Have any questions, feel free to reach out?
email@azurefeeds.com
AzureFeeds
Authors
Download Feed
✕
No results
See all results
Home
Log4j
Filter by
Categories
Tags
Authors
Show all
All
Azure App Service
Azure Architecture
Azure Blog
Azure Updates
Command Line
Community
Microsoft Learn
Microsoft News
Microsoft Partner
Microsoft Security
Tech Community
All
.NET
.NET ASP.NET Core
.NET Core
.NET Entity Framework Core
.NET Framework
#BuildFor2030
14daysofgit
440fx
aarch64
Accessibility
Active Directory
ADH; Ultra SSD
Advanced Hunting
Advertising
adx
AI Blog
AI/ML
Airband Initiative
AKS
Alexa
Altra
Amazon
amd
Ampere
analytics
Android
Announcements
Annual Shareholders Meeting
anonymous
Apache
Apache Spark
Apache Spark 3.3
api
API Management
app service
Application Gateway
Application Insight
Application Insights
Application Packages
approval-workflow
Arc enabled Servers
architect
architecture
arm
arm64
Artificial Intelligence
asg
ASP.NET Core
ASP.NET Web API
Attack
automation
Automotive
availability-zone
awesome
aws
AZ-801
az-cli
Azure
Azure Active Directory
Azure AD
Azure App Service
azure app service environment
Azure Artifacts
Azure Backup
Azure Backup; SAP HANA Backup; HANA Snapshot
Azure Backup; SAP HANA Backup; HANA System Replication
Azure Backup; SAP HANA Backup; SQL Backup
Azure Bastion
Azure Bicep
Azure Blob Storage
Azure Blob Storage; Azure Data Lake Storage; Storage Accounts; AzurePortal
Azure Blueprints
Azure Boards
Azure Cloud Services
Azure Cognitive Services
Azure Container App
Azure Data Lake Storage
Azure Database for PostgreSQL
Azure DDos Protection
Azure DevOps
Azure Event Grid
Azure Event Hub
Azure ExpressRoute
Azure Files
Azure Firewall
Azure Firewall Premium
Azure Governance
Azure IoT Central
Azure Kubernetes Service
Azure Kubernetes Service (AKS)
Azure Load Testing
Azure Log Analytics; Azure Monitor; Log Analytics;
Azure Machine Learning
Azure Maps
Azure Marketplace
Azure Microsoft Defender for Cloud
Azure Microsoft Purview
Azure Migrate
Azure Monitor
Azure Monitor for SAP solutions
Azure NetApp Files
Azure Pipelines
Azure Policy
Azure Private Link
Azure Repos
Azure Resource Manager
Azure SDKs
Azure Security
Azure Sentinel
Azure Site Recovery
Azure Space
Azure SQL Database
Azure Stack
Azure Stack HCI
Azure Storage
Azure Storage Accounts
Azure Storage Explorer
Azure Stream Analytics
Azure Synapse
Azure Synapse Analytics
Azure Test Plans
Azure Virtual Network
Azure VM backup; SQL VMs
Azure VMWare Solutions
Azure Web Application Firewall
azure-ad-b2c
azure-arc
azure-b2c
AzureBackup
azurefunctions
AzurePortal
AzurePrivateLink
AzureResourceManager
AzureSiteRecovery
AzureVM
backup
Bash
Batch
Bicep
Big Data
Bing
Bing Maps
block
blog
BlueHat
bottle
Bounty
Broadband access
Bug Bounty Programs
build
Business Applications
Business Intelligence
Business leadership
buy
C#
Callisto
carbon emissions
career
Case Study
celeron
Certification
Certifications
CES 2023
cga
ch340
Chaos Studio
Chaos Testing
chatgpt
ChromeOS
cisc
Citrix
Citrix Cloud
clean energy
Cloud
Cloud Adoption Framework
Cloud Foundation
Cloud Solution Provider
Cloud Strategy
cloud token theft
Cloud transformation
cloud-computing
cloud-natives
CloudFamily
Cmd
Co-sell
Cognitive Services
coin miners
COLDRIVER
Command Line
community
Community-based Defense
Compliance
Compliance and security
Compliance Series
Computer science
computer-history
computers
ConPTY
Console
ContainerApps
containers
Coordinated Vulnerability Disclosure
cosmosdb
Cost
credential dumping
credential theft
cryptojacker
cryptojacking
csharp
CSP
