{"id":44610,"date":"2021-12-22T18:02:00","date_gmt":"2021-12-22T18:02:00","guid":{"rendered":"http:\/\/ebff7186-2d44-40c4-96c1-cc58bbe5e12a"},"modified":"2021-12-22T18:02:00","modified_gmt":"2021-12-22T18:02:00","slug":"log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/","title":{"rendered":"Log4j flaw: Attackers are &#8216;actively scanning networks&#8217; warns new CISA guidance"},"content":{"rendered":"<p>A new informational <a href=\"https:\/\/www.zdnet.com\/article\/log4j-zero-day-flaw-what-you-need-to-know-and-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noopener\">Log4J<\/a> advisory has been <a href=\"https:\/\/www.cisa.gov\/uscert\/ncas\/alerts\/aa21-356a\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">issued<\/a> by cybersecurity leaders from the US, Australia, Canada, New Zealand and the United Kingdom. The guide includes technical details, mitigations and resources to address known vulnerabilities in the Apache Log4j software library.<\/p>\n<div class=\"relatedContent alignRight\">\n<h3 class=\"heading\"> <span class=\"int\">more Log4j<\/span> <\/h3>\n<\/p><\/div>\n<p>The project is a joint effort by the US&#8217; Cybersecurity and Infrastructure Security Agency (CISA), FBI and NSA, as well as the Australian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), Computer Emergency Response Team New Zealand (CERT NZ), New Zealand National Cyber Secure Centre (NZ NCSC), and the United Kingdom&#8217;s National Cyber Security Centre (NCSC-UK).&nbsp;<\/p>\n<p>The organizations <a href=\"https:\/\/www.cisa.gov\/news\/2021\/12\/22\/cisa-fbi-nsa-and-international-partners-issue-advisory-mitigate-apache-log4j\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">said<\/a> they issued the advisory in response to &#8220;active, worldwide exploitation by numerous threat actors, including malicious cyber threat actors.&#8221; <a href=\"https:\/\/www.zdnet.com\/article\/log4j-flaw-now-state-backed-hackers-are-using-bug-as-part-of-attacks-warns-microsoft\/\" target=\"_blank\" rel=\"noopener\">Numerous groups<\/a> from North Korea, Iran, Turkey and China have been seen exploiting the vulnerability alongside a slate of <a href=\"https:\/\/www.zdnet.com\/article\/conti-ransomware-attacking-vmware-vcenter-servers-through-log4j-vulnerability\/\" target=\"_blank\" rel=\"noopener\">ransomware<\/a> <a href=\"https:\/\/www.zdnet.com\/article\/khonsari-ransomware-iranian-group-nemesis-kitten-seen-exploiting-log4j\/\" target=\"_blank\" rel=\"noopener\">groups<\/a> and <a href=\"https:\/\/www.zdnet.com\/article\/log4j-flaw-this-new-threat-is-going-to-affect-cybersecurity-for-a-long-time\/\" target=\"_blank\" rel=\"noopener\">cybercriminal organizations<\/a>.&nbsp;<\/p>\n<p>CISA Director Jen Easterly said Log4j vulnerabilities present a severe and ongoing threat to organizations and governments around the world<\/p>\n<p>&#8220;We implore all entities to take immediate action to implement the latest mitigation guidance to protect their networks,&#8221; Easterly said. &#8220;These vulnerabilities are the most severe that I&#8217;ve seen in my career, and it&#8217;s imperative that we work together to keep our networks safe.&#8221;&nbsp;<\/p>\n<p><a href=\"https:\/\/www.sonatype.com\/resources\/log4j-vulnerability-resource-center\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Cybersecurity company Sonatype<\/a> has tracked the number of total Log4j downloads since the vulnerability was discovered on Dec. 10, also noting the number of vulnerable versions of Log4j being downloaded in the last hour. Even with the massive mobilization effort around the issue, 43% of the Log4j downloads in the last hour are of vulnerable versions.&nbsp;<\/p>\n<figure class=\"image image-large shortcode-image\"><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory\/\" class=\"lazy\" alt=\"log4j-chart.png\" height=\"auto\" width=\"470\" data-original=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bcce6fc5bb9f9bb506744b464d5d9bccc479195e\/2021\/12\/22\/3d830fef-c4dc-4396-b787-5b0efd2ff730\/log4j-chart.png?width=470&amp;fit=bounds&amp;auto=webp\"><\/span><noscript><span class=\"img aspect-set \"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/bcce6fc5bb9f9bb506744b464d5d9bccc479195e\/2021\/12\/22\/3d830fef-c4dc-4396-b787-5b0efd2ff730\/log4j-chart.png?width=470&amp;fit=bounds&amp;auto=webp\" class alt=\"log4j-chart.png\" height=\"auto\" width=\"470\"><\/span><\/noscript><figcaption><span class=\"caption\"><\/span><span class=\"credit\"> Sonatype <\/span><\/figcaption><\/figure>\n<p>Jessica Hunter, acting head of the Australian Cyber Security Centre, said malicious cyber actors are already scanning and exploiting some of the many thousands of vulnerable systems around the world, prompting the need for world governments to be proactive in their efforts to patch, partner and monitor. &nbsp;<\/p>\n<section class=\"sharethrough-top placeholder\"> <\/section>\n<p>The FBI&#8217;s Bryan Vorndran urged organizations attacked through the vulnerability to contact them or CISA about the issue. CISA built a <a href=\"https:\/\/www.cisa.gov\/uscert\/apache-log4j-vulnerability-guidance\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">Log4J web page<\/a> with information, guidance and resources for network defenders, as well as a <a href=\"https:\/\/github.com\/cisagov\/log4j-affected-db\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">community-sourced GitHub repository<\/a> of affected devices and services.&nbsp;<\/p>\n<p>NSA cybersecurity director Rob Joyce <a href=\"https:\/\/twitter.com\/NSA_CSDirector\/status\/1473679840662495233\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">said<\/a> everyone should inventory their assets so they can stay on top of patches coming out.&nbsp;<\/p>\n<p>&#8220;Start with internet exposed assets, but mitigate and update everything. Monitor and follow up. Malicious actors have been observed patching software they compromise to help retain control of the assets,&#8221; Joyce said.&nbsp;<\/p>\n<p>CISA ordered all federal civilian agencies to <a href=\"https:\/\/www.zdnet.com\/article\/cisa-orders-federal-agencies-to-mitigate-log4j-vulnerabilities-in-emergency-directive\/\" target=\"_blank\" rel=\"noopener\">address the issue before Christmas<\/a>&nbsp;and published an <a href=\"https:\/\/github.com\/cisagov\/log4j-scanner\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">open sourced log4j-scanner<\/a> derived from scanners created by other open source community members. The tool is intended to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.<\/p>\n<p>&#8220;We cannot stress enough how important it is for everyone to patch this vulnerability as soon as possible. We know that malicious actors are constantly scanning for a way into systems worldwide, using the Log4j vulnerability,&#8221; said CERT NZ Director Rob Pope.&nbsp;<\/p>\n<p>&#8220;It is only through collective actions that we can effectively address these types of attacks, which is why we&#8217;re proud to be part of an international effort to keep organizations safe and secure.&#8221;&nbsp;<\/p>\n<p> READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The FBI&#8217;s Bryan Vorndran urged organizations attacked through the vulnerability to contact them or CISA about the issue.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-44610","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Log4j flaw: Attackers are &#039;actively scanning networks&#039; warns new CISA guidance 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Log4j flaw: Attackers are &#039;actively scanning networks&#039; warns new CISA guidance 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-22T18:02:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/article\/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory\/\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Log4j flaw: Attackers are &#8216;actively scanning networks&#8217; warns new CISA guidance\",\"datePublished\":\"2021-12-22T18:02:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\\\/\"},\"wordCount\":571,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory\\\/\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\\\/\",\"name\":\"Log4j flaw: Attackers are 'actively scanning networks' warns new CISA guidance 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory\\\/\",\"datePublished\":\"2021-12-22T18:02:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory\\\/\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/article\\\/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory\\\/\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Log4j flaw: Attackers are &#8216;actively scanning networks&#8217; warns new CISA guidance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Log4j flaw: Attackers are 'actively scanning networks' warns new CISA guidance 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/","og_locale":"en_US","og_type":"article","og_title":"Log4j flaw: Attackers are 'actively scanning networks' warns new CISA guidance 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-12-22T18:02:00+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/article\/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory\/","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Log4j flaw: Attackers are &#8216;actively scanning networks&#8217; warns new CISA guidance","datePublished":"2021-12-22T18:02:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/"},"wordCount":571,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory\/","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/","url":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/","name":"Log4j flaw: Attackers are 'actively scanning networks' warns new CISA guidance 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/article\/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory\/","datePublished":"2021-12-22T18:02:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/#primaryimage","url":"https:\/\/www.zdnet.com\/article\/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory\/","contentUrl":"https:\/\/www.zdnet.com\/article\/cisa-cybersecurity-centers-from-australia-nz-uk-and-canada-release-log4j-advisory\/"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/log4j-flaw-attackers-are-actively-scanning-networks-warns-new-cisa-guidance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Log4j flaw: Attackers are &#8216;actively scanning networks&#8217; warns new CISA guidance"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44610"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44610\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}