New Release: Deepfence ThreatMapper 1.2.0 – Attack Path Visualization, AWS Fargate Support, and More

We are pleased to announce the release of Deepfence ThreatMapper 1.2.0, which offers significant feature upgrades since the first open source release in October 2021. ThreatMapper 1.2.0 adds the following capabilities: Attack Path Visualization, with a more sophisticated and representative... Read More >

Owen Garrett
How to Detect and Defeat the Log4j2 Vulnerability with Deepfence

Introduction to log4j2 mitigation The log4j2 vulnerability like the OpenSSL Heartbleed and Apache Struts vulnerabilities that came before it are poignant reminders to digital businesses that it’s not just enough to respond to a vulnerability by redeploying applications once a... Read More >

Owen Garrett
Visualize Attack Paths in Production Environments with ThreatMapper

The huge advances in ‘Shift Left’ processes makes it possible to deliver code to production that is secure and largely free from vulnerable dependencies. Among other things, these processes typically involve matching dependencies against public vulnerability lists from Mitre, Red... Read More >

Owen Garrett
CVE-2021-44228: Log4j2 Exploitability & Attack Path Mitigation with ThreatMapper

Quick Overview The gravest cyber threat of modern times is upon us in the form of CVE-2021-44228. Here are some key resources: CVE-2021-44228: Apache Log4j <=2.14.1 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints.Severity:... Read More >

Sandeep Lahane
ThreatMapper picks up where Shift Left ends

Shift left, secure right. Shift left initiatives empower developers and DevOps teams to deliver secure code to production. Once code has been deployed, shift left steps back and ThreatMapper takes over. We recently announced that ThreatMapper is now 100% open... Read More >

Emily McAuliffe