{"id":7316,"date":"2021-12-16T18:01:03","date_gmt":"2021-12-16T17:01:03","guid":{"rendered":"https:\/\/www.asecus.ch\/uncategorized\/log4j-vulnerability-perimeter-vulnerability-scan\/"},"modified":"2022-01-10T11:42:50","modified_gmt":"2022-01-10T10:42:50","slug":"log4j-vulnerability-perimeter-vulnerability-scan","status":"publish","type":"post","link":"https:\/\/www.asecus.ch\/en\/news\/log4j-vulnerability-perimeter-vulnerability-scan\/","title":{"rendered":"Log4j Vulnerability"},"content":{"rendered":"\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1qp9h-974c7d48fa0c803956985d76f856cf21\">\n.avia-section.av-1qp9h-974c7d48fa0c803956985d76f856cf21{\nbackground-repeat:no-repeat;\nbackground-image:url(https:\/\/www.asecus.ch\/wp-content\/uploads\/2020\/08\/header-img-2.png);\nbackground-position:50% 0%;\nbackground-attachment:scroll;\n}\n<\/style>\n<div id='mobile-max-heigth'  class='avia-section av-1qp9h-974c7d48fa0c803956985d76f856cf21 main_color avia-section-default avia-no-border-styling  avia-builder-el-0  el_before_av_textblock  avia-builder-el-first  hero-container avia-bg-style-scroll av-minimum-height av-minimum-height-custom av-height-custom  container_wrap fullsize'  data-section-bg-repeat='no-repeat' data-av_minimum_height_px='250'><div class='container av-section-cont-open' style='height:250px'><main  role=\"main\" itemprop=\"mainContentOfPage\"  class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-7316'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kx97mjge-184d5c8eeb6cce12428773fd24d2e5ce\">\n#top .av-special-heading.av-kx97mjge-184d5c8eeb6cce12428773fd24d2e5ce{\npadding-bottom:0;\ncolor:#ffffff;\nfont-size:70px;\n}\nbody .av-special-heading.av-kx97mjge-184d5c8eeb6cce12428773fd24d2e5ce .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-kx97mjge-184d5c8eeb6cce12428773fd24d2e5ce .av-special-heading-tag{\nfont-size:70px;\n}\n.av-special-heading.av-kx97mjge-184d5c8eeb6cce12428773fd24d2e5ce .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-kx97mjge-184d5c8eeb6cce12428773fd24d2e5ce .av-subheading{\nfont-size:18px;\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-kx97mjge-184d5c8eeb6cce12428773fd24d2e5ce .av-special-heading-tag{\nfont-size:25px;\n}\n.av-special-heading.av-kx97mjge-184d5c8eeb6cce12428773fd24d2e5ce .av-subheading{\ndisplay:none;\n}\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-kx97mjge-184d5c8eeb6cce12428773fd24d2e5ce .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-kx97mjge-184d5c8eeb6cce12428773fd24d2e5ce av-special-heading-h1 custom-color-heading blockquote modern-quote  avia-builder-el-1  avia-builder-el-no-sibling  top-special-heading av-inherit-size'><h1 class='av-special-heading-tag '  itemprop=\"headline\"  >Log4j Vulnerability<\/h1><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div>\n<\/div><\/div><\/main><!-- close content main element --><\/div><\/div><div id='after_section_1'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-7316'><div class='entry-content-wrapper clearfix'>\n<section  class='av_textblock_section av-kdon9vit-a75c57b837ec5678aff65f78eff08161 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><div class=\"breadcrumb breadcrumbs avia-breadcrumbs\"><div class=\"breadcrumb-trail\" ><span class=\"trail-before\"><span class=\"breadcrumb-title\">You are here:<\/span><\/span> <span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BreadcrumbList\" ><span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ListItem\" itemprop=\"itemListElement\" ><a itemprop=\"url\" href=\"https:\/\/www.asecus.ch\/en\/\" title=\"Asecus\" rel=\"home\" class=\"trail-begin\"><span itemprop=\"name\">Home<\/span><\/a><span itemprop=\"position\" class=\"hidden\">1<\/span><\/span><\/span> <span class=\"sep\">\/<\/span> <span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BreadcrumbList\" ><span  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ListItem\" itemprop=\"itemListElement\" ><a itemprop=\"url\" href=\"https:\/\/www.asecus.ch\/en\/news\/log4j-vulnerability-perimeter-vulnerability-scan\/\" title=\"Log4j Vulnerability\"><span itemprop=\"name\">Log4j Vulnerability<\/span><\/a><span itemprop=\"position\" class=\"hidden\">2<\/span><\/span><\/span><\/div><\/div>\n<\/div><\/section>\n<\/div><\/div><\/div><!-- close content main div --><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kcom12tj-524b27619b124ade1fe89cdccca84ac0\">\n.avia-section.av-kcom12tj-524b27619b124ade1fe89cdccca84ac0{\nmargin-top:0px;\nmargin-bottom:0px;\n}\n<\/style>\n<div id='av_section_2'  class='avia-section av-kcom12tj-524b27619b124ade1fe89cdccca84ac0 alternate_color avia-section-no-padding avia-no-border-styling  avia-builder-el-3  el_after_av_textblock  el_before_av_hr  avia-bg-style-scroll container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-7316'><div class='entry-content-wrapper clearfix'>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-1magt-06e475b6cf22ffa09d392d67ae562de8\">\n.flex_column.av-1magt-06e475b6cf22ffa09d392d67ae562de8{\nborder-radius:0px 0px 0px 0px;\npadding:0px 0px 0px 0px;\n}\n<\/style>\n<div  class='flex_column av-1magt-06e475b6cf22ffa09d392d67ae562de8 av_one_full  avia-builder-el-4  avia-builder-el-no-sibling  first flex_column_div av-zero-column-padding  '     ><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-5jskk4-438f92ce8c36338f5b271ccb14b6c5fa\">\n#top .hr.hr-invisible.av-5jskk4-438f92ce8c36338f5b271ccb14b6c5fa{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-5jskk4-438f92ce8c36338f5b271ccb14b6c5fa hr-invisible  avia-builder-el-5  el_before_av_textblock  avia-builder-el-first '><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-kt2usm4y-a1eced4d1f17e1bc340e413b26f1d601 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Log4j Vulnerability \u2013 Check Your Systems!