DrZeroTrust cover image

Cyber news and Zero Trust insights for 2/2/2022

DrZeroTrust

00:00

Ubiquity Network Appliances Using Log for J Shell Exploits

Attackers are targeting ubiquity network appliances, using log for j log for j shell exploits. This first active exploit was seen january twentieth, 20 22. They used proof o concept exploit previously shared on get hub. We're going to see some flim flammy, double wammy type attacks and the very near future.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app