{"id":11927,"date":"2022-04-01T19:32:04","date_gmt":"2022-04-01T17:32:04","guid":{"rendered":"https:\/\/www.show.it\/experts-warn-defenders-dont-relax-on-log4j\/"},"modified":"2022-04-01T19:32:04","modified_gmt":"2022-04-01T17:32:04","slug":"experts-warn-defenders-dont-relax-on-log4j","status":"publish","type":"post","link":"https:\/\/www.show.it\/en\/experts-warn-defenders-dont-relax-on-log4j\/","title":{"rendered":"Experts Warn Defenders: Don&#8217;t Relax on Log4j"},"content":{"rendered":"<p><span><strong><span>It&#8217;s been four months since the <a href=\"https:\/\/www.securityweek.com\/exploits-swirling-major-security-defect-apache-log4j\">Log4j issue exploded onto the internet<\/a>. All the major software vendors affected by it have by now released patches \u2013 but even where companies have patched, it would be wrong to relax.<\/span><\/strong><\/span><\/p>\n<p><a href=\"https:\/\/www.securityweek.com\/experts-warn-defenders-dont-relax-log4j\" target=\"_blank\" rel=\"noopener\">read more<\/a><\/p>\n<div class=\"feedflare\">\n<a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=a9KIC7-dAn0:A_FYJI8fmF8:yIl2AUoC8zA\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=yIl2AUoC8zA\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=a9KIC7-dAn0:A_FYJI8fmF8:-BTjWOF_DHI\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=a9KIC7-dAn0:A_FYJI8fmF8:-BTjWOF_DHI\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=a9KIC7-dAn0:A_FYJI8fmF8:dnMXMwOfBR0\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=dnMXMwOfBR0\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=a9KIC7-dAn0:A_FYJI8fmF8:V_sGLiPBpWU\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=a9KIC7-dAn0:A_FYJI8fmF8:V_sGLiPBpWU\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=a9KIC7-dAn0:A_FYJI8fmF8:qj6IDK7rITs\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=qj6IDK7rITs\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=a9KIC7-dAn0:A_FYJI8fmF8:gIN9vFwOqvQ\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=a9KIC7-dAn0:A_FYJI8fmF8:gIN9vFwOqvQ\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=a9KIC7-dAn0:A_FYJI8fmF8:TzevzKxY174\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?d=TzevzKxY174\" border=\"0\"><\/a> <a href=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?a=a9KIC7-dAn0:A_FYJI8fmF8:F7zBnMyn0Lo\"><img decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~ff\/securityweek?i=a9KIC7-dAn0:A_FYJI8fmF8:F7zBnMyn0Lo\" border=\"0\"><\/a>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s been four months since the Log4j issue exploded onto the internet. All the major software vendors affected by it have by now released patches \u2013 but even where companies have patched, it would be wrong to relax. read more<\/p>\n","protected":false},"author":2,"featured_media":11928,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[29,13,20,16,28,25,14,10,30,31,21,42,34,11,17,12,19,23,24],"tags":[],"class_list":["post-11927","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-security","category-audits","category-cloud-security","category-compliance","category-cyberwarfare","category-data-protection","category-email-security","category-endpoint-security","category-fraud-identity-theft","category-identity-access","category-malware","category-mobile-security","category-network-security","category-news-industry","category-phishing","category-privacy","category-virus-malware","category-vulnerabilities","category-whitepapers"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/11927","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/comments?post=11927"}],"version-history":[{"count":0,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/11927\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media\/11928"}],"wp:attachment":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media?parent=11927"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/categories?post=11927"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/tags?post=11927"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}