• Latest
  • Trending
Spyderbat Tool Can Discover Log4j Vulnerabilities

Spyderbat Tool Can Discover Log4j Vulnerabilities

January 5, 2022
ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023
Data Leak Hits Thousands of NHS Workers

Data Leak Hits Thousands of NHS Workers

February 20, 2023
EU Cybersecurity Agency Warns Against Chinese APTs

EU Cybersecurity Agency Warns Against Chinese APTs

February 20, 2023
How Your Storage System Will Still Be Viable in 5 Years’ Time?

How Your Storage System Will Still Be Viable in 5 Years’ Time?

February 20, 2023
The Broken Promises From Cybersecurity Vendors

Cloud Infrastructure Used By WIP26 For Espionage Attacks on Telcos

February 20, 2023
Instagram and Facebook to get paid-for verification

Instagram and Facebook to get paid-for verification

February 20, 2023
YouTube CEO Susan Wojcicki steps down after nine years

YouTube CEO Susan Wojcicki steps down after nine years

February 20, 2023
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Thursday, 7 December, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

Spyderbat Tool Can Discover Log4j Vulnerabilities

by ITECHNEWS
January 5, 2022
in Leading Stories, Opinion
0 0
0
Spyderbat Tool Can Discover Log4j Vulnerabilities

Spyderbat is making available an open source tool that scans for vulnerable versions of the Log4j log management software for Java applications on Linux systems.

Seth Goldhammer, vice president of product management at Spyderbat, said the command line tool scans a Linux system to discover vulnerable versions of Log4j. These are typically harder to find because developers often cut and paste instances of Log4j to accelerate application development. As a result, it could take weeks to manually discover all the vulnerable instances of Log4j that might exist in such an IT environment, Goldhammer noted.

YOU MAY ALSO LIKE

ATC Ghana supports Girls-In-ICT Program

Vice President Dr. Bawumia inaugurates ICT Hub

Spyderbat’s software-as-a-service (SaaS) platform uses proprietary agent software to visually map and trace the causality of security events. The Log4j tool is based on the company’s agent software and is intended to provide a way for the company to give back to cybersecurity professionals in a time of crisis, said Goldhammer.

The Log4jShell vulnerabilities are only the latest in a series of zero-day disclosures that have wreaked havoc with security and IT operations, noted Goldhammer. The Spyderbat platform was created to make it easier for cybersecurity teams to visually inspect Linux environments and discover vulnerabilities in a matter of seconds, said Goldhammer.

It remains to be seen whether the Log4Shell vulnerabilities push more organizations toward embracing DevSecOps best practices to automate the remediation of vulnerabilities. It’s not likely that application development teams will slow down the pace at which applications are being built and deployed because of security concerns. As such, it’s incumbent on security teams to find ways to discover and remediate vulnerabilities before cybercriminals can exploit them. Unfortunately, nation-states—along with some of the more advanced cybercriminal gangs—already routinely employ professional developers to create exploits the minute a zero-day vulnerability is discovered, noted Goldhammer.

On the plus side, there’s been increasing attention paid to securing software supply chains in the wake of a series of high-profile breaches—including Log4j. The challenge is that most organizations have yet to implement a set of best practices for handling security incidents to minimize the level of disruption a major zero-day vulnerability inevitably creates. A modern security incident management platform can make responding to unexpected security issues routine, especially if it is based on processes and workflows DevOps teams created to automate application deployment. The more ‘muscle memory’ an organization has to respond to such incidents the more resilient it becomes. Over time, that resilience reduces the overall stress level of the cybersecurity and IT operations teams.

Goldhammer said it’s now only a matter of time before security, DevOps and IT operations teams find a better way to collaborate. The only unknown is how long it will take to achieve that goal given the major cultural differences that currently exist within those teams.

In the meantime, cybersecurity professionals should assume that there will be plenty more zero-day vulnerabilities in the months and years ahead. The issue, of course, is that the amount of time organizations have to respond to those events continues to shrink as cybercriminals become more adept at developing exploits within hours of disclosure.

Source: Michael Vizard
Via: Security Boulevard
Tags: cybersecurity
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023
Co-Creation Hub’s edtech accelerator puts $15M towards African startups

Co-Creation Hub’s edtech accelerator puts $15M towards African startups

February 20, 2023

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

ATC Ghana supports Girls-In-ICT Program

ATC Ghana supports Girls-In-ICT Program

April 25, 2023
Vice President Dr. Bawumia inaugurates  ICT Hub

Vice President Dr. Bawumia inaugurates ICT Hub

April 2, 2023

Recent News

  • ATC Ghana supports Girls-In-ICT Program April 25, 2023
  • Vice President Dr. Bawumia inaugurates ICT Hub April 2, 2023
  • Co-Creation Hub’s edtech accelerator puts $15M towards African startups February 20, 2023
  • Data Leak Hits Thousands of NHS Workers February 20, 2023
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version