Company
Date Published
Author
Eric Thomas
Word count
483
Language
English
Hacker News points
None

Summary

In December 2021, a critical remote code vulnerability in Apache's Log4J library, known as Log4Shell or LogJam (CVE-2021-44228), was uncovered, allowing attackers to execute arbitrary code by controlling log messages. Despite Logz.io not being vulnerable to this threat due to their use of Logback for microservice logging instead of Log4J, the company has proactively audited their systems, tested against potential exploits, and implemented mitigation measures such as content-level blocking at their distributed WAF layer. Additionally, they have bolstered their Cloud SIEM product with new detections, threat intelligence, and IOCs to alert customers of potential threats, while continuously monitoring and updating their clients through various communication channels. The emphasis remains on ensuring customer security and keeping them informed as the situation evolves.