On 9th December 2021, the Alibaba Cloud Security Team released a zero-day vulnerability involving arbitrary code execution in Log4j 2, and “Log4Shell” was the given name.

With over thousands of millions of downloads of Log4j worldwide and its use as a Java logging framework since its creation about 20 years ago, we believe it’s being used in every organization worldwide. Every single piece of device or software that uses Java can be prone to this vulnerability Log4Shell (CVE-2021-44228).

What can you learn?

Log4j History
What is Log4j?
Where Log4j is used?
Log4j Vulnerability Details
How the Attack Works?
How to test Log4j Vulnerability?
How to fix Log4j vulnerability?
Book Your Free Consultation Now!





Log4j – Vulnerability Analysis and Remediation

LOG4J Webinar
On-Demand Webinar

Log4j - Vulnerability Analysis and Remediation

On 9th December 2021, the Alibaba Cloud Security Team released a zero-day vulnerability involving arbitrary code execution in Log4j 2, and “Log4Shell” was the given name.

With over thousands of millions of downloads of Log4j worldwide and its use as a Java logging framework since its creation about 20 years ago, we believe it’s being used in every organization worldwide. Every single piece of device or software that uses Java can be prone to this vulnerability Log4Shell (CVE-2021-44228).

Join us for this Live Webinar with our experts as we walk you through identifying and resolving Log4Shell Vulnerability.

Log4j JNDI Attack
Agenda
  • Log4j History
  • What is Log4j?
  • Where Log4j is used?
  • Log4j Vulnerability Details
  • How the Attack Works?
  • How to test Log4j Vulnerability?
  • How to fix Log4j vulnerability?
Speaker
Ameer Ali Shah

Ameer Ali Shah

Sr. Manager – IT Infrastructure at Royal Cyber Inc.
Muhammad Hunain

Muhammad Hunain

Manager – Cloud Engineering at Royal Cyber Inc.

Watch On-Demand

Watch Webinar On-Demand