Dark Mode

Free Trial

The GYTPOL Gazette

Log4J / Log4Shell: How to Find It & Fix It

It’s been a while since FireEye first announced that they were victim of the now infamous SolarWinds Supply Chain Attack. It's gone down in history as one of the most sophisticated and far r...

Log4J / Log4Shell: How to Find It & Fix It

It’s been a while since FireEye first announced that they were victim of the now infamous SolarWinds Supply Chain Attack. It's gone down in history as one of the most sophisticated and far r...

3 min read
Image of Limor Bakal
  • 4 min read

Misconfigurations – The Real Vulnerability

By definition, a vulnerability is something, anything that an attacker can target and exploit in order to access an application or environment, or possibly a user.

Misconfigurations – The Real Vulnerability

By definition, a vulnerability is something, anything that an attacker can target and exploit in order to access an application or environment, or possibly a user.

4 min read