culture
custom-policies
Customer Enablement
Customer Spotlight
Cybersecurity
Cybersecurity Policy
CyberWarCon
CycleCloud
Dapr
DART
data
data governance
data loss prevention
Data Protection
Data Science
Data Warehouse
data-explorer
database
DDoS Protection
Deception
Deep Technical
Defender
Defender ATP
Defender for Cloud
Deleted Objects
Dependency analysis
Detection and Response Team (DART)
Developer
Developer Tools
Development
devops
DevOps Pipelines
devrel
diagnostics
Differentiation
Digital Now
Digital Transformation
Digital Twins
disaster recovery
Disaster Relief
Discovery
Diversity
dnz
docker
dotnet
Dynamics 365
Dynamics 365 Business Central
Dynamics 365 Commerce
Dynamics 365 Customer Service
Dynamics 365 Finance and Operations
Dynamics 365 Sales
Dynamics 365 Supply Chain Management
Education
EF Core
Endpoint security
Enroll Huawei in Intune
Entity Framework Core
entra Azure Active Directory
epyc
error-message
ESP8266
Even Hub
Events
Exam Prep
Exams
Exchange server
ExpressRoute
fan
fans
Feature
Feature Stories
Featured
Features
Financial Services
flexible server
game developers
Gaming
gcp
Git
Git for everyone
GitHub
GitHub Action
GitHub Actions
Global Skills Initiative
gMSA
google
governance
GTM
HACS
Halo
hardware-based threat defense
HashiCorp
HashiCorp Ambassador
Healthcare
heartrate
Home Assistant
Honeypot
Honeytoken
Hosting
hub-and-spoke
Human Rights
Humans
ice-lake
ICSA
identity
Identity & Access Management
Identity and access management
Identity and access management series
IDPS
IDS
IIS
Image Creator
In the News
Incident response
Inclusion
Industry moments
Industry Solutions
Industry Solutions Microsoft Cloud for Healthcare
influence
Information/data protection
Infrastructure As Code
Innovation Stories
intel
Intelligent cloud
Internet of Things
Internet of things; IoT and security
Intune
Intune enrollment notifications
Intune Huawei enrollment
Investor Relations
IoT
IoT Security
IPS
ISV
ITSM
Jabra
java
Judson Althoff
jwt
Kerberos
kevin scott
KMS Windows Activation
KNOTWEED
KQL
kubernetes
Kusto
Lab
Landing Zones
latency
learning
LINUX
Log Alerts
Log4j
Logic Apps
logon failure
loom
lscpu
M365
Machine Learning
macOS
MagicWeb
malware
managed threat hunting
Management
Manufacturing
Media Services
memcached
mental health
MERCURY
mfa
microservice
Microservices
Microsoft
Microsoft 365
Microsoft 365 Defender
Microsoft 365 Microsoft Defender for Cloud Apps
Microsoft 365 Microsoft Defender for Identity
Microsoft 365 Threat Protection
Microsoft Azure
Microsoft Cloud
Microsoft Cloud for Financial Services
Microsoft Cloud Partner Program
Microsoft Defender
Microsoft Defender for Business
Microsoft Defender for Cloud
Microsoft Defender for Cloud Apps
Microsoft Defender for Endpoint
Microsoft Defender for Identity
Microsoft Defender for IoT
Microsoft Detection and Response Team (DART)
Microsoft Earnings Results
Microsoft Edge
Microsoft Endpoint Manager
Microsoft Flight Simulator
Microsoft Graph
Microsoft Hackathon
Microsoft HoloLens
Microsoft HPC Pack
Microsoft Ignite
Microsoft Inspire
Microsoft Intelligent Security Association (MISA)
Microsoft Office
Microsoft on the Issues
Microsoft Partner
Microsoft Partner Ecosystem
Microsoft Partner Network
Microsoft Power Platform
Microsoft Power Platform Power Apps
Microsoft Power Platform Power Automate
Microsoft Power Platform Power BI
Microsoft Priva
Microsoft Purview
Microsoft Research
Microsoft Security
Microsoft Security Experts
Microsoft security intelligence
Microsoft Sentinel
Microsoft Start
Microsoft Store
Microsoft Surface
