"CyberGuard: Malware and Vulnerabilities Analysis"ElasticCase Blue Team LabCategory: Threat HuntingAug 5Aug 5
Mark MaguireTuesday Morning Threat Report: May 21, 2024Proton Mail gives client data to police, the FBI seizes BreachForums (again), and a security flaw is found in Wi-FiMay 21May 21
Marta ParisThe Hateful 8: Log4Shell (1/8)When I first started with this blog project, as a good ex-UX designer, first thing I did was learning about my target audience, that’s to…Aug 13, 2023Aug 13, 2023
0x4C3DDLog4j Vulnerability (CVE-2021–44228) — Log4Shell: A Zero-Day Remote Code Execution ExploitIn the realm of Java application development, effective logging and monitoring play an indispensable role in maintaining the reliability…Aug 9, 2023Aug 9, 2023
whoamiDigital Forensics — Log4jShellHello everyone, let’s do the investigation on Log4shell exploitability. Know what is log4shell, how attackers to achieve and how to…May 28, 2023May 28, 2023
Hamdi SevbeninCodingNinjaBlogsResearch on the Recall of the Log4jAn extensive review of the vulnerability of Log4j.May 4, 20232May 4, 20232
Next at ChaseinNext at ChaseThe Log4Shell Chronicles, Part 2: Lessons LearnedBy: Haiying Guo and Panna PavangadkarFeb 18, 2023Feb 18, 2023
Next at ChaseinNext at ChaseThe Log4Shell Chronicles, Part 1: Holiday FrenzyBy: Haiying Guo and Panna PavangadkarFeb 18, 2023Feb 18, 2023