Skip to content

Log4j vulnerability news, insights and practical tips

This blog series contains news, insights, and practical tips on how to address the Log4j vulnerability, tracked as CVE-2021-44228. The Log4j library is a popular Java library used in many web applications and hundreds of significant enterprise products, both on-premises, and cloud-based. The Log4j vulnerability allows any remote attacker to take control of an Internet-connected device if it is running Java software that uses one of the affected Log4j versions. Given the scope of how many devices and systems use the Log4j library in their code, this vulnerability can potentially impact a previously unheard-of variety of devices, tools, and security infrastructure systems across cloud and hybrid networks in organizations across the globe.

Subscribe to our blog to get monthly cybersecurity news, research, insights, and more from cybersecurity industry experts.

Hello! It looks like you may have some browser-security settings in place that block basic web page functions, like the form that should be right here. Please change your browser settings and refresh this page; you can find our privacy and security policies here.

Thanks you for submission! We will reach out to you shortly.
You can unsubscribe at any time. View our privacy policy.