What We Can Learn from the Log4j Vulnerability
Pure Storage
JANUARY 21, 2022
It may sound obscure to the non-developer, but Log4j is actually one of the most widely used pieces of open source code on the internet. Since Log4j runs as a privileged system process, the malicious code that it can execute can also run as a privileged system process without requiring authentication. What Is Log4j?
Let's personalize your content