{"id":44760,"date":"2022-01-10T22:45:00","date_gmt":"2022-01-10T22:45:00","guid":{"rendered":"https:\/\/www.darkreading.com\/vulnerabilities-threats\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says"},"modified":"2022-01-10T22:45:00","modified_gmt":"2022-01-10T22:45:00","slug":"no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/","title":{"rendered":"No Significant Intrusions Related to Log4j Flaw Yet, CISA Says"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt79618ff4c57c2770\/61dcb2cc2509765bcb2773da\/log4jcisa_Alexander_Limbach_shutterstock.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p>In the one month since news broke of a critical remote code execution vulnerability in the Log4j logging framework, there have been no major intrusions tied to the flaw in the US, officials from the Cybersecurity and Infrastructure Security Agency (CISA) said Monday.<\/p>\n<p>However, they warned about the possibility of attackers exploiting the flaw later because of its prevalence \u2014 hundreds of millions of devices and components have the vulnerability \u2014 and the ease with which it can be exploited. <\/p>\n<p>\u201cWe do expect Log4j to be used in intrusions well into the future,\u201d said CISA director Jen Easterly in a virtual press conference this morning. &#8220;We are concerned that threat actors are going to take advantage of this vulnerability,&#8221; especially against critical infrastructure targets.<\/p>\n<p>Over the past month, the Apache Foundation has disclosed three separate vulnerabilities in Log4j \u2014 a logging tool that is present in almost all Java application environments. Of the three flaws, security experts consider the one that the foundation disclosed first (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">CVE-2021-44228<\/a>) to be, by far, the biggest threat.&nbsp;<\/p>\n<p>Easterly described the flaw \u2014 now referred to as Log4Shell \u2014 as the worst she has encountered in her career and one that attackers could exploit simply by sending as little as 12 characters to a vulnerable system. <a href=\"https:\/\/www.darkreading.com\/attacks-breaches\/attackers-target-log4j-to-drop-ransomware-web-shells-backdoors\" target=\"_blank\" rel=\"noopener\">Once exploited<\/a> the flaw gives attackers a way to gain deep access on compromised systems, she said. So far, some 2,800 products have been identified as vulnerable, she said.<\/p>\n<p>Since news of the vulnerability first surfaced, CISA had been working to ensure that federal civilian agencies make patching the Log4Shell flaw a top priority, said Easterly and Eric Goldstein, executive assistant director for cybersecurity at CISA. CISA, along with the NSA, FBI, and others, including technology companies have been working overtime to provide guidance on the vulnerability to both federal agencies and to private organizations.&nbsp;<\/p>\n<p>On Dec. 17, the <a href=\"https:\/\/www.cisa.gov\/emergency-directive-22-02\" target=\"_blank\" rel=\"noopener\">agency added<\/a> the vulnerability to a catalog of known and actively exploited flaws. CISA gave federal agencies until Dec. 23 to identify the flaw in their Internet-facing assets and either patch it, apply specific mitigations for neutralizing the threat, or remove the vulnerable asset. Agencies had until Dec. 28 to provide CISA with a list of all applications that they identified as being vulnerable, the vendors of those applications, and the actions they had taken to address the issue. <\/p>\n<p>The widespread patching and mitigation efforts within government \u2014 and elsewhere \u2014 are likely one reason there has not&nbsp;been any major reported incidents of a Log4j-related compromise in the US so far, the two CISA officials said. But it is also likely that attackers have already compromised many systems and are waiting for the right moment to strike, they noted.<\/p>\n<p>Meanwhile, Matt Keller, vice president of federal services at GuidePoint Security, says his organization&#8217;s interactions with federal agencies show that some of them are <a href=\"https:\/\/www.darkreading.com\/application-security\/why-log4j-mitigation-is-fraught-with-challenges\" target=\"_blank\" rel=\"noopener\">struggling to patch<\/a> the Log4Shell flaw because they have end-of-life or end-of-support systems in their environments.&nbsp;<\/p>\n<p>&#8220;When a system or software is end of life\/end of support, typically the company that designed and wrote the software moves the development team on to other projects,&#8221; Keller says. <\/p>\n<p>As a result, patches may not always be available for bugs that surface in these products, he says. &#8220;The system can be patched if a patch is available. Sometimes vendors will release a patch for a critical patch for something like this, but they aren&#8217;t required to,&#8221; he says.<\/p>\n<p><strong>Some Agencies Struggling to Pinpoint At-Risk Systems<\/strong><br \/>According to Keller, some agencies are also having trouble finding vulnerable systems and are using command line scripts to try and find them. <\/p>\n<p><strong>&#8220;<\/strong>Running a command script on some systems can be singularly focused where you have to touch each system individually and review the findings,&#8221; Keller notes.&nbsp;<\/p>\n<p>The process is slower than using a vulnerability scanning tool and could result in agencies missing systems that need to be patched or mitigated against the Log4j flaw, he says.