<\/h3>\n<p>On November 24<sup>th<\/sup>, a zero-day vulnerability was disclosed in the popular Log4j java library. The security flaw is classified as critical; it allows an attacker to remotely execute code and thus to break into companies.<\/p>\n<\/div><\/section><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kt2uxomw-846c558c76f2c87f793467f2b0513212\">\n.avia-image-container.av-kt2uxomw-846c558c76f2c87f793467f2b0513212 img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-kt2uxomw-846c558c76f2c87f793467f2b0513212 .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-kt2uxomw-846c558c76f2c87f793467f2b0513212 av-styling- avia-align-center  avia-builder-el-7  el_after_av_textblock  el_before_av_hr '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img decoding=\"async\" fetchpriority=\"high\" class='wp-image-7284 avia-img-lazy-loading-not-7284 avia_image ' src=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2021\/12\/Log4j-zero-day-vulnerability.jpg\" alt='Warnsymbol mit Ausrufezeichen und Text \u201eSystem HACKED\u201c auf einem digitalen Bildschirm mit unscharfem Code im Hintergrund.' title='System gehackt \u2013 Cyberangriff erkannt.'  height=\"577\" width=\"1340\"  itemprop=\"thumbnailUrl\" srcset=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2021\/12\/Log4j-zero-day-vulnerability.jpg 1340w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2021\/12\/Log4j-zero-day-vulnerability-300x129.jpg 300w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2021\/12\/Log4j-zero-day-vulnerability-1030x444.jpg 1030w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2021\/12\/Log4j-zero-day-vulnerability-768x331.jpg 768w\" sizes=\"(max-width: 1340px) 100vw, 1340px\" \/><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdinen91-6064f189b8996a6997734a2d1a00ad95\">\n#top .hr.hr-invisible.av-kdinen91-6064f189b8996a6997734a2d1a00ad95{\nheight:5px;\n}\n<\/style>\n<div  class='hr av-kdinen91-6064f189b8996a6997734a2d1a00ad95 hr-invisible  avia-builder-el-8  el_after_av_image  el_before_av_textblock  av-mini-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><br \/>\n<section  class='av_textblock_section av-kt2usm4y-a1eced4d1f17e1bc340e413b26f1d601 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>Since the Java library Log4j is used by many manufacturers around the world, many products in use are currently affected by this vulnerability. The probability that you are using a product that is vulnerable to this attack is very high.<\/p>\n<p><strong>Cyber criminals are already actively exploiting the vulnerability to infect exposed systems with malware.<\/strong><\/p>\n<p>The National Cyber Security Center is currently calling on organizations to take all possible measures to prevent further damage (see also: <a href=\"https:\/\/www.ncsc.admin.ch\/\">https:\/\/www.ncsc.admin.ch\/<\/a>)<\/p>\n<\/div><\/section><br \/>\n<section  class='av_textblock_section av-kt2uyagl-1e91ad6cfc4a58dfc98c4b30d4635fb5 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p>If you already know that one of your products uses Log4j, ask the manufacturer whether a patch is already available or what alternative measures you can take to protect yourself. In addition, we urgently recommend that you now perform a Log4j vulnerability scan to quickly identify vulnerable systems that can be reached from the internet.<\/p>\n<p>Asecus is now also offering vulnerability scans as a managed service. The customers receive a weekly report with an overview of the current weaknesses and support in resolving them from our security experts.<\/p>\n<\/div><\/section><\/p><\/div><\/div><\/div><\/div><!-- close content main div --><\/div><\/div><div id='after_section_2'  class='main_color av_default_container_wrap container_wrap fullsize'  ><div class='container av-section-cont-open' ><div class='template-page content  av-content-full alpha units'><div class='post-entry post-entry-type-page post-entry-7316'><div class='entry-content-wrapper clearfix'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdinen91-95d20771e45794782e5fd7b1d2dcedc7\">\n#top .hr.hr-invisible.av-kdinen91-95d20771e45794782e5fd7b1d2dcedc7{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-kdinen91-95d20771e45794782e5fd7b1d2dcedc7 hr-invisible  avia-builder-el-11  el_after_av_section  el_before_av_textblock  avia-builder-el-first  av-mini-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div><\/p>\n<section  class='av_textblock_section av-kt2v7yj6-a987ffde066a4bbf3f0838ca1c1460e8 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><strong>Do you need support in carrying out the vulnerability scans or should we perform the entire scan for you?