring? Log4j, which is open-source software provided by the Apache Software Foundation, records errors and routine system operations and sends diagnostic messages about them to system administrators and users. A common example of Log4j is when a user types in or clicks on a bad weblink and they receive a 404 error message. The web server running the domain of the attempted weblink sends a message ...
Image sourced from www.emediait.com Over the past two years, Chief Information Officers (CIOs) and senior IT executives have largely focused their efforts on digital transformation. This is mostly because COVID-19 forced organisations to expedite planned and unplanned re-engineering of their IT environments to fulfil the digital marketplace’s ever-increasing demand. While the top issues for IT departments have traditionally been (and continue to be) digital transformation, cybersecurity, data compliance, and cloud migration, customer experience has also become a top priority. This highlights the necessity to maintain a customer-centric mindset during digital transformation efforts, to increase customer retention, encourage repeat business, and grow revenue. Customer-centric digital transfo...
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.
Image sourced from Packetlabs. According to Russian cybersecurity group Kasperksy, compared to Q1 2021, the number of Distributed Denial of Service (DDoS) attacks in Q1 2022 rose 4.5 times with a considerable number of the attacks likely to be the result of hacktivist activity. Kaspersky says it operates independently from the Russian government, even as its antivirus software is being investigated in Europe. The firm continues that the attacks also showed an unprecedented duration for DDoS sessions, particularly those aimed at state resources and banks. Further information has been included in a report issued by Kaspersky. DDoS Attacks Distributed Denial of Service (DDoS) attacks are designed to interrupt network resources used by businesses and organisations and prevent them from functio...
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit “Cookie Settings” to provide a controlled consent.