extrahop | Apr 11, 2016
Featured Articles
Practical Steps for Responding to the CISA Warning on Russian Cyber Attacks
- Mark Bowling
- March 14, 2022
Learn common attack techniques and get practical tips for implementing CISA's Shields Up guidance.
How the Spring4Shell Zero-Day Vulnerability Works
- Edward Wu
- Updated May 3, 2022
Learn how the Spring4Shell zero-day vulnerability works and how it could be weaponized by attackers.
Detect Log4j Attacks Hiding in Encrypted Traffic
- Jeff Costlow
- December 17, 2021
Learn how attackers are using encrypted protocols to hide Log4j attacks and why decryption has become a necessary capability for detection.