• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

DHS Releases Report into Log4j Vulnerabilities and Response

You are here: Home / General Cyber Security News / DHS Releases Report into Log4j Vulnerabilities and Response
July 15, 2022

This week the US Department of Homeland Security (DHS) introduced the Cyber Protection Critique Board’s (CSRB) 1st report into the December 2021 Log4j event, exactly where a range of vulnerabilities were being claimed with this Java-primarily based logging framework.

The report’s methodology involved a mixture of interviews and requests for data more than a 90-day interval, engaging with somewhere around 80 corporations and men and women comprising application builders, stop buyers, security experts and firms. This was to assure the board spoke with several associates from a extensive selection of viewpoints and to “capture the nuances of how different attack surfaces are created and defended.”

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


The report mentioned that when standardized and reusable “building blocks” are useful for generating and scaling software program, this signifies that any probable vulnerability can be unintentionally integrated into a number of software program offers, placing any corporation that uses those people applications at risk. The report recommended that even nevertheless Log4j remains a risk, the govt-wide reaction assisted mitigate the vulnerability. The board also recognized the need to have for supplemental funding to assistance the mainly volunteer open up-resource application security community.

Field specialists, this kind of as Michael Skelton, senior director of security functions at Bugcrowd, explained of Log4J: “Dealing with it is a marathon, a person that will get a long time to solve. Java and Log4j are commonplace all over the place, not only in main tasks but in dependencies that other jobs rely on, making detection and mitigation not as easy an physical exercise as it may possibly be with other vulnerabilities.”

John Bambenek, principal menace hunter at Netenrich, was more critical of the report’s timing, believing that “anyone however susceptible is very unlikely to examine this report or in considerably of a position to do something about it if they did. Most of the American financial system is compact to medium companies that practically normally by no means have a CISO and most likely not even a CIO. Right up until we discover approaches to make the community with no security budgets risk-free, no significant-stage listing of finest techniques will shift the ball significantly.” 

The CSRB’s report went on to condition that, luckily, it is unaware of any substantial Log4j-based attacks on critical infrastructure property or units and that attempts to compromise Log4j occurred at a decrease stage than numerous specialists predicted. Nonetheless, the report stresses that the Log4j occasion is “not over” and continues to be an “endemic vulnerability” for a lot of many years, with important risk remaining. 

The report culminated in 19 actionable recommendations for authorities and marketplace, break up into 4 subcategories. These were:

  • Deal with Continued Risks of Log4j
  • Generate Present Ideal Procedures for Security Cleanliness
  • Construct a Improved Software program Ecosystem
  • Investments in the Long term

Some sections of this post are sourced from:
www.infosecurity-journal.com

Previous Post: «emerging h0lygh0st ransomware tied to north korea Emerging H0lyGh0st Ransomware Tied to North Korea
Next Post: Average American Accesses Suspicious Sites 6.5 Times a Day Cyber Security News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.