<\/p>\n<p>Keller says government agencies are more likely to have issues with end-of-life\/end-of-support systems than private companies because of the typically more complicated procurement processes that exist in government. So private organizations are less likely to run into issues with end-of-life systems when patching the Log4Shell flaw, he says.<\/p>\n<p>&#8220;Patching an end-of-life product can sometimes be more involved than one would think,&#8221; says Ray Kelly, fellow at NTT Application Security. &#8220;For instance, if the components being patched have a different programming interface, then it could require significant code changes and QA effort for the application [to be] fixed,&#8221; he says. <\/p>\n<p>The best that organizations can do to protect end-of-life\/end-of-support systems is to put layers of network defenses around them, adds John Bambenek, principal threat hunter at Netenrich.&nbsp;<\/p>\n<p>&#8220;Place them on highly isolated VLANs with strong access control and strong network anomaly monitoring on those segments,&#8221; he says. Organizations should also consider simply preventing those machines from having any Internet access at all, he adds.<\/p>\n<p>Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>But that could change anytime, officials warn, urging organizations to prioritize patching against the critical remote code execution flaw.Read More <a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\">HERE<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[151],"tags":[],"class_list":["post-44760","post","type-post","status-publish","format-standard","hentry","category-darkreading-ti"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>No Significant Intrusions Related to Log4j Flaw Yet, CISA Says 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"No Significant Intrusions Related to Log4j Flaw Yet, CISA Says 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-10T22:45:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt79618ff4c57c2770\/61dcb2cc2509765bcb2773da\/log4jcisa_Alexander_Limbach_shutterstock.jpg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"No Significant Intrusions Related to Log4j Flaw Yet, CISA Says\",\"datePublished\":\"2022-01-10T22:45:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\\\/\"},\"wordCount\":840,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt79618ff4c57c2770\\\/61dcb2cc2509765bcb2773da\\\/log4jcisa_Alexander_Limbach_shutterstock.jpg\",\"articleSection\":[\"DarkReading |TI\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\\\/\",\"name\":\"No Significant Intrusions Related to Log4j Flaw Yet, CISA Says 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt79618ff4c57c2770\\\/61dcb2cc2509765bcb2773da\\\/log4jcisa_Alexander_Limbach_shutterstock.jpg\",\"datePublished\":\"2022-01-10T22:45:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt79618ff4c57c2770\\\/61dcb2cc2509765bcb2773da\\\/log4jcisa_Alexander_Limbach_shutterstock.jpg\",\"contentUrl\":\"https:\\\/\\\/eu-images.contentstack.com\\\/v3\\\/assets\\\/blt66983808af36a8ef\\\/blt79618ff4c57c2770\\\/61dcb2cc2509765bcb2773da\\\/log4jcisa_Alexander_Limbach_shutterstock.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"No Significant Intrusions Related to Log4j Flaw Yet, CISA Says\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"No Significant Intrusions Related to Log4j Flaw Yet, CISA Says 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/","og_locale":"en_US","og_type":"article","og_title":"No Significant Intrusions Related to Log4j Flaw Yet, CISA Says 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-01-10T22:45:00+00:00","og_image":[{"url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt79618ff4c57c2770\/61dcb2cc2509765bcb2773da\/log4jcisa_Alexander_Limbach_shutterstock.jpg","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"No Significant Intrusions Related to Log4j Flaw Yet, CISA Says","datePublished":"2022-01-10T22:45:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/"},"wordCount":840,"commentCount":0,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt79618ff4c57c2770\/61dcb2cc2509765bcb2773da\/log4jcisa_Alexander_Limbach_shutterstock.jpg","articleSection":["DarkReading |TI"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/","url":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/","name":"No Significant Intrusions Related to Log4j Flaw Yet, CISA Says 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/#primaryimage"},"thumbnailUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt79618ff4c57c2770\/61dcb2cc2509765bcb2773da\/log4jcisa_Alexander_Limbach_shutterstock.jpg","datePublished":"2022-01-10T22:45:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/#primaryimage","url":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt79618ff4c57c2770\/61dcb2cc2509765bcb2773da\/log4jcisa_Alexander_Limbach_shutterstock.jpg","contentUrl":"https:\/\/eu-images.contentstack.com\/v3\/assets\/blt66983808af36a8ef\/blt79618ff4c57c2770\/61dcb2cc2509765bcb2773da\/log4jcisa_Alexander_Limbach_shutterstock.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/no-significant-intrusions-related-to-log4j-flaw-yet-cisa-says\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"No Significant Intrusions Related to Log4j Flaw Yet, CISA Says"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=44760"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/44760\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=44760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=44760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=44760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}