Watch how Swapnil Bhosale, Security Consultant from SecurityHQ, demonstrates the Log4J vulnerability, and provides recommendations on how to mitigate the threat.
Find out more recommendation and mitigations here: New Critical Log4J Vulnerability Exploitation
RELATED VIDEOS
SIGN UP FOR OUR NEWSLETTER
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Related Content
New Critical Log4J Vulnerability Exploitation
On the 10th of December a new critical vulnerability known as Log4J was exposed, (https://nvd.nist.gov/vuln/detail/CVE-2021-44228) allowing unauthenticated remote code execution. SecurityHQ predicts that the ease of exploit, together with the vast range affected vendors, are the perfect recipe a fresh wave of Ransomware, just in time for Christmas! Log4j 2 is an open-source Java logging […]
Managed Detection and Response (MDR)
Download SecurityHQ's MDR Datasheet to learn about how 24/7 threat monitoring, detection and targeted responses, powered by real-time log analytics can benefits your business.
SecurityHQ Investigates HAFNIUM Compromise of Microsoft Exchange Servers – 10 March 2021
On 2nd March 2021, Microsoft disclosed details of four zero-day vulnerabilities that had been used by the threat actor known as HAFNIUM to target Microsoft Exchange servers. HAFNIUM are linked to the People’s Republic of China (PRC). The vulnerabilities allowed HAFNIUM to gain access to on-premises exchange servers, which then allowed the group to steal […]