ThreatMapper Wins 2022 DEVIES Award for Best Innovation in Security and Networking

We’re excited to announce that Deepfence ThreatMapper has been selected as the winner for Best Innovation in Security and Networking in the 2022 DEVIES Awards! We are humbled to receive this award alongside other beloved developer technology brands such as... Read More >

Michelle Brinich
New Release: Deepfence ThreatMapper 1.2.0 – Attack Path Visualization, AWS Fargate Support, and More

We are pleased to announce the release of Deepfence ThreatMapper 1.2.0, which offers significant feature upgrades since the first open source release in October 2021. ThreatMapper 1.2.0 adds the following capabilities: Attack Path Visualization, with a more sophisticated and representative... Read More >

Owen Garrett
How to Detect and Defeat the Log4j2 Vulnerability with Deepfence

Introduction to log4j2 mitigation The log4j2 vulnerability like the OpenSSL Heartbleed and Apache Struts vulnerabilities that came before it are poignant reminders to digital businesses that it’s not just enough to respond to a vulnerability by redeploying applications once a... Read More >

Owen Garrett
Visualize Attack Paths in Production Environments with ThreatMapper

The huge advances in ‘Shift Left’ processes makes it possible to deliver code to production that is secure and largely free from vulnerable dependencies. Among other things, these processes typically involve matching dependencies against public vulnerability lists from Mitre, Red... Read More >

Owen Garrett
CVE-2021-44228: Log4j2 Exploitability & Attack Path Mitigation with ThreatMapper

Quick Overview The gravest cyber threat of modern times is upon us in the form of CVE-2021-44228. Here are some key resources: CVE-2021-44228: Apache Log4j <=2.14.1 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints.Severity:... Read More >

Sandeep Lahane