[EMEA] Impact and Insights on Log4Shell Vulnerability

Logo
Presented by

Dan Kaiser, Sally Vincent, and Brian Coulson

About this talk

The recently-disclosed “Log4Shell” vulnerabilities in Apache Log4j 2 had a major impact in the cybersecurity world due to the severity of the exploit and the incredibly widespread use of Log4j 2 in modern software. In this webinar the LogRhythm Labs team discussed methods to detect Log4Shell exploit attempts in your environment. Labs set the stage with a discussion and walkthrough of the Log4Shell vulnerability and moved right into demonstrations of the LogRhythm product line in action. The team demonstrated threat hunting in the LogRhythm SIEM, realtime detections using LogRhythm’s Advanced Intelligence Engine (AIE), deep packet inspection using LogRhythm NetMon and intrusion detection in LogRhythm MistNet. Viewers left the session with actionable insights into the Log4Shell exploit and how LogRhythm products can help ensure a robust detection posture against this threat.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (257)
Subscribers (76945)
LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency. With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com