The Defender's Advantage Podcast cover image

Threat Trends: M-Trends 2023

The Defender's Advantage Podcast

The Role of Log4j in the Targeting of Vulnerability

5min Snip

00:00
Play full episode
The most leveraged exploit against vulnerability were against the F5 big IP firewall component, as well as looking at some of the VMware workspace access and identity managers appliances. The key here to remember is that even if you don't have something that is compatible with log4j that maybe has remained on patch perimeter devices pose a significant threat because of where it is placed within your environment. And again, I know how we saw them use it over and over again was maintaining persistence there to come back in to an organization and conduct Wiper-Mower attacks.

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode