InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Threats in 3 Minutes - Apache Log4j Vulnerability (Explained)

Presented by

Shehnaaz, Product Expert

About this talk

Logging is a fundamental feature of software. A flaw in Log4j, a Java-based logging utility, has been deemed as one of the most high-profile security risks with a severity score of 10/10. Numerous enterprise applications and open-source applications commonly use Java Apache Log4j. However, the scary part is that it is hard to detect which applications use Log4j due to the way it's implemented and developed. The Log4j flow allows third-party servers to execute software code remotely, making it easy to perform all kinds of malicious actions on the targeted machine. This opens the door for detrimental damage, by stealing sensitive data, taking control of the affected machine, and installing ransomware that locks the system until the ransom demand has been met. In this video, we will be covering what the Log4j vulnerability is, how it's exploited, and how you can fix it. Watch the video to learn more!
ManageEngine Log360

ManageEngine Log360

1566 subscribers20 talks
Cybersecurity made SIEMple
ManageEngine Log360 is a unified SIEM solution with integrated DLP and CASB capabilities for investigating, detecting, and responding to security threats. On-premises, cloud, or both - Log360 has it covered. It is simple to deploy, has a centralized console to manage multiple environments, and licensed based on the pay only for what you use model.
Related topics