ThreatLocker Log4j Update

_(Blog Banner) (1)-1

ThreatLocker has been working closely with the community to identify potentially vulnerable applications that make use of the Log4j plug-in. In the process, we have identified hundreds of applications that include the vulnerable plug-in.

Out of respect for the vendors, ThreatLocker will not publicly disclose their names. All affected vendors have been notified. 

For current ThreatLocker customers, we have developed a custom report that allows you to see which applications in your environment are using the vulnerable plug-in. 

For more information, please visit our knowledge base:

For those who are not already ThreatLocker customers, you can download and install a trial of ThreatLocker without any obligation. This will allow you to identify applications running the vulnerable version of Log4j within 2 hours of installation. 

Regardless of whether you are a customer, ThreatLocker is making our cyber hero team available at no cost 24/7 to help identify and protect against exploits from the vulnerability. 

Sign up for a 30 day trial of ThreatLocker:

ThreatLocker is continuing to monitor the situation. Our team is here to help identify potential issues and secure configurations.

Recent Posts