Within a week, the Apache Log4j2 Remote Code Execution (RCE) Vulnerability (now known as Log4Shell) has become the biggest potential cyber threat globally. Not more than a day after researchers posted the zero-day vulnerability on 9 December 2021, proof-of-concept (POC) exploit code was released in the wild. While dangerous, RCE vulnerability exploits are common. What sets this apart is that the vulnerable Apache Log4j module is used everywhere logging is enabled; it is almost impossible to determine the number of systems at risk. It is estimated that over one quarter (1/4) of all web applications use the Log4j2 module, with many of the most well-known and prestigious sites at risk. If Apple iCloud, Twitter, Minecraft, and other applications are at risk, are yours as well? And this does not take into account the devices (printers, IoT, application & security management consoles, etc.) that are also at risk. How difficult will it be to patch systems and applications in the next few weeks.
Join us for this webinar to gain insight on how dangerous Apache Log4Shell really is. Learn how you can determine which applications and systems are at risk, and how you can mitigate that risk. We will also discuss how to track any signs that an attack has already breached your organization. Register now to reserve your place in the webinar! You do not want to miss it!
JOIN US FOR THIS WEBINAR & GET A CHANCE TO WIN A $20 SHOPPING VOUCHER!
Attendees who stay till the end of the webinar will get a chance to win a US$20 (or equivalent in your local currency) Shopping Voucher. Winners will be contacted by Sangfor local team for prize collection after the webinar.
This online webinar requires registration on the BrightTalk platform. Please use your First Name, Last Name & Email Address to sign up. Later, you will receive the confirmation email.