The Log4Shell Vulnerability – explained: how to stay secure

On December 9th, researchers uncovered a zero-day critical vulnerability in the Apache Log4j library used by millions of Java applications. CVE-2021-44228 or “Log4Shell” is a RCE vulnerability that allows attackers to execute arbitrary code and potentially take full control over an infected system. The vulnerability has been ranked a 10/10 on the CVSSv3 severity scale.
While the Apache Foundation has already released a patch for this CVE, it can take weeks or months for vendors to update their software, and there are already widespread scans being conducted by malicious attackers to exploit Log4Shell.

What should companies or organizations do?
Join Marco Preuss, Head of Europe’s Global Research and Analysis (GReAT) team, Marc Rivero and Dan Demeter, Senior Security Researchers with GReAT, for an in-depth discussion on Log4Shell and a live Q&A session.

In this webinar you’ll learn:

  • The most important technical details of the Log4Shell vulnerability
  • What threat it poses to companies and organizations
  • What you can do to stay secure

This webinar will be of particular interest to any IT and security personnel of any size business or public organization.
To join the webinar, please register or sign in to Securelist.