{"id":1594,"date":"2022-01-04T15:03:57","date_gmt":"2022-01-04T18:03:57","guid":{"rendered":"https:\/\/fcnuvem.com.br\/home\/?p=1594"},"modified":"2022-12-05T11:55:37","modified_gmt":"2022-12-05T14:55:37","slug":"blog-riscos-ciberneticos-log4j","status":"publish","type":"post","link":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/","title":{"rendered":"Mitiga\u00e7\u00e3o de riscos cibern\u00e9ticos do Log4J"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"730\" height=\"205\" src=\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/01\/Head-MitigacaoLog4J.png\" alt=\"\" class=\"wp-image-1595\" srcset=\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/01\/Head-MitigacaoLog4J.png 730w, https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/01\/Head-MitigacaoLog4J-300x84.png 300w\" sizes=\"auto, (max-width: 730px) 100vw, 730px\" \/><figcaption><strong>Autor:<\/strong> Renato Azevedo Sant Anna<\/figcaption><\/figure>\n\n\n\n<p>As vulnerabilidades de seguran\u00e7a relacionadas ao Log4J descobertas nos \u00faltimos dias representam a maior amea\u00e7a cibern\u00e9tica que se tem not\u00edcia at\u00e9 hoje, segundo artigo da&nbsp;<a href=\"https:\/\/www.wired.com\/story\/log4j-log4shell-vulnerability-ransomware-second-wave\/?bxid=5f7077f48dd7ce68295d9e71&amp;cndid=62271065&amp;esrc=manage-page&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_brand=wired&amp;utm_campaign=aud-dev&amp;utm_content=WIR_Daily_121721&amp;utm_mailing=WIR_Daily_121721&amp;utm_medium=email&amp;utm_source=nl&amp;utm_term=P4\" target=\"_blank\" rel=\"noreferrer noopener\">revista Wired<\/a>. Foram classificadas como de alt\u00edssimo risco pela gravidade representada para a integridade, confidencialidade e disponibilidade da Arquitetura de Seguran\u00e7a da Informa\u00e7\u00e3o de organiza\u00e7\u00f5es.<\/p>\n\n\n\n<p>Grande parte das redes corporativas est\u00e3o em risco, o que faz necess\u00e1ria a urgente atualiza\u00e7\u00e3o do Log4J para a vers\u00e3o mais recente dispon\u00edvel (<a href=\"https:\/\/www.cisecurity.org\/log4j-zero-day-vulnerability-response\/\" target=\"_blank\" rel=\"noreferrer noopener\">no momento \u00e9 a 2.17.1<\/a>) que corrige essas vulnerabilidades catalogadas. O link acima tem sido atualizado sempre que surge uma nova vulnerabilidade e recomenda uma nova atualiza\u00e7\u00e3o para a mitigar.<\/p>\n\n\n\n<p>***Originalmente quando escrevi esse artigo haviam sido catalogadas 4 vulnerabilidades relacionadas com o Log4J. Dia 30\/12\/2021 foi divulgada a descoberta de uma&nbsp;<a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44832\" target=\"_blank\" rel=\"noreferrer noopener\">nova vulnerabilidade<\/a>, o que exige que o processo de mitiga\u00e7\u00e3o considere essa nova atualiza\u00e7\u00e3o recomendada ( que \u00e9 a que indiquei no par\u00e1grafo acima com o respectivo link) que corrige essa nova brecha descoberta.***<\/p>\n\n\n\n<p>A falhas exploradas afetam diferentes sistemas, pois s\u00e3o parte de uma biblioteca Java para o registro de logs em aplica\u00e7\u00f5es e por isso, quaisquer aplica\u00e7\u00f5es que utilizem do Log4J encapsulado est\u00e3o em risco de seguran\u00e7a cibern\u00e9tica,&nbsp;o que tamb\u00e9m significa que muitos dispositivos IoT com acessos a redes corporativas podem acabar tendo&nbsp;sua seguran\u00e7a comprometida.&nbsp;<\/p>\n\n\n\n<p>Isso \u00e9 de particular import\u00e2ncia, pois qualquer sistema que n\u00e3o esteja atualizado com um patch de atualiza\u00e7\u00e3o que corrija as falhas de seguran\u00e7a relacionadas correm risco.