![What is Log4j vulnerability and how to mitigate it? | by Deepak Jalna Oomnarayanan | novice2pro | Dec, 2021 | Medium What is Log4j vulnerability and how to mitigate it? | by Deepak Jalna Oomnarayanan | novice2pro | Dec, 2021 | Medium](https://miro.medium.com/max/1338/1*dWMrTlLTjOhzvtDaAxPndA.png)
What is Log4j vulnerability and how to mitigate it? | by Deepak Jalna Oomnarayanan | novice2pro | Dec, 2021 | Medium
![Using AWS security services to protect against, detect, and respond to the Log4j vulnerability | AWS Security Blog Using AWS security services to protect against, detect, and respond to the Log4j vulnerability | AWS Security Blog](https://d2908q01vomqb2.cloudfront.net/22d200f8670dbdb3e253a90eee5098477c95c23d/2021/12/15/image1-v2-3.jpg)
Using AWS security services to protect against, detect, and respond to the Log4j vulnerability | AWS Security Blog
![Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability - Microsoft Security Blog Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability - Microsoft Security Blog](https://www.microsoft.com/security/blog/uploads/securityprod/2021/12/Log4j-TVM-n1-1024x538.png)
Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability - Microsoft Security Blog
![Securonix Security Advisory: Detecting Apache Log4j/Log4Shell (CVE-2021-44228) Attacks and Post-Exploitation Activity - Securonix Securonix Security Advisory: Detecting Apache Log4j/Log4Shell (CVE-2021-44228) Attacks and Post-Exploitation Activity - Securonix](https://www.securonix.com/wp-content/uploads/2021/12/Example-of-Log4j-Attacks-in-Action-Part-I.png)