Skip to main content

Lack of automation leaves companies vulnerable to attacks like Log4Shell and Spring4Shell

Sonatype found that nearly 70% of dependency management decisions are suboptimal in a study that evaluated 100,000 production applications and 4,000,000 open-source component migrations. 

A large part of this is due to lack of security automation, explained Ax Sharma, senior security researcher, and advocate at Sonatype, in a webinar called “The Impact of Zero-Day Attacks on SSC Management.” 

The company also found that when it came to the big breaches such as Log4Shell in December 2021 and Spring4Shell that allowed attackers to remotely execute malicious code, companies that didn’t automate their supply management and weren’t paying attention to vulnerabilities were especially vulnerable. 

The Sonatype Log4j Resource Center dashboard also shows that downloads of Log4Shell have dropped from 50% at the time of the vulnerability disclosure to 33%, but that’s still a lot, according to Sharma. 

“At the time, people were very concerned if they are vulnerable to the Log4Shell vulnerability,” Sharma said. “If you’re using a few components, it could be a component within a component within a component that contains this library, and you just don’t know how it’s being used in your environment. So I think this is where automation wins because you need to find the vulnerable class and the vulnerable code and exactly how it’s being used.”

Since organizations can’t expect their security teams to go through thousands of lines of code and files per day with a manual approach, they can utilize free scanners from companies like SISA, Google, and Microsoft to see if they’re vulnerable to Log4j and can also use essential perimeter security controls. 

“Even if you were impacted by Log4j and you had strong incident response tools in place like a good IDS or IPS, maybe suspicious traffic could be flagged by those rules,” Sharma said. 

Another suggestion is to patch vulnerabilities fast by prioritizing CVEs based on how much each one impacts the environment. There were so many Log4Shell CVEs, but not all of them were critical, and this left system admins and management confused and scratching their heads over the holidays deciding what to prioritize.

Getting updates is also sound security advice, Sharma explained, but make sure that the updates are legitimate and safe and don’t break anything. Such was the case with the SolarWinds attack that was caused by updates that contained trojanized dynamic link libraries (DLLs).

To learn more, watch the webinar “The Impact of Zero-Day Attacks on SSC Management,” available on-demand now. 

The post Lack of automation leaves companies vulnerable to attacks like Log4Shell and Spring4Shell appeared first on SD Times.



from SD Times https://ift.tt/y3pvjmS

Comments

Popular posts from this blog

A guide to data integration tools

CData Software is a leader in data access and connectivity solutions. It specializes in the development of data drivers and data access technologies for real-time access to online or on-premise applications, databases and web APIs. The company is focused on bringing data connectivity capabilities natively into tools organizations already use. It also features ETL/ELT solutions, enterprise connectors, and data visualization. Matillion ’s data transformation software empowers customers to extract data from a wide number of sources, load it into their chosen cloud data warehouse (CDW) and transform that data from its siloed source state, into analytics-ready insights – prepared for advanced analytics, machine learning, and artificial intelligence use cases. Only Matillion is purpose-built for Snowflake, Amazon Redshift, Google BigQuery, and Microsoft Azure, enabling businesses to achieve new levels of simplicity, speed, scale, and savings. Trusted by companies of all sizes to meet...

2022: The year of hybrid work

Remote work was once considered a luxury to many, but in 2020, it became a necessity for a large portion of the workforce, as the scary and unknown COVID-19 virus sickened and even took the lives of so many people around the world.  Some workers were able to thrive in a remote setting, while others felt isolated and struggled to keep up a balance between their work and home lives. Last year saw the availability of life-saving vaccines, so companies were able to start having the conversation about what to do next. Should they keep everyone remote? Should they go back to working in the office full time? Or should they do something in between? Enter hybrid work, which offers a mix of the two. A Fall 2021 study conducted by Google revealed that over 75% of survey respondents expect hybrid work to become a standard practice within their organization within the next three years.  Thus, two years after the world abruptly shifted to widespread adoption of remote work, we are dec...

10 Simple Image Slider HTML CSS JavaScript Examples Neeraj Mishra The Crazy Programmer

Slider is a very important part of any website or web project. Here are some simple image slider examples that I handpicked from various sites. These are built by different developers using basic HTML, CSS, and JavaScript. Some are manual while others have auto-slide functionality. You can find the source code for each by clicking on the code button or on the image. 1. Very Simple Slider Demo + Code 2. Popout Slider Demo + Code 3. Really Simple Slider Demo + Code 4. Jquery Simple Slider Demo + Code 5. Manual Slideshow Demo + Code 6. Slideshow Indicators Demo + Code 7. Simple Responsive Fullscreen Slider Demo + Code 8. Responsive Image Slider Demo + Code 9. Simple Image Slider Demo + Code 10. Slicebox – 3D Image Slider Demo + Code I hope these simple image sliders are helpful for you. For any queries, you can ask in the comment section below. The post 10 Simple Image Slider HTML CSS JavaScript Examples appeared first on The Crazy Prog...