Warning from U.S. Results in Major Global Corporation’s Rush to Fix Software Exploit

    Experts call for fixing flaws in the Log4j software that could be serious in recent memory. The defect can allow unfettered access to hackers across computer systems. The urgent warning from the cybersecurity agency of the U.S. government put pressure on major global corporations to fix their software.

    As per Bloomberg News, Cisco Inc. and Microsoft Inc. had published advisories about software flaws which the developers fixed last week. But the real solution depends on how thousands of companies who have already installed them fix the software before it is exploited. 

    Charles Carmakal, CTO at Mandiant Inc., a cybersecurity firm, said that it was the worst security vulnerability in the past ten years. Many large companies have requested their help in the last few days. 

    Apache Software Foundation, the non-profit that maintains Log4j, confirmed that the cloud security team of Alibaba Group discovered the flaw in the software. Hackers can take over systems exploiting the vulnerability. Updating and patching the software is a painstaking process as the faulty computer code is baked into various software. 

    Jen Easterly, Director of the U.S. cybersecurity Infrastructure Security Agency (CISA), said in a statement Friday that the vulnerability poses a severe threat. Vendors should immediately identify and patch the array of products using this software

    The Log4j software based on Java Language is likely to affect several products of VMWare Inc., makers of virtual computer software. 

    The CEO of Tenable Inc., Amit Yoran, said that the Log4j software, used widely, has reported that three systems are affected by customers using Tenable’s software vulnerability scanning product every second. 

    Easterly said that CISA is taking urgent action on the vulnerability’s mitigation drive and detecting any threat associated with it. The agency has not found any compromise in the federal systems as of Saturday.

    RELATED ARTICLES

    how to start cloud kitchen from home

    How to Start Cloud Kitchen from Home With No Experience

    Ever stand in your kitchen, whipping up something amazing, and think, “People would pay for...
    Android's new security feature

    Android’s New Security Feature: A Major Leap in Mobile Protection

    In the ever-changing digital age, security is an issue of great importance to smartphone users....
    hr

    Implementing Automated HR Systems in the UAE: Why a PEO is Your Best Ally

    Expanding your business to the UAE offers incredible opportunities, thanks to favorable tax policies, global...
    Share All Your Links in One Place

    The Smarter Way to Share All Your Links in One Place

    One of the most challenging aspects of launching a website is getting the word out...
    Spudgers

    From Screens to Batteries: How Spudgers Simplify Phone Disassembly

    Taking apart a smartphone might seem like a job for professionals. However, hobbyists can also...
    ai

    How to Become an AI Engineer and Why It’s One of the Highest-Paying Careers of the Future

    In the last few years, Artificial Intelligence has emerged from science fiction into the very...
    how to start cloud kitchen from home

    How to Start Cloud Kitchen from Home With No Experience

    Ever stand in your kitchen, whipping up something amazing, and think, “People would pay for...
    Jojoy GTA 5

    Jojoy GTA 5 Download: How to Get Started Safely

    In the world of open-global gaming, Grand Theft Auto V (GTA 5) stands tall as...
    agents

    Letting Agents: The Middleman in the Chain of Tenancy

    The UK rentals sector is faster, more aggressive, and more complex—so letting agent role more...
    beauty tips - well health organic.com

    Beauty Tips – Well Health Organic.com: Unlock Radiant Skin with Home Remedies

    Ever look in the mirror and wish for that healthy, natural glow? Does the thought...
    Eehhaaa login

    Eehhaaa Login: A Full-Fledged Guide to the Website

    In these days’ virtual age, revolutionary structures are reshaping how users interaction with content material...