How would zero trust prevent a Log4Shell attack?

This article has been indexed from

Help Net Security

There is a seemingly trivial solution to any remote code execution attack, namely: do not to let the inbound traffic match the pattern that triggers the vulnerability of the server. Easy to say, but hard to do. There are almost endless variations of traffic patterns that could trigger the critical severity Log4j vulnerability. As a result, malicious patterns of inbound traffic are extremely hard to detect. At the same time, outbound traffic caused by a … More

The post How would zero trust prevent a Log4Shell attack? appeared first on Help Net Security.

Read the original article:

Liked it? Take a second to support IT Security News on Patreon!
Become a patron at Patreon!