Microsoft Teams
Microsoft Threat Intelligence Center (MSTIC)
Microsoft Translator
Microsoft Visual Studio
microsoft-graph-api
Migration
milan
military affairs
Minecraft
MISA
Misc
mixed reality
Mobile
Mobile Security
mobile threats
Modern Desktop
Modern sales and marketing
MongoDB
Monitoring
Mosquitto
MQTT
MSRC
MSTIC
multi-factor-authentication
Multi-Protocol Access
MustLearnKQL
mysql
nation-state actor
neoverse-n1
Network security
networking
new
New commerce experience
News
Newsletter
No Data Siloes
NOBELIUM
node
NodeJS
Nonprofits
npm
OAuth
object
Office 365
Office 365 Microsoft Defender for Office 365
OneDrive
open source
Optimisation
Outsourcing
Partner
Partner Center
Partner of the Year Awards
partner stories
Partner strategy
Password could not be retreived
pc gaming
peering
Pentium
Personal
phillips
Phishing
php
pip
poc
postgresql
Power Apps
powershell
Press Releases
Prestige
Preview
Prime
Privacy
private endpoints
private-sector offensive actor (PSOA)
Productivity
program resources
Program resources and support
Programmatic changes
programmer
programming
Proximity Placement Group
public sector
python
quantum computing
ransomware
Raspberry Pi
Recent News
Recycle Bin
redis
Regions
Regions and Datacenters
Renewable Energy
Researcher Recognition
resource guard
Retirements
risc
routing
Sales and Marketing
Satya Nadella
sdk
Sea of Thieves
SEABORGIUM
security
Security deployment
Security Intelligence
Security management
Security Operations
Security Research
Security Research & Defense
Security Researcher
Security strategies
Security Update
Sentinel
Server
Server Manager
serverless
Service
Services
Sessions
SFTP
SharePoint
Short Codes
SIEM
Sliver
small business
smp
SMS
SOAR
Social Engineering
social good
Software Assurance
spa
Spark
Spark 3.3
speaking
Spot
sql
static web apps
staticapps
storage
Storage Accounts
Storage, Backup & Recovery
StorageAccount Replication Redundancy
Stream Analytic
Sustainability
SysBench
Tag = Azure SQL
Tag = AzurePortal
Tag = AzurePortal; Tag = SQL DB
Tag = Portal
Tasmota
tasmotiser
Technical
Terminal
Terraform
testing
Thinkst
Thinkst Canary
Threat Intelligence
Threat protection
TikTok
tips
TLS
toilet
Tools
Training
Transform
troubleshooting
tutorial
Ubuntu
Uncategorized
updated
Updates
varnish
Virtual Machines
Virtual Network Gateway
Virtualization
Visual Studio
Visual Studio Code
Visual Studio IDE
vm
VM Apps
vmss
Voice of the Community
Vulnerabilities
vulnerability
wahoo
web shell
Windows
Windows 10
Windows 11
Windows 365
Windows Console
Windows Package Manager
Windows Server
Windows Store
Windows Subsystem for Linux (WSL)
Windows Terminal
winget
wordpress
Work
WorkLab
WSL
x86
Xbox
xeon
Year In Review
Zero Trust
Zerobot
ZINC
Zwift
All
Az Advertizer
azurefeeds
Charlie Gough
David O'Brien
Gregor Suttie
Jake Walsh
Jaliya Udagedara
Jiadong Chen
John Kilmister
Luke Murray
Marc Duiker
Martyn Coupland
Matt Zorich
Matt Felton
mslearn
Nicola Delfino
Olivier Miossec
Pixel Roberts
Rod Trent
Rory Braybrook
Sam Cogan
Sarah Lean
Shane Baldacchino
Simon Lee
Tao Yang
Thomas Thornton
Tobias Zimmergren
Will Velida
August 26, 2022
Published by
azurefeeds
on
August 26, 2022
Categories
Microsoft Security
MERCURY leveraging Log4j 2 vulnerabilities in unpatched systems to target Israeli organizations
In recent weeks, the Microsoft Threat Intelligence Center (MSTIC) and Microsoft 365 Defender Research Team detected Iran-based threat actor MERCURY leveraging exploitation of Log4j 2 vulnerabilities
[…]
Download Feed
No results
See all results
Name:
E-mail address:
Subject:
Message: