{"id":3993,"date":"2021-12-11T02:36:11","date_gmt":"2021-12-11T01:36:11","guid":{"rendered":"http:\/\/costops.com\/index.php\/2021\/12\/11\/recently-uncovered-software-flaw-most-critical-vulnerability-of-the-last-decade\/"},"modified":"2021-12-11T02:36:11","modified_gmt":"2021-12-11T01:36:11","slug":"recently-uncovered-software-flaw-most-critical-vulnerability-of-the-last-decade","status":"publish","type":"post","link":"http:\/\/costops.com\/index.php\/2021\/12\/11\/recently-uncovered-software-flaw-most-critical-vulnerability-of-the-last-decade\/","title":{"rendered":"Recently uncovered software flaw \u2018most critical vulnerability of the last decade\u2019"},"content":{"rendered":"<p>Log4Shell grants easy access to internal networks, making them susceptible to data loot and loss and malware attacks<\/p>\n<p>A critical vulnerability in a widely used software tool \u2013 one quickly exploited in the online game Minecraft \u2013 is rapidly emerging as a major threat to organizations around the world.<\/p>\n<p>\u201cThe internet\u2019s on fire right now,\u201d said Adam Meyers, senior vice-president of intelligence at the cybersecurity firm Crowdstrike. \u201cPeople are scrambling to patch\u201d, he said, \u201cand all kinds of people scrambling to exploit it.\u201d He said on Friday morning that in the 12 hours since the bug\u2019s existence was disclosed, it had been \u201cfully weaponized\u201d, meaning malefactors had developed and distributed tools to exploit it.<\/p>\n<p> <a href=\"https:\/\/www.theguardian.com\/technology\/2021\/dec\/10\/software-flaw-most-critical-vulnerability-log-4-shell\">Continue reading&#8230;<\/a><br \/>\n<img src=\"https:\/\/i.guim.co.uk\/img\/media\/c144f92e319940592ccae5327ccdf933a36172f7\/0_0_3000_1800\/master\/3000.jpg?width=140&amp;quality=85&amp;auto=format&amp;fit=max&amp;s=d1684e779fc53ef3db6fab685f81d857\" title=\"Recently uncovered software flaw \u2018most critical vulnerability of the last decade\u2019\" \/>Log4Shell grants easy access to internal networks, making them susceptible to data loot and loss and malware attacks<br \/>\nA critical vulnerability in a widely used software tool \u2013 one quickly exploited in the online game Minecraft \u2013 is rapidly emerging as a major threat to organizations around the world.<br \/>\n\u201cThe internet\u2019s on fire right now,\u201d said Adam Meyers, senior vice-president of intelligence at the cybersecurity firm Crowdstrike. \u201cPeople are scrambling to patch\u201d, he said, \u201cand all kinds of people scrambling to exploit it.\u201d He said on Friday morning that in the 12 hours since the bug\u2019s existence was disclosed, it had been \u201cfully weaponized\u201d, meaning malefactors had developed and distributed tools to exploit it. Continue reading&#8230;Technology | The Guardian<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Log4Shell grants easy access to internal networks, making them susceptible to data loot and loss and malware attacks A critical vulnerability in a widely used software tool \u2013 one quickly exploited in the online game Minecraft \u2013 is rapidly emerging as a major threat to organizations around the world. \u201cThe internet\u2019s on fire right now,\u201d &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"http:\/\/costops.com\/index.php\/2021\/12\/11\/recently-uncovered-software-flaw-most-critical-vulnerability-of-the-last-decade\/\"> <span class=\"screen-reader-text\">Recently uncovered software flaw \u2018most critical vulnerability of the last decade\u2019<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":0,"featured_media":3994,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/posts\/3993"}],"collection":[{"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/comments?post=3993"}],"version-history":[{"count":0,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/posts\/3993\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/media\/3994"}],"wp:attachment":[{"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/media?parent=3993"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/categories?post=3993"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/costops.com\/index.php\/wp-json\/wp\/v2\/tags?post=3993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}