Today, IBM Security's X-Force team presented a webinar about the Log4Shell vulnerability in the Log4j Java-based library. Clearly, the topic is top of mind for organizations worldwide...and it should be. Researchers are saying Log4Shell is one of the most severe vulnerabilities they have seen, especially considering millions of people use Log4j. Attackers are already exploiting Log4Shell too, which brings an even greater urgency to patch.
During the webinar, X-Force Head of Research Daniel Crowley and X-Force Global Lead of Threat Intelligence Nick Rossman, provided an overview of Log4j and Log4Shell. They explained how the Log4Shell vulnerability works, the impact it is having on organizations, and provided recommendations to help you protect yourself now and in the future.
5000+ viewers registered for the webinar, and 2800+ watched it live. Did you miss it? If so, we have an on-demand recording. You can access it through the
registration page. I also attached the presentation.
Do you have questions about IBM products? Visit our PSIRT blog which we are updating each day.
Do you have questions about other products? Email our X-Force team at AskXFR@ibm.com
Do you suspect you are experiencing a compromise? Call our 24-7 hotline:
X-Force's US hotline 1-888-241-9812
Global hotline (+001) 312-212-8034
------------------------------
Abby Ross
Associate Partner, X-Force
------------------------------