Remove a-guide-to-responding-to-the-log4j-vulnerability
article thumbnail

A guide to responding to the Log4j vulnerability

Lacework

On December 10th, 2021, CVE-2021-44228 took the security industry by storm when a remote code execution vulnerability was discovered in the popular logging library “ Log4j ”. Almost two months after this event, and numerous new CVEs ([ 1 ],[ 2 ],[ 3 ]), the industry is still feeling the fall out of this vulnerability.

article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

5 | Don’t take your eye off the Log4j ball. Log4j: It’s a marathon race not a sprint. Like an insufferable houseguest who overstays his welcome, the cataclysmic Log4j vulnerability will be around for a long time – possibly as much as a decade after its earth-shaking discovery in December of last year. And much more!

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Cybersecurity Snapshot: Log4j Anniversary, CI/CD Risks, Infostealers, Email Attacks, OT Security

Tenable

Get the latest on the anniversary of the Log4j crisis; OWASP’s top CI/CD risks; a surge of infostealer malware; the fund transfer fraud — business email compromise connection; and more! . 1 - One year after Log4j crisis, what have we learned? To get all the details, read the blog “ Are You Ready for the Next Log4Shell?

article thumbnail

Cybersecurity Snapshot: Attackers Hack Routers To Hit Critical Infrastructure, as CISA Calls for More Secure Router Design

Tenable

CISA is calling on router makers to improve security, because attackers like Volt Typhoon compromise routers to breach critical infrastructure systems. Meanwhile, data breaches hit an all-time high in the U.S. Plus, Italy says ChatGPT violates EU privacy laws. Dive into six things that are top of mind for the week ending February 2. So said the U.S.

article thumbnail

How DevSecOps Can Help Mitigate the Next Log4j Vulnerability

Modus Create

This post will show you how adopting DevSecOps practices can mitigate vulnerabilities in libraries like Log4j. You will find answers to questions such as: Why do we need logging frameworks like Log4j? How did a lookup plugin in Log4j impact thousands of downstream applications and devices? What is Log4j?

article thumbnail

Cybersecurity Snapshot: 6 Things That Matter Right Now

Tenable

A roundup of important vulnerabilities, trends and incidents. A ransomware defense guide for SMBs. Protect what’s on your network, via secure configurations, account and access management, vulnerability management and employee security awareness. Topics that are top of mind for the week ending Aug. And much more! million.

IoT 52
article thumbnail

Cybersecurity Snapshot: Key 2022 Data for Cloud Security, Vulnerability Management, EASM, Web App Security and More

Tenable

1 – Log4J’s Log4Shell: Emblematic of VM complexities . Little over a year after the Log4j crisis, few data points illustrate the challenges of vulnerability management as well as Tenable’s finding that, as of October, 72% of global organizations remained exposed to Log4Shell, despite its unprecedented severity, pervasiveness and notoriety.

Cloud 98