Log4j Vulnerability - Everything you need to know

Presented by

Yaniv Shechtman, Lotem Finkelsteen

About this talk

The Apache Log4j vulnerability exploit has caught security teams entirely off guard. Log4j is the most popular java logging library with over 400,000 downloads from its GitHub project and the Log4j library is embedded in almost every Internet service or application we are familiar with, including Twitter, Amazon, Microsoft, Minecraft and more. Exploiting this vulnerability is simple and allows threat actors to control java-based web servers and launch remote code execution attacks. We’ve subsequently seen new variations of the original exploit being introduced rapidly- over 60 in less than 24 hours. Check Point’s Infinity architecture provides zero-day protection for our customers and prevented hackers from exploiting this vulnerability in our customer deployments. Join us to discuss: • How to identify a Log4j attack • Who is vulnerable to this exploit • How to keep applications secure from this attack and future, currently unknown zero-day attacks
Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (356)
Subscribers (54750)
Check Point Software Technologies Ltd. (www.checkpoint.com) is a leading AI-powered, cloud-delivered cyber security platform provider protecting over 100,000 organizations worldwide. Check Point leverages the power of AI everywhere to enhance cyber security efficiency and accuracy through its Infinity Platform, with industry-leading catch rates enabling proactive threat anticipation and smarter, faster response times. The comprehensive platform includes cloud-delivered technologies consisting of Check Point Harmony to secure the workspace, Check Point CloudGuard to secure the cloud, Check Point Quantum to secure the network, and Check Point Infinity Core Services for collaborative security operations and services.