<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic TechTalk Special Edition: The Apache log4j Vulnerability Explained in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/TechTalk-Special-Edition-The-Apache-log4j-Vulnerability/m-p/136328#M24392</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Apache Log4j is the most popular java logging library with over 400,000 downloads from its GitHub project. It used by a vast number of companies worldwide, enabling logging in a wide set of popular applications. Exploiting this vulnerability is simple and allows threat actors to control java-based web servers and launch remote code execution attacks.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this CheckMates TechTalk Special Edition, Lotem Finklesteen, Director of Threat Intelligence and Research and Yaniv Shechtman, Head of Product Management, Threat Prevention tell you what you need to know about the log4j vulnerability&amp;nbsp;(CVE-2021-44228, a.k.a. log4shell) and how you can protect your organization.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;See also:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Second-Log4j-Vulnerability-CVE-2021-45046-Discovered/m-p/136400#M24399" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/Protect-yourself-against-a-widely-exploited-vulnerability-CVE/td-p/136079&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176865" target="_self" rel="noopener noreferrer"&gt;SecureKnowledge Article "Check Point response to Apache Log4j Remote Code Execution (CVE-2021-44228)...&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://blog.checkpoint.com/2021/12/11/protecting-against-cve-2021-44228-apache-log4j2-versions-2-14-1/" target="_self" rel="noopener noreferrer"&gt;Check Point Blog Post about the vulnerability&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.checkpoint.com/latest-cyber-attacks/critical-vulnerability-in-apache-log4j/" target="_self" rel="noopener noreferrer"&gt;Cyber Pandemic update –&amp;nbsp;Critical vulnerability in Apache Log4j&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Second-Log4j-Vulnerability-CVE-2021-45046-Discovered/m-p/136400#M24399" target="_self"&gt;&lt;SPAN&gt;Second Log4j Vulnerability (CVE-2021-45046) Discovered&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FN1lka8wgmYQ%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DN1lka8wgmYQ&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FN1lka8wgmYQ%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="200" height="113" scrolling="no" title="Apache log4j Vulnerability Explained" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 16 Dec 2021 09:26:12 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2021-12-16T09:26:12Z</dc:date>
    <item>
      <title>TechTalk Special Edition: The Apache log4j Vulnerability Explained</title>
      <link>https://community.checkpoint.com/t5/General-Topics/TechTalk-Special-Edition-The-Apache-log4j-Vulnerability/m-p/136328#M24392</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Apache Log4j is the most popular java logging library with over 400,000 downloads from its GitHub project. It used by a vast number of companies worldwide, enabling logging in a wide set of popular applications. Exploiting this vulnerability is simple and allows threat actors to control java-based web servers and launch remote code execution attacks.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;In this CheckMates TechTalk Special Edition, Lotem Finklesteen, Director of Threat Intelligence and Research and Yaniv Shechtman, Head of Product Management, Threat Prevention tell you what you need to know about the log4j vulnerability&amp;nbsp;(CVE-2021-44228, a.k.a. log4shell) and how you can protect your organization.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;See also:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Second-Log4j-Vulnerability-CVE-2021-45046-Discovered/m-p/136400#M24399" target="_blank"&gt;https://community.checkpoint.com/t5/General-Topics/Protect-yourself-against-a-widely-exploited-vulnerability-CVE/td-p/136079&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk176865" target="_self" rel="noopener noreferrer"&gt;SecureKnowledge Article "Check Point response to Apache Log4j Remote Code Execution (CVE-2021-44228)...&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://blog.checkpoint.com/2021/12/11/protecting-against-cve-2021-44228-apache-log4j2-versions-2-14-1/" target="_self" rel="noopener noreferrer"&gt;Check Point Blog Post about the vulnerability&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.checkpoint.com/latest-cyber-attacks/critical-vulnerability-in-apache-log4j/" target="_self" rel="noopener noreferrer"&gt;Cyber Pandemic update –&amp;nbsp;Critical vulnerability in Apache Log4j&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/Second-Log4j-Vulnerability-CVE-2021-45046-Discovered/m-p/136400#M24399" target="_self"&gt;&lt;SPAN&gt;Second Log4j Vulnerability (CVE-2021-45046) Discovered&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FN1lka8wgmYQ%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DN1lka8wgmYQ&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FN1lka8wgmYQ%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="200" height="113" scrolling="no" title="Apache log4j Vulnerability Explained" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 09:26:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/TechTalk-Special-Edition-The-Apache-log4j-Vulnerability/m-p/136328#M24392</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-12-16T09:26:12Z</dc:date>
    </item>
  </channel>
</rss>

