• OPENVAS SECURITY INTELLIGENCE
  • Buy Here
  • Newsletter
  • Deutsch Deutsch German de
  • English English English en
  • Italiano Italiano Italian it
  • Nederlands Nederlands Dutch nl
  • Products
    • OPENVAS SCAN
    • OPENVAS REPORT
    • OPENVAS BASIC
      • OPENVAS BASIC: Order
    • Greenbone Cloud Service
    • Greenbone Web App Scanning
    • Solutions for Your Sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
        • OPENVAS vs. Nessus
      • Roadmap & Lifecycle
  • Service & Support
    • Technical Support
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Greenbone Group
    • Partners
    • Careers
    • Contact
  • Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • Attack Vector Timeline
      • The Vulnerability Timeline
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Products
    • OPENVAS SCAN
    • OPENVAS REPORT
    • OPENVAS BASIC
      • OPENVAS BASIC: Order
    • Greenbone Cloud Service
    • Greenbone Web App Scanning
    • Solutions for your sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
        • OPENVAS vs. Nessus
      • Roadmap and Lifecycle
    • Buy Here
  • Service & Support
    • Technical Support
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Greenbone Group
    • Partners
    • Careers
    • Contact
    • Newsletter
  • Our Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • The Vulnerability Timeline
      • Attack Vector Timeline
  • Deutsch
  • English
  • Italiano
  • Nederlands
Elmar Geese

Log4j Vulnerability Detection Available in Greenbone Feeds

Blog

Update from 2021-12-20: information about additional vulnerabilities found for Log4j can be found here. Update from 2021-12-15: the most important FAQ about the Log4j vulnerability detection with Greenbone can be found here. A critical vulnerability (Log4Shell, CVE-2021-44228) in the widely used Java library Log4j has been discovered. Greenbone has integrated local security checks and active […]

Read more
13. December 2021/by Elmar Geese
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.svg 0 0 Elmar Geese https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.svg Elmar Geese2021-12-13 10:12:222021-12-23 10:41:34Log4j Vulnerability Detection Available in Greenbone Feeds
Markus Feilner

Ransomware as a Service: the Mindset of Cyber Criminals Has Changed

Blog

The second part of our series on the ongoing professionalization of attacks on IT systems deals with changes in the attackers’ mindset. Automation, commercialization and cloud computing have also left their mark on the typical profile of cyber criminals that admins and vulnerability management have to deal with. Contrary to common Hollywood clichés, the threat […]

Read more
9. December 2021/by Markus Feilner
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.svg 0 0 Markus Feilner https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.svg Markus Feilner2021-12-09 14:31:472022-03-01 17:05:11Ransomware as a Service: the Mindset of Cyber Criminals Has Changed
Markus Feilner

“Ransomware as a Service” as a Business Model: Why the Business of Extortion Flourishes

Blog

This article is the first of three blogposts about the changing threat landscape in professional environments. “Ransomware as a Service” as a business model has powerful implications for enterprises, which are by no means defenseless. Modern vulnerability management, which Greenbone’s products enable, also plays an important role in this context. Numbers 2020 – Increase, Revenue, […]

Read more
26. November 2021/by Markus Feilner
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.svg 0 0 Markus Feilner https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.svg Markus Feilner2021-11-26 09:46:102023-04-04 15:55:44“Ransomware as a Service” as a Business Model: Why the Business of Extortion Flourishes
Page 44 of 49«‹4243444546›»

Search

Search Search

Newsletter

Subscribe Now

Archive

  • 2025
  • 2024

Products & Solutions

  • OPENVAS SCAN
  • OPENVAS REPORT
  • OPENVAS BASIC
  • OPENVAS FREE
  • Greenbone Cloud Service
  • Greenbone Web App Scanning
ISO9001-EN

Service & Support

  • Technical Support
  • FAQ
  • Documents
  • Warranty
  • Open Source Vulnerability Management
  • Cyber Resilience Act
ISO27001-EN

About us

  • About Greenbone
  • Greenbone Group
  • Newsletter
  • License information
  • Privacy Statement
  • Terms & Conditions
ISO14001-EN

Contact with us

  • Contact
  • Media Contact
  • Careers
  • Partners
  • Security Response
  • Imprint

Community

  • Community Portal
  • Community Forum
© Copyright - Greenbone AG 2020-2025
  • Link to LinkedIn
  • Link to Mail
Scroll to top Scroll to top Scroll to top