<\/strong><\/p>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdinen91-adbcf6d4ff4575036cc9f770645778a3\">\n#top .hr.hr-invisible.av-kdinen91-adbcf6d4ff4575036cc9f770645778a3{\nheight:10px;\n}\n<\/style>\n<div  class='hr av-kdinen91-adbcf6d4ff4575036cc9f770645778a3 hr-invisible  avia-builder-el-13  el_after_av_textblock  el_before_av_textblock  av-mini-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<section  class='av_textblock_section av-kt2v7yj6-a987ffde066a4bbf3f0838ca1c1460e8 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div class='avia_textblock'  itemprop=\"text\" ><p><span class=\"VIiyi\" lang=\"en\"><span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"de\" data-phrase-index=\"0\" data-number-of-phrases=\"1\">Get in touch with our security experts, we will be happy to support you:<\/span><\/span><\/p>\n<\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdinen91-95d20771e45794782e5fd7b1d2dcedc7\">\n#top .hr.hr-invisible.av-kdinen91-95d20771e45794782e5fd7b1d2dcedc7{\nheight:20px;\n}\n<\/style>\n<div  class='hr av-kdinen91-95d20771e45794782e5fd7b1d2dcedc7 hr-invisible  avia-builder-el-15  el_after_av_textblock  el_before_asecus_hubspot_contact_form  av-mini-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<section class=\"asecus_hubspot_contact_form_section \"  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><div id=\"hubspot_form\"><\/div><\/section>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kdinen91-f4a44b1e571f625e89b26160d1aa46ee\">\n#top .hr.hr-invisible.av-kdinen91-f4a44b1e571f625e89b26160d1aa46ee{\nheight:68px;\n}\n<\/style>\n<div  class='hr av-kdinen91-f4a44b1e571f625e89b26160d1aa46ee hr-invisible  avia-builder-el-17  el_after_asecus_hubspot_contact_form  el_before_asecus_blog  av-mini-hide'><span class='hr-inner '><span class=\"hr-inner-style\"><\/span><\/span><\/div>\n<div   data-autoplay=''  data-interval='5'  data-animation='fade'  data-show_slide_delay='90'  class='avia-content-slider avia-content-grid-active avia-content-slider1 avia-content-slider-odd  avia-builder-el-18  el_after_av_hr  avia-builder-el-last  '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class='avia-content-slider-inner'><div class='slide-entry-wrap'><article class='slide-entry flex_column  post-entry post-entry-17977 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_third first real-thumbnail post-format-image'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.asecus.ch\/en\/news\/e-mail-datenverlust-stoppen\/' data-rel='slide-1' class='slide-image' title='Stop email data loss with AE DLP'><img decoding=\"async\" loading=\"lazy\" width=\"1030\" height=\"824\" src=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2026\/03\/Whitepaper-Adaptive-Emai_EN.png\" class=\"wp-image-17988 avia-img-lazy-loading-17988 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2026\/03\/Whitepaper-Adaptive-Emai_EN.png 1030w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2026\/03\/Whitepaper-Adaptive-Emai_EN-300x240.png 300w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2026\/03\/Whitepaper-Adaptive-Emai_EN-768x614.png 768w\" sizes=\"auto, (max-width: 1030px) 100vw, 1030px\" \/><\/a><div class='slide-content'><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.asecus.ch\/en\/news\/e-mail-datenverlust-stoppen\/' title='Stop email data loss with AE DLP'>Stop email data loss with AE DLP<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-meta'><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2026-03-03T17:36:12+01:00\" >3. March 2026<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >How Adaptive Email DLP detects contextual risks and prevents email data loss\u2026<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2026\/03\/Whitepaper-Adaptive-Emai_EN.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>824<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1030<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Dana Badulescu<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2023\/08\/asecus_logo_openFiles_RGB_logo_colored-1-300x80.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Dana Badulescu<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-12-16T18:01:03+01:00\" >2026-03-03 17:36:12<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-05 10:45:24<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Stop email data loss with AE DLP<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-16074 slide-entry-overview slide-loop-2 slide-parity-even  av_one_third  real-thumbnail post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.asecus.ch\/en\/news\/change-in-management\/' data-rel='slide-1' class='slide-image' title='Change in management'><img decoding=\"async\" loading=\"lazy\" width=\"1386\" height=\"989\" src=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/09\/handshake-stephan-hungerbuehler-philipp-oesch.jpg\" class=\"wp-image-16080 avia-img-lazy-loading-16080 attachment-portfolio size-portfolio wp-post-image\" alt=\"Co-CEO Stephan Hungerb\u00fchler (left) and Co-CEO Philipp Oesch (right) shaking hands during the change in Asecus&#039; management team.