The Log4j security vulnerability is likely a result of insufficient secure coding and/or testing practices for software that is used in billions of devices worldwide. This vulnerability is now being actively exploited, causing a wide variety of security incidents and privacy breaches. New attacks are announced weekly, and sometimes daily, that are exploiting that vulnerability.
How did such a dangerous vulnerability make its way into billions of devices? Hear a preeminent applications development and cybersecurity expert, Dr. Mich Kabay, explain Log4j, how the Log4j vulnerability could hav
|