Just another day on the Threat Vector Front Line....never a dull...

  1. 485 Posts.
    lightbulb Created with Sketch. 91

    Just another day on the Threat Vector Front Line....never a dull moment.

    Posted, to let you see the types of resources, that must be brought to bear to compete in this arena.

    ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

    Source ARSTEC

    Zero-day in ubiquitous Log4j tool poses a grave threat to the Internet

    Minecraft is the first, but certainly not the last, app known to be affected.


    Getty Images
    105WITH 65 POSTERS PARTICIPATING

    Exploit code has been released for a serious code-execution vulnerability in Log4j, an open source logging utility that's used in countless apps, including those used by large enterprise organizations, several websites reported last Thursday.

    Word of the vulnerability first came to light on sites catering to users of Minecraft, the best-selling game of all time. The sites warned that hackers could execute malicious code on servers or clients running the Java version of Minecraft by manipulating log messages, including from things typed in chat messages. The picture became more dire still as Log4j was identified as the source of the vulnerability, and exploit code was discovered posted online.

    A big deal

    “The Minecraft side seems like a perfect storm, but I suspect we are going to see affected applications and devices continue to be identified for a long time,” HD Moore, founder and CTO of network discovery platform Rumble, said. “This is a big deal for environments tied to older Java runtimes: Web front ends for various network appliances, older application environments using legacy APIs, and Minecraft servers, due to their dependency on older versions for mod compatibility.”

    Reports are already surfacing of servers performing Internet-wide scans in attempts to locate vulnerable servers.

    Log4j is incorporated into a host of popular frameworks, including Apache Struts2, Apache Solr, Apache Druid, and Apache Flink. That means that a dizzying number of third-party apps may also be vulnerable to exploits of the same high severity as those threatening Minecraft users.

    ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
    https://hotcopper.com.au/data/attachments/3884/3884611-b41e647c074f42fffea3865412739e43.jpg

    Jcallaway

    How do you know your winning the fight.....because your bleeding.

 
Add to My Watchlist
What is My Watchlist?
A personalised tool to help users track selected stocks. Delivering real-time notifications on price updates, announcements, and performance stats on each to help make informed investment decisions.
arrow-down-2 Created with Sketch. arrow-down-2 Created with Sketch.