Unsupervised Learning cover image

News & Analysis | No. 311

Unsupervised Learning

00:00

How to Solve a Log Forge Vulnerability Issue

Attackers are using the log forj von abily to install malware, including crypto miners and morian mustik botane clients. What we should be thinking about isn't just log for jay, but how many other projects are out there that have similar characteristics? Namely, one the project is maintained by very few people in their spare time for no money. And two, if the project had a major issue, it would disrupt the entire enternet.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app