paint-brush
Log4J Vulnerability: A Legacy of Cybersecurity from Java to Blockchain and Minecraft by@salkimmich
1,549 reads
1,549 reads

Log4J Vulnerability: A Legacy of Cybersecurity from Java to Blockchain and Minecraft

by Sal KimmichDecember 15th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The who, what where why and how to fix the Log4j vulnerability. Who: This is a cybersecurity attack specifically targeting the act of logging behavior of software. There are many developer pipelines that use Java based logging. If you track licensing (LDAP) or just running basic best practice on logging your network activity this could already have affected you. 
featured image - Log4J Vulnerability: A Legacy of Cybersecurity from Java to Blockchain and Minecraft
Sal Kimmich HackerNoon profile picture
Sal Kimmich

Sal Kimmich

@salkimmich

L O A D I N G
. . . comments & more!

About Author

Sal Kimmich HackerNoon profile picture
Sal Kimmich@salkimmich

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite