The Latest with Log4J

The Latest with Log4J

Cloud Security News this week 22 December 2021

  • Most folks in cybersecurity have been consumed with all things Log4shell with a CVSS score of 10, since last week. Check out last week’s episode or our special feature on Log4shell on YouTube by Ashish Rajan if you want to know a bit more about how it started and what its all about So, where have things landed with it all so far.
  • To remedy the Log4Shell vulnerability, Apache has issues several patches however with each patch, additional issues were reported. The latest patch is the third installment 2.17.0 to address a new vulnerability that allow for denial of service attacks. While apache and other organisations rush to remedy and patch these vulnerabilities, an explosion of attacks continue. Belgium’s defence ministry revealed that it had been forced to shut down parts of its network after a hacker group exploited log4j to gain entry to its systems. Security firm Check Point has been monitoring the situation and, at one point, reported seeing more than 100 Log4J attacks per minute.The hackers are scattered globally. Checkpoint further reported that more than half of the exploits come from well-known hacking groups using it to deploy common malware like Tsunami and Mirai. Sentinel one has reported that “Observed exploit attempts in the wild thus far have led to commodity cryptominer payloads or other known and commodity post-exploitation methods. They expect further opportunistic abuse by a wide variety of attackers, including ransomware and nation-state actors.”
  • The latest apache update is available here. The SentinelOne blog is available here and Checkpoint blog is available here,
  • Whilst we are scrambling to stay on top log4Shell, a few exciting things have occurred in the world of Cloud Security as well, Ermetic announced a $70 million series B funding round. Their platform secures cloud infrastructure by focusing on identity security and reducing the attack surface across a multi-cloud deployment. The platform is expanding its support for Kubernetes container orchestration which they refer to like the fourth cloud. Learn more about Ermetic here.
  • And in other news Container and cloud security unicorn Sysdig scored $350 million in a Series G funding. This raises their total funding to $744 million and pushes valuation to $2.5 billion. Sysdig offers security and performance monitoring services tailored toward cloud-native applications and are looking to utilise the latest funding to accelerate the expansion of these services into new markets, increase its headcount and customer base, and invest in research and development. Learn more about Sysdig here

Jaksot(344)

New Identity Blueprint for a Future with Cloud & AI

New Identity Blueprint for a Future with Cloud & AI

Identity is the root cause of over 70% of all security incidents, yet many organizations still rely on fundamentally flawed authentication methods. In this episode, Jasson Casey, CEO and co-founder of...

22 Elo 202549min

AI for SOC Automation: A Blueprint for the New world of Incident Response

AI for SOC Automation: A Blueprint for the New world of Incident Response

The nature of Security Operations is changing. As cloud environments grow in complexity and data volumes explode, traditional approaches to detection and response are proving insufficient. This episod...

8 Elo 202552min

The Truth About Agentic AI in the SOC: Reality vs. Hype

The Truth About Agentic AI in the SOC: Reality vs. Hype

What does the integration of AI into a Security Operations Center (SOC) practically look like? This episode explores the concept of the "Agentic SOC," moving beyond marketing terms to discuss its real...

7 Elo 202552min

Understanding a $10B Fraud Vector in Cloud-Native Workflows

Understanding a $10B Fraud Vector in Cloud-Native Workflows

A $10 billion fraud vector is currently exploiting a common feature in many cloud-native applications: the SMS verification flow. This isn't a traditional breach. Instead of stealing data, adversaries...

22 Heinä 202544min

How BT Tackled 180 Years of Legacy to Build a Passwordless Future

How BT Tackled 180 Years of Legacy to Build a Passwordless Future

How do you modernize security in a 180-year-old company that operates critical national infrastructure? What does it look like when you discover tens or even hundreds of thousands of credentials hidde...

17 Heinä 202519min

Why Security Can Be Stricter: A Zero Trust Approach to AppSec with AI

Why Security Can Be Stricter: A Zero Trust Approach to AppSec with AI

Is AI making application security easier or harder? We spoke to Amit Chita, Field CTO at Mend.io, the rise of AI agents in the Software Development Lifecycle (SDLC) presents a unique opportunity for s...

15 Heinä 202545min

Guide to Hybrid Cloud & Bare Metal Secret Management

Guide to Hybrid Cloud & Bare Metal Secret Management

Is your organization struggling with secret management across bare metal, hybrid, and multi-cloud environments? Standard cloud-native tools often fall short when you need a single, standardized soluti...

9 Heinä 202532min

 "Escape-Proof" Cloud: How Block built an Automated Approach to Egress Control

"Escape-Proof" Cloud: How Block built an Automated Approach to Egress Control

Many organizations focus on keeping attackers out, but what happens when one gets in? We spoke to Ramesh Ramani, Staff Security Engineer at Block about the real challenge, which is preventing them fro...

1 Heinä 202540min