Defending Against Log4j Vulnerabilities

In December 2021, a vulnerability in the open source Log4J logging service used by developers to monitor their Java applications first came to light and many leaving enterprises scrambling to patch affected systems.

Analysis from Microsoft has revealed details of a security flaw in SolarWinds Serv-U software, which was being exploited by malicious actors to launch attacks leveraging the Log4j bugs to compromise targets. 

Consequently, there remains a strong possibility that criminal hackers can avoid detection by staying hidden inside networks, waiting for the right moment to strike, as with the highly damaging and widespread SolarWinds exploit.  In particular, the risk of concealed Log4j vulnerabilities means that effective measures are required to reduce the frequency of disruptive events and to control the degree to which they cause damage.

Using up to date technology and cyber security tools both play a valuable role in protecting an organisation, however, management need to look at the defensive controls they have in place if they want to strengthen their cyber security and prepare for other similar persistent vulnerabilities.

Important Steps To Improve  Security

Diverse Teams:   Women and minority groups are heavily under-represented in the field, and that needs to change not only to help relieve the skills shortage but also to create higher performing teams

Outsourcing:   The skills gap in cyber security has been discussed for years, but unfortunately, it’s only becoming more acute and current predictions say there will be 3.5 million unfilled cyber security jobs by the end of 2021. Consider bringing on a managed service provider to help bolster your team. 

Training:   The most critical skills you need to train for are incident response and crisis management. Every  employee must be vigilant and play an active role in ensuring a more secure enterprise. Provide employee cyber education training, and not turn a blind eye to other weak links in the chain. 

Technology:    There is a wide range of innovative work and cyber security tolls being developed that help businesses protect their infrastructure, assets, employees, and customers. But technology is not sufficient by itself -  building proactive, effective cyber security mindset among employees is equally important. 

Open Source Software:   Organisations should understand the extent to which they rely on open source software and tools and test them before running them on any production environment. 

If there is no change to the software installed on the server, it is not necessary to run Log4j scanners to detect the presence of Log4j. However, vulnerability assessment scans should be conducted periodically as part of any vulnerability management process.

For Advice and Recommendations on Employee Cyber Security Training please Contact: Cyber Security Intelligence. 

Microsoft:    Arent Fox:   Computing:    Venturebeat:     Flilboard:     Computer Weekly:   

Politico:     Security Boulevard

You Might Also Read: 

Chinese APT Hackers Used Log4Shell Exploit to Target Academic Institution:

 

« Auto-Redirects: A Harmful Detour
Ransomware Attack On Moncler »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Link11 GmbH

Link11 GmbH

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks.

CORDIS

CORDIS

CORDIS is the European Commission's primary public repository and portal to disseminate information on all EU-funded research projects and their results.

Radware

Radware

Radware is a global leader of application delivery and cyber security solutions for virtual, cloud and software defined data centers.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

PT Netmarks Indonesia

PT Netmarks Indonesia

PT Netmarks Indonesia is an IT solutions provider offering services related to ICT infrastructure, digital transformation and cyber security.

Safe Security

Safe Security

Safe Security (formerly Lucideus) provides Cyber risk assessment services and platforms to multiple Fortune 500 companies and governments across the globe.

CyBOK - University of Bristol

CyBOK - University of Bristol

CyBOK is a comprehensive Body of Knowledge to inform and underpin education and professional training for the cyber security sector.

Tecnalia Cyber-Security & Safety

Tecnalia Cyber-Security & Safety

Tecnalia’s Cyber-Security and Safety Research Group works on integrated security and safety technologies designed to protect networks, computers, devices, programs and data from attack.

TechStak

TechStak

TechStak is the easiest way for businesses to find and connect with IT Pros and other technology solution providers in their area.

Jump Capital

Jump Capital

Jump provides series A and B capital to data-driven tech companies within the FinTech, IT & Data Infrastructure, B2B SaaS and Media sectors.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

IPKeys Technologies

IPKeys Technologies

IPKeys delivers innovative cybersecurity and technology solutions focused on helping the federal government reduce risk and protect the US from cyberattacks.

Traced

Traced

TRACED is changing the detection paradigm. Empowering defenders to go on the offense to engage cyber attackers before they compromise your organization.

Conosco

Conosco

Conosco are industry-leading experts throughout the UK in strategic consulting, project delivery, business communications, support, and security.

Computacenter

Computacenter

Computacenter is a leading independent technology partner, trusted by large corporate and public sector organisations. We help our customers to source, transform and manage their IT infrastructure.