3rd Party Risk Management , Application Security , Business Continuity Management / Disaster Recovery

Attackers Exploiting Apache Log4j: 'Everyone Is a Target'

Tracking Threats, Attacks, Adversaries: Researcher Etay Maor Details What to Expect
Etay Maor, senior director of security strategy, Cato Networks

What's in store for defenders as attackers increasingly move to target the widespread Apache Log4j flaw present in many different types of software and hardware?

See Also: Webinar | Everything You Can Do to Fight Social Engineering and Phishing

"Everyone is a target," says cybersecurity expert Etay Maor, whose team at Israeli secure access service edge company Cato Networks has been analyzing hundreds of attacks that attempt to exploit the Log4j vulnerability.

In this video interview with Information Security Media Group, Maor discusses:

  • The significance of the Log4j vulnerability;
  • What his team has learned from analyzing more than 300 attacks;
  • Short-term and long-term advice to security leaders about what to expect next.

Maor is the senior director of security strategy at Cato Networks and an industry-recognized cybersecurity researcher and keynote speaker. Previously, he was the chief security officer for IntSights, where he led strategic cybersecurity research and security services. Before that. Maor held numerous leadership and research positions, including serving as executive security adviser at IBM, where he created and led breach response training and security research, and as head of RSA Security's Cyber Threats Research Labs, where he managed malware research and intelligence teams and was part of cutting-edge security research and operations.

About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.

Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.