
Webinar: SOC response to Log4J attack
Attacks that exploit the Log4J vulnerability that was discovered in December 2021 come in many flavors and can be incredibly challenging for IT security teams to respond to quickly and effectively. A fully equipped security operations center (SOC) can make a huge difference — but many organizations simply lack the resources to set up and maintain a proper SOC.
That’s why growing numbers of organizations are turning to third parties to provide SOC services, giving them access to advanced capabilities on an as-needed basis.
But what exactly does an SOC do, and what are the tools it uses to achieve its results? Attend an upcoming Barracuda webinar to get an in-depth understanding of how an SOC leverages extended visibility detection and response (XDR) platforms to respond to security incidents, along with the information you need to make the right decision for your organization.
24 hours in the Barracuda SOC
At the webinar, you’ll get:
- A detailed explanation of how the Log4J vulnerability enables a number of different types of attack against vast numbers of organizations — and why those attacks are still continuing more than a year after the discovery of the flawed code that causes it
- A minute-by-minute summary of how the Barracuda SOC put its XDR capabilities to work over the course of the first day following the Log4J vulnerability’s discovery — identifying vulnerable clients, applying patches to close their security gaps, and responding rapidly to active exploit attempts
- A thorough discussion of how a managed XDR service — an outsourced SOC — provides comprehensive security coverage across your entire integrated attack surface, leveraging advanced automation and intelligence-sharing to respond rapidly and effectively to many different types of attacks and vulnerabilities
Why Log4J still matters
Log4J is ubiquitous. Fully 88% of organizations worldwide use some version of it in their IT stack, affecting about 3 billion devices. And cybercriminals are still working hard to exploit unpatched versions of it. Although the initial rate of exploit attempts — 10 million per hour — has slowed considerably, the ongoing rate of attempts remains significant.
The ubiquity of the flawed code is just one reason for its popularity with attackers. Another is the fact that once attackers find an unpatched instance of Log4J, they can immediately leverage it to gain access to targeted networks. They don’t need to have any stolen authentication credentials or compromised account, making it one of the easiest ways to carry out ransomware attacks, DDoS attacks, crypto-miner deployments, and more.
Attend this online event to get all the information and insights you need about how Log4J continues to create risk — and how an XDR-powered SOC is critical to organizations seeking to effectively reduce and manage cyber risk across all vectors and attack modes.