Understanding Log4J vulnerability

What is Log4J

How can an attacker exploit this

Steps need to be taken by security teams

Where can I find help and more information




The Diligent Geek

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

How Will Facial ID Technology Affect Different Parts of Our Lives?

Ten Years Later, EclecticIQ Examines Evolution of Stuxnet-like Attacks

Stuxnet, 10 years after.

Write-up: Cross-site WebSocket hijacking @ PortSwigger Academy

How to extract Chrome Passwords using python/python3!

The First Stater Community Airdrop for NFT Holders

The key to finding and fixing software vulnerabilities? Cooperation

Identifying Risks Is Critical to Telehealth’s Success

Pickle Finance Smart Contract Audit

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


The Diligent Geek

More from Medium

PicoCTF \\ Static ain’t always noise \\ General Skills

What Does a Pentest Actually Cost? — Cyver

Bandit-over the wire ctf gameplay

picoCTF: Tab, Tab, Attack