Ein Leitfaden zur Reaktion auf die Log4j-Schwachstelle
17. Januar 2022
Since the discovery of Log4j, security teams across every industry have been busy addressing this vulnerability. However, given the ubiquitous usage of the Log4j library in enterprise and open-source software, it’s been difficult for organizations to identify everywhere they might be vulnerable, allowing opportunistic attackers to continue leveraging the vulnerabilities for lateral spread.