There’s a strong correlation between those entities that scan and remediate the Log4J vulnerability, and those that don’t. Pictured: A doctor at the Navy Medicine Readiness and Training Command at San Diego’s Virtual Medical Operations Center uses a robotic surgical system during a…
Source: www.scmagazine.com – Read more

Hazy Hawk Exploits Organizations’ DNS Gaps to Abuse Cloud Resources & Deliver Malware
Security researchers have identified a threat actor called “Hazy Hawk” that is hijacking abandoned cloud resources from prominent organisations to distribute scams and malware. The