Protect against Log4J without patching
Learn More
 
Protect against Log4J without patching
Learn More

UncategorizedLog4Shell: A Detailed Analysis | K2 Cyber Security

Blog

December 15, 2021 Alex Begun, Chief Revenue Officer
Log4Shell: A Detailed Analysis

We recently wrote about the newly discovered vulnerability in LOG4J2 (also referred to as LOG4SHELL).  Since we wrote our blog article, the LOG4SHELL vulnerability has been covered by major news outlets and is poised to pass both the Struts and Heartbleed vulnerabilities in terms of security and financial impact on organizations. 

Our previous blog article covered K2 Cyber Security’s ability to help detect the LOG4J2 library with K2 IAST (Interactive Application Security Testing) and also monitor and protect against attacks on the LOG4J2 with K2 RASP (Runtime Application Self Protection).  

Our OEM partner Juniper Networks, wrote a detailed technical analysis of the LOG4J2 vulnerability which we thought would be beneficial to share with our readers. You can also find the article by clicking on the link below.

https://blogs.juniper.net/en-us/security/apache-log4j-vulnerability-cve-2021-44228-raises-widespread-concerns 


Change how you protect and test your applications, and check out K2’s web application and application workload security solution and evaluate K2’s effectiveness at detecting and protecting your organization from attacks.

Find out more about K2 today by requesting a demo, or get your free trial.


 

 

Share this

Leave a Reply

Your email address will not be published. Required fields are marked *

K2 CYBER SECURITY

K2 Cyber Security delivers the Next Generation Application Security Platform to secure web applications and container workloads against sophisticated attacks in OWASP Top 10 and provides exploitable vulnerability detection during pre-production. K2’s Platform is deployed on production servers for runtime protection of applications and on pen-testing/pre-production/QA servers for interactive application security testing to identify the location of the vulnerable code. K2’s solution generates almost no false positives, eliminates breaches due to zero-day attacks, detects attacks missed by traditional security tools like Web Application Firewalls and host based EDR, finds missed exploitable vulnerabilities and dramatically reduces security cost. K2 Cyber Security is headquartered in the USA and provides cyber security solutions globally.

CONTACT INFO

K2 Cyber Security, Inc.

2580 N. First Street, #130

San Jose, CA 95131