Logjam Vulnerability: 5 Key Issues
http://www.bankinfosecurity.com/logjam-vulnerability-5-key-issues-a-8249/op-1
LogJam: Researchers Identify Another Web Encryption Vulnerability
http://www.tripwire.com/state-of-security/vulnerability-management/logjam-researchers-identify-another-web-encryption-vulnerability/#.VVxP1X9djqY.linkedin
LogJam Exposed: 575 Cloud Services Potentially Vulnerable to Man-in-the Middle Attacks
https://www.skyhighnetworks.com/cloud-security-blog/logjam-exposed-575-cloud-services-potentially-vulnerable-to-man-in-the-middle-attacks/
How to Check for Logjam Using Nmap
https://danielmiessler.com/blog/check-logjam-nmap/
Logjam, FREAK and Upcoming Changes in OpenSSL
https://www.openssl.org/blog/blog/2015/05/20/logjam-freak-upcoming-changes/
Logjam crypto attack proves yet again one bad apple spoils the bunch
https://www.bluecoat.com/2015-05-22/logjam-crpyto-attack-proofs-yet-again-one-bad-apple-spoils-bunch
Check Point Threat Alert: Logjam
http://blog.checkpoint.com/2015/05/20/check-point-threat-alert-logjam/
Logjam: the latest TLS vulnerability explained
https://blog.cloudflare.com/logjam-the-latest-tls-vulnerability-explained/
The Logjam Attack – ANOTHER Critical TLS Weakness
http://www.darknet.org.uk/2015/05/the-logjam-attack-another-critical-tls-weakness/
What You Need to Know About the Logjam Vulnerability
http://h30499.www3.hp.com/t5/Fortify-Application-Security/What-You-Need-to-Know-About-the-Logjam-Vulnerability/ba-p/6747109#.VWA7qkZjiSo
The Logjam Attack: What You Need to Know
https://blog.malwarebytes.org/security-threat/2015/05/the-logjam-attack-what-you-need-to-know/
Anatomy of a LOGJAM - another TLS vulnerability, and what to do about it
https://nakedsecurity.sophos.com/2015/05/21/anatomy-of-a-logjam-another-tls-vulnerability-and-what-to-do-about-it/
LogJam Vulnerability Threatens Thousands of HTTPS Websites & Mail Servers
http://blog.avira.com/logjam-vulnerability-threatens-thousands-of-https-websites-mail-servers/
Breaking down the Logjam (vulnerability)
https://community.rapid7.com/Rapid7_BlogPostDetail?id=a111400000Ab1hWAAR
LogJam, Little Sister of FREAK
http://blog.sensecy.com/2015/05/21/logjam-little-sister-of-freak/
Logjam is latest security flaw to affect secure communication protocols
http://www.symantec.com/connect/blogs/logjam-latest-security-flaw-affect-secure-communication-protocols
Logjam Flaw May Open Data to Cybercriminals by Fooling Web Browsers
http://securityintelligence.com/news/logjam-flaw-may-open-data-to-cybercriminals-by-fooling-web-browsers/#.VWBpTkZjiSo
More SSL Mess - Logjam
http://community.websense.com/blogs/securitylabs/archive/2015/05/21/more-ssl-mess-logjam.aspx
Logjam security flaw leaves top HTTPS websites, mail servers vulnerable
http://www.zdnet.com/article/logjam-security-flaw-leaves-tens-of-thousands-of-https-websites-vulnerable/