-
Types of Security Vulnerabilities
- January 28, 2022
- Posted by: admin
- Category: Vulnerability
No CommentsAs the threat landscape changes and advances with time, being able to address the most common types of security vulnerabilities has gained the utmost importance. According to the CWE/SANS Top 25 List, there are three main types of security vulnerabilities: Faulty defenses, Poor resource management & insecure connection between elements.
-
Log4j Vulnerability Assessment
- December 14, 2021
- Posted by: admin
- Category: Vulnerability
Log4j is a Remote Code Execution (RCE) vulnerability, commonly known as Log4Shell or LogJam. Attackers who successfully exploit it on one of the servers will be able to execute arbitrary code and potentially gain complete control of the system.