Springe zum Hauptinhalt

Mega-Menü-Produkt-Services_Pfeil

HYPERSECURE PlatformZero Trust Strategy

 

COMPLIANCE

Mega-Menü-Blog_Pfeil

News, Information AND Tips ABOUT IT SecurityTo the Blog
Support
Service Desk Partner Portal

 

Mega-Menü-Blog_Pfeil

News, Information and Tips about IT Security
To the BlogNewsletter

DriveLock Products Not Affected by Log4j Vulnerability

DriveLock Products Not Affected by Log4j Vulnerability


National information security authorities are warning:
A critical vulnerability, also known as Log4Shell, LogJam or CVE-2021-44228, has been detected in Java Log4j library.

The vulnerability exploits the use of JNDI configurations in Java applications. JNDI (Java Naming and Directory Interface) is an application programming interface (API) that provides naming and directory capabilities to applications written using the Java programming language.

CVE-2021-44228 does not affect DriveLock software because DriveLock applications do not use Java or its runtime environment.

Log4j Zero-Day Exploit: Vulnerability Scanner Shows Need for Attention

Log4j Zero-Day Exploit: Vulnerability Scanner Shows Need for Attention

Log4j has been the talk of the town for several weeks now. We have also already commented on this in a detailed post blog about Log4j and Log4Shell.

Read More
Log4j Hack – the Patch Came Too Late

Log4j Hack – the Patch Came Too Late

"In a sensational wave of attacks, tens of thousands of servers worldwide fell victim to cyberattacks in December 2021 due to a security...

Read More
Comment on Bluetooth vulnerability Blueborne

Comment on Bluetooth vulnerability Blueborne

Dear readers, News of a security vulnerability in Bluetooth connections caused a furore last week among manufacturers and users of Bluetooth-enabled...

Read More