Remove IoT Remove Libraries Remove Systems administration Remove Trends
article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

These were all obscure open-source components that, over time, became deeply embedded in enterprise systems across the breadth of the Internet, only to have a gaping vulnerability discovered in them late in the game. Log4j, for instance, is a ubiquitous logging library. Frameworks like these serve as guideposts.

Security 223
article thumbnail

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog

For instance, major vulnerability was discovered lurking in the GNU C Library, or GLIBC, an open source component that runs deep inside of Linux operating systems used widely in enterprise settings. From here, it’s possible to hijack control over application servers, access databases, or use APIs to connect to other systems.”.