• Latest
  • Trending
WhiteSource Open Source Tool Can Discover Log4j Vulnerabilities

WhiteSource Open Source Tool Can Discover Log4j Vulnerabilities

December 21, 2021
Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022
Fibre optic interconnection linking Cameroon and Congo now operational

Fibre optic interconnection linking Cameroon and Congo now operational

July 15, 2022
Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

Ericsson and MTN Rwandacell Discuss their Long-Term Partnership

July 15, 2022
Airtel Africa Purchases $42M Worth of Additional Spectrum

Airtel Africa Purchases $42M Worth of Additional Spectrum

July 15, 2022
Huawei steps up drive for Kenyan talent

Huawei steps up drive for Kenyan talent

July 15, 2022
TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

TSMC predicts Q3 revenue boost thanks to increased iPhone 13 demand

July 15, 2022
Facebook to allow up to five profiles tied to one account

Facebook to allow up to five profiles tied to one account

July 15, 2022
Top 10 apps built and managed in Ghana

Top 10 apps built and managed in Ghana

July 15, 2022
MTN Group to Host the 2nd Edition of the MoMo API Hackathon

MTN Group to Host the 2nd Edition of the MoMo API Hackathon

July 15, 2022
KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

KIOXIA Introduce JEDEC XFM Removable Storage with PCIe/NVMe Spec

July 15, 2022
  • Consumer Watch
  • Kids Page
  • Directory
  • Events
  • Reviews
Monday, 30 January, 2023
  • Login
itechnewsonline.com
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion
Subscription
Advertise
No Result
View All Result
itechnewsonline.com
No Result
View All Result

WhiteSource Open Source Tool Can Discover Log4j Vulnerabilities

Open Source Tool Can Discover Log4j Vulnerabilities

by ITECHNEWS
December 21, 2021
in Leading Stories, Opinion
0 0
0
WhiteSource Open Source Tool Can Discover Log4j Vulnerabilities

WhiteSource has made available an open source tool to detect vulnerable instances of Log4j logging software. The recently disclosed flaw allows cybercriminals to launch a remote code execution (RCE) attack via Java applications.

Rami Sass, WhiteSource CEO, said WhiteSource is also testing an extension to that command-line interface (CLI) tool that will enable IT teams to automatically remediate the Log4j vulnerabilities identified as CVE-2021-44228 and CVE-2021-445046.

YOU MAY ALSO LIKE

Inaugural AfCFTA Conference on Women and Youth in Trade

Instagram fined €405m over children’s data privacy

The WhiteSource tool is available on GitHub, and Sass said it scans projects to find vulnerable Log4j versions and then surfaces the actions required to remediate vulnerabilities whether they reside within the IT environment itself or via a dependency on an external application.

WhiteSource

Given the severity of the Log4j vulnerabilities, most organizations are moving quickly to address the issue. The challenge they face is there may be many instances of Log4j that IT organizations are no longer tracking, for one reason or another. The WhiteSource tool is designed to reduce the time and effort required to discover every instance of Log4j that needs to be updated—or, at the very least, reconfigured—to remediate the vulnerabilities, said Sass.

WhiteSource estimates attackers are already launching millions of attempts to exploit the Log4j vulnerabilities because cybercriminals already realize the window of opportunity is already closing. Overall, Sass said the open source community is getting more adept at responding to newly discovered zero-day vulnerabilities. The Log4j vulnerability is only the latest in a series of vulnerabilities that have been discovered in recent years, he noted. Most enterprise IT organizations are either already well on their way to implementing security incident response platforms that speed up response times or they are planning to implement such a platform shortly, said Sass.

In the longer term, Sass said IT teams should also expect to see automation become more prevalent in remediating these types of vulnerabilities as security tool providers gain more insights into what’s actually running within an IT environment.

In the meantime, however, the level of disruption caused by the Log4j vulnerabilities has been significant. The open source community is trying to strike a balance between responsible disclosure of vulnerabilities and the need to encourage IT teams to remediate code as quickly as possible. In the meantime, IT teams should assume that some cybercriminals have probably known of these vulnerabilities for some time. It’s now a question of determining the degree to which they may have already been exploited.

Cybersecurity professionals clearly need to work more closely with application developers to better understand what open source components may exist within an application. In fact, that need is exactly why there is so much recent focus on software bills of materials (SBOMs) that, as part of a set of DevSecOps best practices, make it easier for organizations to assess their overall level of risk. Otherwise, the sheer number of vulnerabilities discovered will simply overwhelm developers as they attempt to strike a balance between adding new application features and prioritize vulnerability remediation all at once.

Source: Security Boulevard
Tags: Log4j Vulnerabilities
ShareTweetShare
Plugin Install : Subscribe Push Notification need OneSignal plugin to be installed.

Search

No Result
View All Result

Recent News

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022
8 Most Common Causes of a Data Breach

5.7bn data entries found exposed on Chinese VPN

August 18, 2022

About What We Do

itechnewsonline.com

We bring you the best Premium Tech News.

Recent News With Image

Inaugural AfCFTA Conference on Women and Youth in Trade

Inaugural AfCFTA Conference on Women and Youth in Trade

September 6, 2022
Instagram fined €405m over children’s data privacy

Instagram fined €405m over children’s data privacy

September 6, 2022

Recent News

  • Inaugural AfCFTA Conference on Women and Youth in Trade September 6, 2022
  • Instagram fined €405m over children’s data privacy September 6, 2022
  • 5.7bn data entries found exposed on Chinese VPN August 18, 2022
  • Fibre optic interconnection linking Cameroon and Congo now operational July 15, 2022
  • Home
  • InfoSec
  • Opinion
  • Africa Tech
  • Data Storage

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

No Result
View All Result
  • Home
  • Tech
  • Africa Tech
  • InfoSEC
  • Data Science
  • Data Storage
  • Business
  • Opinion

© 2021-2022 iTechNewsOnline.Com - Powered by BackUPDataSystems

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In
Go to mobile version