Log4J Announcement

Vulnerabilities have been found in Log4J.

Internet security researchers have recently discovered a new vulnerability in an open-source program called Log4j.  Log4j is used by many software vendors, primarily in web servers and other web-enabled devices. This vulnerability is already being used by attackers, allowing them to take full control of affected machines. Log4j is an extremely popular piece of software and this vulnerability affects potentially millions of machines on the internet.

 

Network administrators should immediately identify all machines in their environment which might be vulnerable to this attack and contact the appropriate vendors to find out how to upgrade to a secure version of the software.  Likely targets include Apache web servers, firewalls and any other services which are accessible via a web browser.  If patching/upgrading is not an option, workarounds are possible to disable Log4j or protect vulnerable machines.


If you have any questions about this vulnerability or would like assistance reviewing your network, please contact support@icsla.us for further assistance or call us at (800) 710-4010.

cloud backup
  • November 20, 2024

How Cloud Backup and Recovery Keep Your Data Secure

Any business can be interrupted by loss of data,...

Cybersecurity
  • November 13, 2024

Top Cybersecurity Threats Businesses Facing in 2024

Cybersecurity threats are evolving faster than ever in 2024....

Ai Integration
  • November 6, 2024

Ethical Considerations and Challenges in AI Integration for Businesses

The influence of artificial intelligence (AI) is changing the...

Contact Us

Contact-Form

wpChatIcon
wpChatIcon