Log4Shell – Critical Vulnerability Discovered in Apache Log4j

Apache Log4j is a Java-based logging utility, that is part of the Apache Logging Services, a project of the Apache Software Foundation. On December 9, 2021, a zero-day vulnerability involving arbitrary code execution in Log4j 2 was discovered by Chen Zhaojun of Alibaba Cloud Security Team and disclosed via the project´s GitHub repository and given the descriptor „Log4Shell”. Tenable characterized it as „the single biggest, most critical vulnerability of the last decade”.

All you need to know about Apple’s new iPhone Privacy Features

data security

With the release of iOS 14.5, the iPhone software asks customers whether they want apps to follow their digital behavior. While it may appear to be a minor move, it has already caused ripples throughout the app economy, notably at Facebook and Google, the internet’s two largest ad companies.

High Availability and Disaster Recovery

Disaster can strike at any time. Will you be ready to react quickly and efficiently? This article aims to show how the application architecture, especially the deployment architecture, can help us prepare for DR.

Disaster Recovery & Business Continuity

What are your associations when someone talks about a catastrophe? Hurricane, flood, etc. However, we are aware that our data may also be exposed to various threats. In this article, I will explain what types of threats our data is exposed to, what DR plans are, and how to protect your data from disasters.

1.3 million Database with Clubhouse Users Available to the Public! It’s not a Leak, it’s Data Scraping

Recently, the world has been informed about another “leak”. According to the Cyber ​​News portal, the database of over 1.3 million records from Clubhouse was published by hackers. Is the so-called data scraping a fresh trend among cybercriminals who want to earn money by selling data? It’s another cybersecurity topic in addition to the most… Continue reading 1.3 million Database with Clubhouse Users Available to the Public! It’s not a Leak, it’s Data Scraping