By analysing network logs, ExeonTrace can detect suspicious connections triggered by internal servers and threat hunt the malicious Java application loaded by the Log4j exploit. Read more on the Log4j exploit and how ExeonTrace supports threat hunting and detection in this article.
Independent of this exploit, ExeonTrace’s proven and future-proof algorithms continuously monitor the network for signs of internal reconnaissance and lateral movement. There is no known Log4j vulnerability in ExeonTrace, thanks to its hardened configuration. We are at your disposal for any support we can provide to detect this highly damaging exploit.
Best wishes and stay safe!
P.S. There is no known Log4j vulnerability in ExeonTrace, thanks to its hardened configuration.