The recently announced Log4j Shell affects a lot of enterprise applications and systems that use Java or use other software components that use Java. Here is a list of software that has an identified Log4j Shell vulnerability and the corresponding remedial measure.
Drupal Modules | 1 min read
Drupal is a very secure content management system and provides a lot of security for website owners out of the box. Drupal 8 and 9 come with flood prevention capabilities that protect against brute force login attacks on your website. However, if you want to go that extra mile and prevent access to the user/login page to anonymous users, you can use Disable Drupal Login Page module.
Technical Solution | 2 min read
The two industry-wide security vulnerabilities named Meltdown and Spectre are hardware bugs that can allow hackers to steal sensitive information such as passwords, encryption keys from the memory of other programs. They work in different ways, affect different processors from Intel, ARM, and AMD, and require different fixes.
Drupal Technical | 3 min read
Security Audits play a crucial role in an organization’s ongoing effort to address security concerns. After identifying any potential security issues, remedial steps need to adopt; in fact, a Security audit is one of the first steps that need to be taken. No organization in its right mind would want to leave its websites vulnerable to hacking, and conducting a security audit is the best way to tackle security issues.