KNOWLEDGE PORTAL

Cyberhill News Digest #1

Summary

Cyberhill Logo

Log4j Java-based logging vulnerability.

Date: Dec 13, 2021

Newslink

Summary: A serious vulnerability in the Log4j Java-based logging library is affecting many enterprise applications and cloud services.

Cyberhill Statement: Log4j is the most common Java library for logging. But it’s only used in native Java applications. Cyberhill performs custom scripting work primarily in Microsoft PowerShell and has no published Java applications. Customers working with Cyberhill do not need to worry about the vulnerabilities, however if they are using Third Party applications running in Java they should contact their Third Party provider.

If you have any questions contact us at info@cyberhillpartners.com

AWS Outages happening again

Date: Dec 15, 2021

Newslink

Summary: AWS was having outages and the issue was caused by network congestion between parts of the AWS Backbone and a subset of Internet Service Providers, which was triggered by AWS traffic engineering, executed in response to congestion outside of our network.

You might also be interested in
Generative AI in Cybersecurity
Why Generative AI Is Essential for Enterprise Cybersecurity
Generative AI represents a significant advancement in cybersecurity by shifting from reactive to proactive defenses. Unlike its predecessors, generative AI understands context, generates new responses, and evolves in real-time, making…
LEARN MORE
Protecting Identity: 5 Critical Steps for a CISO
Read about the 5 steps every CISO must undertake to secure their organization's identities.
LEARN MORE
OT Cybersecurity Image
Enhancing Operational Technology (OT) Cybersecurity: Best Practices for Protecting Critical Infrastructure
OT systems have unique challenges that necessitate tailored cybersecurity strategies. This blog outlines best practices for enhancing OT cybersecurity to safeguard these vital systems.
LEARN MORE