
Cyber news and Zero Trust insights for 2/2/2022
DrZeroTrust
00:00
Ubiquity Network Appliances Using Log for J Shell Exploits
Attackers are targeting ubiquity network appliances, using log for j log for j shell exploits. This first active exploit was seen january twentieth, 20 22. They used proof o concept exploit previously shared on get hub. We're going to see some flim flammy, double wammy type attacks and the very near future.
Transcript
Play full episode