Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding the Log4j Log4Shell Vulnerability

A zero-day threat is creating waves through the cybersecurity industry more than any other in years. On Thursday, December 9, security researchers published a proof-of-concept exploit code for CVE-2021-44228, a remote code execution vulnerability in Log4j, a Java logging library used in a significant number of internet applications. In the week since its discovery businesses worldwide are frantically trying to identify and mitigate the exploit, while security pros and experts are desperately attempting to release patches and guide organizations as new information becomes known.

Log4Shell: What You Need to Know About the Log4j Vulnerability (APJ)

A new critical vulnerability, Log4Shell, was publicly disclosed on December 10th and is making global headlines. It impacts a wide amount of applications on the internet, allowing attackers to remotely execute code within vulnerable applications worldwide. In this webinar recording, Snyk technical experts provide an in-depth technical review of the Log4Shell vulnerability, what caused it, how it can be exploited, and most importantly, how it can be mitigated through upgrades, or defended against in WAF configurations and more.

Cloud File Sharing for Managed Service Providers (MSPs) Overview

In this video, Director of MSP Community and Enablement, Eric Anthony, gives an overview of Egnyte and how you can tailor our cloud file sharing tool to the needs of your clients. As a Managed Service Provider or MSP, referring your clients to resources that best fit their needs is imperative to fostering a long-term working relationship. At Egnyte, we give you the support you need to help your clients make informed decisions to keep collaboration simple, adhere to industry-specific regulations, and most importantly, keep their data secure.

Ugly Sweaters, Season's Greetings, and Cybersecurity Advice - Charge Up Coffee

Running a small business has a never-ending list of tasks that needed to be done yesterday. WatchGuard’s network of service providers helps business like Charge Up Coffee Shop keep their customers and employee secure so they can focus on their products.

Log4Shell: What You Need to Know About the Log4j Vulnerability

A new critical vulnerability, Log4Shell, was publicly disclosed on December 10th and is making global headlines. It impacts a wide amount of applications on the internet, allowing attackers to remotely execute code within vulnerable applications worldwide. In this webinar recording, Snyk technical experts provide an in-depth technical review of the Log4Shell vulnerability, what caused it, how it can be exploited, and most importantly, how it can be mitigated through upgrades, or defended against in WAF configurations and more. We cover.

Fireside Chat: Log4j and Injection Flaws

Join us for a fireside chat with Micah Silverman, Snyk's Director of DevSecOps Acceleration, and Vandana Verma, Security Relations Leader at Snyk, as we answer your #Log4Shell questions: What is it and how does it affect us? How do I find and fix the #Log4J vulnerability? What can other language ecosystems learn from this? We'll also talk about the OWASP Top 10 and injection flaws.