Log4j vulnerability explained and how to respond
Blog: OpenText
On December 10th, warnings of the zero-day vulnerability found in the Java logging library, Apache Log4j 2.x, began to emerge. Today, we know that it is currently being exploited by attackers to exfiltrate data or execute arbitrary code. Log4j is very broadly used in a variety of consumer and enterprise services, websites, and applications for …
The post Log4j vulnerability explained and how to respond appeared first on OpenText Blogs.
Leave a Comment
You must be logged in to post a comment.