Log4J Vulnerability: A Legacy of Cybersecurity from Java to Blockchain and Minecraft by@salkimmich
1,518 reads

Log4J Vulnerability: A Legacy of Cybersecurity from Java to Blockchain and Minecraft

tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

The who, what where why and how to fix the Log4j vulnerability. Who: This is a cybersecurity attack specifically targeting the act of logging behavior of software. There are many developer pipelines that use Java based logging. If you track licensing (LDAP) or just running basic best practice on logging your network activity this could already have affected you. 

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Log4J Vulnerability: A Legacy of Cybersecurity from Java to Blockchain and Minecraft
Sal Kimmich HackerNoon profile picture

@salkimmich

Sal Kimmich


Receive Stories from @salkimmich

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa