Is Log4J even worse than you think? Probably…

Is Log4J even worse than you think? Probably…

The Log4J Shell is being called the worst security vulnerability in a decade. When you dig into the details…it’s actually even worse than it sounds. ?

Since its discovery in early December, Log4J has known no shortage of headlines. If cyber risk had an annual award ceremony, this thing would take home every trophy. Yet, despite all the headlines, few people outside of the cybersecurity arena seem to recognize the magnitude of the problem. Don’t get me wrong, people are spooked and taking action to patch their networks. What many don’t realize, however, is that the fallout from Log4J has the potential to stay with us for…years to come. To understand why, you first have to understand what Log4J actually is.?

What is Log4J??

Log4J is an extremely popular logging library on the Java computing platform. In layman’s terms, “logging” refers to the communications between a computing system and the users of that system. In the simplest terms, it’s the act of “keeping a log.” ?

The vulnerability in the Log4J logging library targets areas that parse and log user-controlled data. To carry out an attack, hackers query services and attempt to trigger a log message like a 404 error. However, embedded in the hacker’s query is maliciously crafted code, which Log4j processes as instructions, bringing the malicious code directly (and unsuspectingly) into the network. Through this process, hackers can easily breach corporate networks and take over.?

Now here’s the real kicker. I said earlier that Log4J was “widely used.” Exactly how widely used is Log4J? Estimates show that Log4J has been downloaded more than 400,000 times. Logging is a critical part of computing and because the Log4J library?is used by most web services in the world (Amazon, MS Azure, Cisco, VMware, Dell, Citrix etc.), it means most web services are vulnerable. In the days after the Log4J vulnerability, there were more than 3.7 million hacking attempts to exploit the vulnerability…that we know about. ?

While the bigger corporations used their resources to immediately spring to action and patch their network, the threat now is that hackers will start to target less-resourced small and medium sized businesses. Small and medium sized businesses are also the most likely to have their workforce working from personal devices, which can make a corporate network even more susceptible to the Log4J vulnerability. We can help. ?

This is Why?TetherView?Exists?

Since the announcement of the breach, I’ve been asked by countless business leaders, “Mike, what could I have done to be better prepared?” ?

Run your network through our Digital Bunker. ?

There really isn’t anything else for me to say.?TetherView?was built for exactly this purpose. We assume there will always be vulnerabilities for hackers to exploit…and we close your network so there is only one way in, and one way out. And when you partner with?TetherView, someone is always keeping an eye on your network. We provide?real time fully staffed monitoring.?TetherView?combines great technology with great people. When threats are identified we can quickly mitigate?and monitor for any vulnerability.?When something like Log4J happens, this means we can easily monitor all activity and focus directly on the area of vulnerability in your network.?

SolarWinds. Log4J. Hackers are going to keep finding ways to come at your network. Let us help you keep them out. ?

要查看或添加评论,请登录

Michael Abboud的更多文章

  • The Silent Killer

    The Silent Killer

    Corruption: The Silent Killer of Innovation In the fast-paced world of business and technology, innovation is often…

  • Celebrating Innovation: Columbia University Graduate Capstone Project on DigitalBunker365

    Celebrating Innovation: Columbia University Graduate Capstone Project on DigitalBunker365

    As the Executive Sponsor of a Columbia University Graduate Capstone team, I am thrilled to share the culmination of an…

    5 条评论
  • Dreamers Win! With AI at our side, we are only limited by the boundary of our imaginations.

    Dreamers Win! With AI at our side, we are only limited by the boundary of our imaginations.

    The Power of Imagination in the Age of AI In the rapidly evolving landscape of artificial intelligence, the balance of…

  • How to Make Your Office 365 Email More Secure

    How to Make Your Office 365 Email More Secure

    4 easy steps to enhance the security of your company’s email Email remains the primary point of entry for hackers…

    1 条评论
  • Don’t Bring a Sword to a Gun Fight

    Don’t Bring a Sword to a Gun Fight

    As companies continue to splurge on cybersecurity, hackers enjoy record levels of success. There’s a famous scene in…

    2 条评论
  • The Verkada "Hack" Was Not A Hack

    The Verkada "Hack" Was Not A Hack

    "With a single breach, those scenes — and glimpses from more than 149,000 security cameras — were suddenly revealed to…

  • VPNs are jeopardizing the security of your business

    VPNs are jeopardizing the security of your business

    The Risk. The issue with corporate VPNs is that while they protect data traveling between a personal computer and a…

  • Don’t get burned by your WFH strategy

    Don’t get burned by your WFH strategy

    For most CEOs the possibility of a pandemic was lower on the list than a zombie apocalypse. According to a report on…

  • Fire the "IT Guy"

    Fire the "IT Guy"

    The title to this blog is not going to make any of us at TetherView popular with IT Managers. However, we think it’s…

    1 条评论
  • Compliance is NOT Security

    Compliance is NOT Security

    When we’ve met with organizations after a breach, there’s one thing we hear time and time again from the companies that…

社区洞察

其他会员也浏览了