Log4j2 Zero-Day Vulnerability Update

crowdcast-cover

Adam Meyers, CrowdStrike SVP of Intelligence, discusses what you need to know about this critical attack vector

By now, you have probably heard of the vulnerability that has become known as Log4Shell. It is a recently discovered zero-day within Apache Log4j2, a widely used Java logging library. This exploit can allow unauthenticated remote code execution and access to Apache servers. CrowdStrike has confirmed active and ongoing attempts to exploit this vulnerability by threat actors across the globe.

Join CrowdStrike SVP of Intelligence Adam Meyers as he examines the facts behind Log4Shell and discusses the actions you can take to protect yourself and your company.

Register above for one of the following sessions:

  • Americas Session: December 16th @ 2:00pm EST
  • Asia-Pacific Session: December 17th @ 12:00pm AEDT
  • Europe Session: December 17th @ 10:00am GMT

In this session, you will learn:

  • Why Log4Shell is a critical vulnerability and requires urgent action
  • How the exploit works and how to protect your business
  • The latest information from CrowdStrike Intelligence about the vulnerability and exploitation attempts observed in the wild