\" srcset=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/09\/handshake-stephan-hungerbuehler-philipp-oesch.jpg 1386w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/09\/handshake-stephan-hungerbuehler-philipp-oesch-300x214.jpg 300w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/09\/handshake-stephan-hungerbuehler-philipp-oesch-1030x735.jpg 1030w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/09\/handshake-stephan-hungerbuehler-philipp-oesch-768x548.jpg 768w\" sizes=\"auto, (max-width: 1386px) 100vw, 1386px\" \/><\/a><div class='slide-content'><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.asecus.ch\/en\/news\/change-in-management\/' title='Change in management'>Change in management<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-meta'><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-09-23T15:40:04+02:00\" >23. September 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >Asecus announces change in leadership: Co-CEO Stefan Hungerb\u00fchler hands over\u2026<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/09\/handshake-stephan-hungerbuehler-philipp-oesch.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>989<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1386<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Dana Badulescu<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2023\/08\/asecus_logo_openFiles_RGB_logo_colored-1-300x80.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Dana Badulescu<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-12-16T18:01:03+01:00\" >2025-09-23 15:40:04<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-09-23 17:21:10<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Change in management<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-15999 slide-entry-overview slide-loop-3 slide-parity-odd  post-entry-last  av_one_third  real-thumbnail post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/BlogPosting\" itemprop=\"blogPost\" ><a href='https:\/\/www.asecus.ch\/en\/security-policy-management-whitepaper\/' data-rel='slide-1' class='slide-image' title='Firewall rules under control?'><img decoding=\"async\" loading=\"lazy\" width=\"1536\" height=\"1229\" src=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/09\/Security-Policy-Management_Whitepaper-en.webp\" class=\"wp-image-15996 avia-img-lazy-loading-15996 attachment-portfolio size-portfolio wp-post-image\" alt=\"\" srcset=\"https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/09\/Security-Policy-Management_Whitepaper-en.webp 1536w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/09\/Security-Policy-Management_Whitepaper-en-300x240.webp 300w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/09\/Security-Policy-Management_Whitepaper-en-1030x824.webp 1030w, https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/09\/Security-Policy-Management_Whitepaper-en-768x615.webp 768w\" sizes=\"auto, (max-width: 1536px) 100vw, 1536px\" \/><\/a><div class='slide-content'><header class=\"entry-content-header\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.asecus.ch\/en\/security-policy-management-whitepaper\/' title='Firewall rules under control?'>Firewall rules under control?<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >How you can ensure transparency, control, and compliance in complex network\u2026<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2025\/09\/Security-Policy-Management_Whitepaper-en.webp<\/span>\n\t\t\t\t\t\t<span itemprop='height'>1229<\/span>\n\t\t\t\t\t\t<span itemprop='width'>1536<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>Dana Badulescu<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.asecus.ch\/wp-content\/uploads\/2023\/08\/asecus_logo_openFiles_RGB_logo_colored-1-300x80.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>Dana Badulescu<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2021-12-16T18:01:03+01:00\" >2025-09-16 11:52:31<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2026-03-04 11:36:36<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Firewall rules under control?<\/span><\/span><\/span><\/article><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber criminals are already actively exploiting the vulnerability to infect exposed systems with malware.<\/p>\n","protected":false},"author":3,"featured_media":7317,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[182],"tags":[189],"class_list":["post-7316","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-news-en"],"_links":{"self":[{"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/posts\/7316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/comments?post=7316"}],"version-history":[{"count":0,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/posts\/7316\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/media\/7317"}],"wp:attachment":[{"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/media?parent=7316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/categories?post=7316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.asecus.ch\/en\/wp-json\/wp\/v2\/tags?post=7316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}