CONTRAST SECURITY NEWS

What app developers need to do now to fight Log4j exploits

ByInfoWorld Jan 6, 2022 1:19:36 PM

Why you may already be at risk, how to detect and mitigate the Log4j vulnerabilities now, and how to improve your code security in the future.

Earlier this month, security researchers uncovered a series of major vulnerabilities in the Log4j Java software that is used in tens of thousands of web applications. The code is widely used across consumer and enterprise systems, in everything from Minecraft, Steam, and iCloud to Fortinet and Red Hat systems. One analyst estimate millions of endpoints could be at risk.

Log4j is just the latest in a series of software supply chain attacks, including SolarWinds (which had a compromised build process) and Kaseya (where attackers had substituted malware-laced code).

READ MORE

InfoWorld


MEDIA CONTACT

Jacklyn Kellick 
Public Relations Manager
jacklyn.kellick@contrastsecurity.com

SUBSCRIBE TO THE BLOG

Learn how to unify security strategy across & development operations. See how to set up a CAS program with only eight activities!

Download the Handbook