Understanding Log4J vulnerability

What is Log4J

How can an attacker exploit this

Steps need to be taken by security teams

Where can I find help and more information

--

--

--

The Diligent Geek

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Lunaray blockchain security completed the security audit of the SOULMETA project

Read the article to be eligible for the upcoming in the Secret Network ecosystem

DEXGO — The power of personal data

Quantum Key Distribution for Cybersecurity

Compliance and the Public Cloud

So, what’s the big deal with quantum encryption?

European Union Data Protection Code of Conduct for Cloud Service Providers

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
goldytech

goldytech

The Diligent Geek

More from Medium

The Log4J Vulnerability Will Haunt the Internet for Years

Log4j Vulnerability Explained

TnT | Log4j

Detecting log4j using ShiftLeft CORE