article thumbnail

Log4J: What You Need to Know

Adam Levin

The timing of the discovery of the vulnerability also works against organizations; many IT teams and cybersecurity personnel who would typically be working to apply patches and mitigate would-be cyberthreats often work with skeleton crews over the holiday season. The combination of these three factors represents a worst-case scenario. .

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. I’ve recently had several deep-dive discussions with cybersecurity experts at Juniper Networks, about this. Log4j, for instance, is a ubiquitous logging library. The Sunnyvale, Calif.-based

Security 218
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: Software tampering escalates as bad actors take advantage of ‘dependency confusion’

The Last Watchdog

Log4J, aka Log4Shell, refers to a gaping vulnerability that exists in an open-source logging library that’s deeply embedded within servers and applications all across the public Internet. Its function is to record events in a log for a system administrator to review and act upon.

article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

That’s Gartner’s estimate of global spending on cybersecurity in 2017 and 2018. Memory hacking is being carried out across paths that have been left comparatively wide open to threat actors who are happy to take full advantage of the rather fragile framework of processes that execute deep inside the kernel of computer operating systems.

article thumbnail

Will Autonomous Security Kill CVEs?

ForAllSecure

TwistLock, Anchore) check built docker image for out-of-date, vulnerable libraries. Over time, vendors recognized the importance of cybersecurity and created their own database of vulnerabilities. A dictionary of publicly known cybersecurity vulnerabilities. For example: Software Component Analysis tools (e.g.,

article thumbnail

Will Autonomous Security Kill CVEs?

ForAllSecure

TwistLock, Anchore) check built docker image for out-of-date, vulnerable libraries. Over time, vendors recognized the importance of cybersecurity and created their own database of vulnerabilities. A dictionary of publicly known cybersecurity vulnerabilities. For example: Software Component Analysis tools (e.g.,

article thumbnail

WILL AUTONOMOUS SECURITY KILL CVES?

ForAllSecure

TwistLock, Anchore) check built docker image for out-of-date, vulnerable libraries. Over time, vendors recognized the importance of cybersecurity and created their own database of vulnerabilities. A dictionary of publicly known cybersecurity vulnerabilities. For example: Software Component Analysis tools (e.g.,