Towards Data Science cover image

128. David Hirko - AI observability and data as a cybersecurity weakness

Towards Data Science

CHAPTER

The Log for J Shell Vulnerability

The government said it was like a 10 out of 10 in terms of just the ability for it to be exploited. A lot of these kind of distributed processing systems are heavily reliant on Java and a lot of the Java libraries. And so, you know, we saw log for J and we saw kind of how it was being documented to exploit systems. We were just like, wow, like this is, this is days of data poisoning.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner