Log4Shell, an internet vulnerability that affects millions of computers, involves an obscure but nearly ubiquitous piece of software, Log4j. The software is used to record all manner of activities that go on under the hood in a wide range of computer systems. Jen Easterly, Director of CISA, called Log4Shell the most serious vulnerability she's seen in her career. There have already been hundreds of thousands, perhaps millions, of attempts to exploit the vulnerability.
CyCognito's Discovery and Autonomous Security Testing is the most comprehensive and accurate assessment available to give you an attacker's perspective on all of your externally facing assets - especially those that are vulnerable to attack. CyCognito finds vulnerable assets and tags them for inspection - particularly products and technologies to the Log4j vulnerability. Watch this recording to understand how you can identify your vulnerable technologies and get recommendations for the next steps you can take to protect your organization.
Watch this recording to learn about:
- Key elements of a Log4j response plan
- How the CyCognito platform can detect your exploitable Log4j vulnerabilities easily
- Recommendations for a response plan that you can use for critical vulnerabilities today and in the future