
Understanding the Log4j / Log4Shell Vulnerability with GreyNoise
On December 9, 2021, the Log4Shell / Log4j vulnerability, tracked as CVE-2021-44228, was publicly revealed via the project’s GitHub. Since its release, it has been
“Having tried Randori, I would say their discovery mechanisms for external-facing assets are far superior to any other scans we’ve seen from a third party. They leave no stone unturned, passive DNS, PTR records, TLS cert details… they will scrub them all. You may be surprised by what you discover is sitting in the public cloud…”
– Head of IT Security, Global Non-Profit
Conducting a secure cloud migration is like leading a symphony—multiple teams must move together in harmony. During these times of company transition, IT & security leaders are staying a step ahead with Attack Surface Management (ASM), which reveals dangerous blind spots, misconfigurations, and weaknesses.
On December 9, 2021, the Log4Shell / Log4j vulnerability, tracked as CVE-2021-44228, was publicly revealed via the project’s GitHub. Since its release, it has been
Designed for security leaders tasked with managing a growing attack surface, the SANS Attack Surface Management Virtual Conference was live April 14, 2021 as a
See how Randori Recon empowers enterprise organizations to understand their attack surface in order to identify blindspots, process failures and dangerous misconfigurations.