This blog series contains news, insights, and practical tips on how to address the Log4j vulnerability, tracked as CVE-2021-44228. The Log4j library is a popular Java library used in many web applications and hundreds of significant enterprise products, both on-premises, and cloud-based. The Log4j vulnerability allows any remote attacker to take control of an Internet-connected device if it is running Java software that uses one of the affected Log4j versions. Given the scope of how many devices and systems use the Log4j library in their code, this vulnerability can potentially impact a previously unheard-of variety of devices, tools, and security infrastructure systems across cloud and hybrid networks in organizations across the globe.
Hello! It looks like you may have some browser-security settings in place that block basic web page functions, like the form that should be right here. Please change your browser settings and refresh this page; you can find our privacy and security policies here.