NopSec.com uses cookies to make interactions with the Company’s Websites easy and meaningful. When you visit one of the Company’s Websites, NopSec.com’s servers send a cookie to your computer. Standing alone, cookies do not personally identify you; they merely recognize your Web browser. Unless you choose to identify yourself to NopSec.com, either by responding to a promotional offer, opening an account, or filling out a Web form (such as a “Contact Us” or a “Free Trial” Web form), you remain anonymous to the Company. Please go to our privacy statement for details.

Acknowledge

CVE-2021-44228 – Log4j “Log4Shell” Vulnerability – Attack Surface and Exploitation


With the holidays around the corner, what more could you ask for then a major security vulnerability blowing up the internet? CVE-2021-44228 has just dropped and it will be on the list of vulnerabilities that security teams will remember where they were the day it hit for the rest of their lives.

Because this vulnerability affects just about anyone using the widely used log4j java library, NopSec is holding an emergency webinar to help you weather this storm. This vulnerability results in a Remote Command Execution and does not require advanced skill to exploit. It must be given immediate attention and be taken as seriously as a live breach.

Presented by Michelangelo Sidagni, CTO and Head Pen Tester

THIS WEBINAR COVERED…

  •  What is Log4j aka Log4Shell
  •  Why it is so dangerous
  •  How you can protect your organization
View The Webinar Now!
Awards

Schedule a Product Demo Today!

See how NopSec's end-to-end Cyber Exposure Management platform can organize your security chaos.