The aim of this article is to provide some core information about the log4j vulnerability which has been generating a lot of noise in the last few days as well as a list of 4x steps we are recommending based on advice from government agencies and security groups we are a member of.
This vulnerability is serious as it affects a very wide range of devices (CISCO, Checkpoint etc) and applications/services (Vmware vcenter, Apache based website, sentinel one, etc).
It has a CVSS score of 10/10 (critical), the worse possible and allows unauthenticated remote code execution: CVE-2021-44228
The vulnerability affects applications running all versions of log4j before version 2.15.0 and is exploited by sending a specific text string that is interpreted by the log4j library
The Cybersecurity & Infrastructure Security Agency (CISA) has issued some guidance about it: ...
>>[READ MORE]

Log4j vulnerability information and 4x steps to prioritise
Programming and Cyber Security
The WhatsApp Privacy Question
Free Cyber Incident Playbooks on GitHub