![]() ![]() SEE: Iranian state-aligned threat actor targets new victims in cyberespionage and kinetic campaigns (TechRepublic) Since then, there have been tens of millions of attempts to compromise the Log4jShell flaw. The weakness was just one recent example of a backdoor in open source software for attackers to sneak malicious code onto developer and end-user systems. It was almost exactly one year ago that experts found the infamous Log4Shell error message vulnerability in the open source Java library Apache Log4j 2. A new study looks at the open source community’s efforts to “credit-rate” the risk. Open source code for commercial software applications is ubiquitous, but so is the riskĪs the SolarWinds and Log4j hacks show, vulnerabilities in open source software used in application development can open doors for attackers with vast consequences.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |