paint-brush
Log4J Vulnerability: A Legacy of Cybersecurity from Java to Blockchain and Minecraft by@salkimmich
1,546 reads
1,546 reads

Log4J Vulnerability: A Legacy of Cybersecurity from Java to Blockchain and Minecraft

by Sal Kimmich1mDecember 15th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The who, what where why and how to fix the Log4j vulnerability. Who: This is a cybersecurity attack specifically targeting the act of logging behavior of software. There are many developer pipelines that use Java based logging. If you track licensing (LDAP) or just running basic best practice on logging your network activity this could already have affected you. 

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Log4J Vulnerability: A Legacy of Cybersecurity from Java to Blockchain and Minecraft
Sal Kimmich HackerNoon profile picture
Sal Kimmich

Sal Kimmich

@salkimmich

Focused on the open source software supply chain to build a better digital future for all of us.

About @salkimmich
LEARN MORE ABOUT @SALKIMMICH'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Sal Kimmich HackerNoon profile picture
Sal Kimmich@salkimmich
Focused on the open source software supply chain to build a better digital future for all of us.

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite