{"id":787,"date":"2021-12-15T15:30:06","date_gmt":"2021-12-15T15:30:06","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/?p=787"},"modified":"2021-12-15T15:30:06","modified_gmt":"2021-12-15T15:30:06","slug":"log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/","title":{"rendered":"Log4j Exploit Is \u2018A Fukushima Moment\u2019 For Cybersecurity: Tenable CTO"},"content":{"rendered":"<p>Businesses around the world will spend years dealing with the repercussions from critical vulnerabilities discovered in Apache Log4j, Tenable Co-Founder and CTO Renaud Deraison predicted.<\/p>\n<p>The ubiquity of the Java logging package Log4j in software used by everyone from Apache and Apple to Minecraft and Twitter gives threat actors an enormous attack surface to cause widespread global disruption, Huntress Senior Security Researcher John Hammond said. Remote code execution exploits like these are innately dangerous since hackers can carry out an attack with a single line of text, he said.<\/p>\n<p>\u201cTen years ago, an earthquake and subsequent tidal wave triggered the meltdown of the Fukushima nuclear power plant that continues to plague the region today,\u201d Deraison\u00a0<a href=\"https:\/\/www.tenable.com\/blog\/apache-log4j-flaw-a-fukushima-moment-for-the-cybersecurity-industry\" target=\"_blank\" rel=\"noopener\">wrote in a blog post Monday<\/a>. \u201cSimilarly, the early exploitation of Log4j, during which attackers will go after the low-hanging fruit exposed by the vulnerability, will evolve over time to take the form of more complex attacks on more sensitive systems that have less exposure to the internet.\u201d<\/p>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Saturday urged vendors to immediately identify, mitigate, and patch the wide array of products using software from the Log4j library. CISA said it\u2019s proactively reaching out to entities whose networks may be vulnerable and is leveraging its scanning and intrusion detection tools to help identity exposure or exploitation.<\/p>\n<p>\u201cThis vulnerability poses a severe risk,\u201d CISA Director Jen Easterly\u00a0<a href=\"https:\/\/www.cisa.gov\/news\/2021\/12\/11\/statement-cisa-director-easterly-log4j-vulnerability\" target=\"_blank\" rel=\"noopener\">said in a statement Saturday<\/a>. \u201cWe will only minimize potential impacts through collaborative efforts between government and the private sector.<\/p>\n<p>Source: CRN<\/p>\n<p><a href=\"https:\/\/www.crn.com\/news\/security\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\">Read the Full Story Here<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Businesses around the world will spend years dealing with the repercussions from critical vulnerabilities discovered in Apache Log4j, Tenable Co-Founder and CTO Renaud Deraison predicted. The ubiquity of the Java logging package Log4j in software used by everyone from Apache and Apple to Minecraft and Twitter gives threat actors an enormous attack surface to cause [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":768,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-787","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Log4j Exploit Is \u2018A Fukushima Moment\u2019 For Cybersecurity: Tenable CTO - Community<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Log4j Exploit Is \u2018A Fukushima Moment\u2019 For Cybersecurity: Tenable CTO - Community\" \/>\n<meta property=\"og:description\" content=\"Businesses around the world will spend years dealing with the repercussions from critical vulnerabilities discovered in Apache Log4j, Tenable Co-Founder and CTO Renaud Deraison predicted. The ubiquity of the Java logging package Log4j in software used by everyone from Apache and Apple to Minecraft and Twitter gives threat actors an enormous attack surface to cause [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/\" \/>\n<meta property=\"og:site_name\" content=\"Community\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-15T15:30:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/11\/ransomware-g6c61245fb_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1008\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/\",\"name\":\"Log4j Exploit Is \u2018A Fukushima Moment\u2019 For Cybersecurity: Tenable CTO - Community\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/11\/ransomware-g6c61245fb_1920.jpg\",\"datePublished\":\"2021-12-15T15:30:06+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/11\/ransomware-g6c61245fb_1920.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/11\/ransomware-g6c61245fb_1920.jpg\",\"width\":1920,\"height\":1008},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Log4j Exploit Is \u2018A Fukushima Moment\u2019 For Cybersecurity: Tenable CTO\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/\",\"name\":\"Community\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Log4j Exploit Is \u2018A Fukushima Moment\u2019 For Cybersecurity: Tenable CTO - Community","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/","og_locale":"en_US","og_type":"article","og_title":"Log4j Exploit Is \u2018A Fukushima Moment\u2019 For Cybersecurity: Tenable CTO - Community","og_description":"Businesses around the world will spend years dealing with the repercussions from critical vulnerabilities discovered in Apache Log4j, Tenable Co-Founder and CTO Renaud Deraison predicted. The ubiquity of the Java logging package Log4j in software used by everyone from Apache and Apple to Minecraft and Twitter gives threat actors an enormous attack surface to cause [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/","og_site_name":"Community","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2021-12-15T15:30:06+00:00","og_image":[{"width":1920,"height":1008,"url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/11\/ransomware-g6c61245fb_1920.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/","url":"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/","name":"Log4j Exploit Is \u2018A Fukushima Moment\u2019 For Cybersecurity: Tenable CTO - Community","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/11\/ransomware-g6c61245fb_1920.jpg","datePublished":"2021-12-15T15:30:06+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/11\/ransomware-g6c61245fb_1920.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/wp-content\/uploads\/2021\/11\/ransomware-g6c61245fb_1920.jpg","width":1920,"height":1008},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blog\/log4j-exploit-is-a-fukushima-moment-for-cybersecurity-tenable-cto\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/"},{"@type":"ListItem","position":2,"name":"Log4j Exploit Is \u2018A Fukushima Moment\u2019 For Cybersecurity: Tenable CTO"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/#website","url":"https:\/\/www.tsfactory.com\/forums\/","name":"Community","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blog\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/comments?post=787"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/787\/revisions"}],"predecessor-version":[{"id":788,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/posts\/787\/revisions\/788"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media\/768"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/media?parent=787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/categories?post=787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/wp-json\/wp\/v2\/tags?post=787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}