&nbsp;<\/p>\n\n\n\n<p>Os riscos cibern\u00e9ticos n\u00e3o podem mais ser subestimados e precisam ser considerados dentro da Estrat\u00e9gia&nbsp;de organiza\u00e7\u00f5es. O ano de 2021, foi muito marcado por diversos tipos de ataques cibern\u00e9ticos a bases de dados.<\/p>\n\n\n\n<p>A gest\u00e3o da resposta de incidentes de seguran\u00e7a se faz necess\u00e1ria ocorrer de forma \u00e1gil e com acesso \u00e0s mais recentes atualiza\u00e7\u00f5es sobre como mitigar as amea\u00e7as, sendo importante existir planos de conting\u00eancia para responder \u00e0s amea\u00e7as emergentes como parte de um comit\u00ea de gest\u00e3o de crises, que precisa ter mapeado dentro de uma matriz de impacto o&nbsp;que priorizar de modo a se ter uma a\u00e7\u00e3o mais responsiva poss\u00edvel e adequada para endere\u00e7ar&nbsp;o grau de risco&nbsp;&nbsp;para os sistemas informacionais.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/media-exp1.licdn.com\/dms\/image\/C4D12AQG2opaxtAw32g\/article-inline_image-shrink_1500_2232\/0\/1640307967027?e=1646870400&amp;v=beta&amp;t=qd0raXL-X_0S5bQ3oGlQ3SEe62kM7Lvc805okdDc5zo\" alt=\"No alt text provided for this image\"\/><\/figure>\n\n\n\n<p>Ataques de Dia Zero como essa modalidade \u00e9 conhecida, s\u00e3o famosos por explorar sistemas que estejam desatualizados e assim representam um alto grau de risco para as redes corporativas. Um mapeamento e cataloga\u00e7\u00e3o de todos os softwares nas redes corporativas e dispositivos IoT que utilizem do Log4J s\u00e3o parte do primeiro passo para a visibilidade do grau de exposi\u00e7\u00e3o ao risco e a cria\u00e7\u00e3o de plano de a\u00e7\u00f5es para a mitiga\u00e7\u00e3o do mesmo.<\/p>\n\n\n\n<p>Entre os riscos mais graves representados por essas vulnerabilidades, em caso da demora na atualiza\u00e7\u00e3o dos softwares afetados, s\u00e3o a potencial execu\u00e7\u00e3o de c\u00f3digo de forma remota, o que compromete severamente a Arquitetura de Seguran\u00e7a de Informa\u00e7\u00e3o, aumentando a urg\u00eancia do problema.<\/p>\n\n\n\n<p>Isso torna&nbsp;o per\u00edodo da divulga\u00e7\u00e3o de uma falha de seguran\u00e7a e sua explora\u00e7\u00e3o em eventuais ataques especialmente cr\u00edtico,&nbsp;para que atualiza\u00e7\u00f5es possam ser aplicadas nos diferentes sistemas visando corrigir as brechas de seguran\u00e7a descobertas.<\/p>\n\n\n\n<p>Diversos fabricantes de hardware soltaram patches de seguran\u00e7a visando a atualiza\u00e7\u00e3o de firmware para esses dispositivos. \u00c9 altamente recomend\u00e1vel que se busque o part number de seu dispositivo conectado \u00e0 Internet junto ao site do fabricante para que possa proceder com a atualiza\u00e7\u00e3o de firmware se uma nova vers\u00e3o estiver dispon\u00edvel corrigindo estas vulnerabilidades.<\/p>\n\n\n\n<p>Ter um parceiro de confian\u00e7a para ajudar na mitiga\u00e7\u00e3o dos riscos cibern\u00e9ticos \u00e9 essencial para garantir alta disponibilidade de dados com a m\u00e1xima seguran\u00e7a, como a&nbsp;<a href=\"https:\/\/fcnuvem.com.br\/\" target=\"_blank\" rel=\"noreferrer noopener\">FC Nuvem<\/a>, que tem servi\u00e7os de seguran\u00e7a que identificam e corrigem as falhas de forma eficiente, garantindo um ambiente seguro para os clientes.<\/p>\n\n\n\n<p>\u00c9 sempre bom lembrar que o mote da seguran\u00e7a \u00e9 de que todo o sistema \u00e9 t\u00e3o seguro quanto seu ponto mais fr\u00e1gil. Por isso a import\u00e2ncia da const\u00e2ncia vigil\u00e2ncia para garantir que esse risco seja&nbsp;abordado com o grau de urg\u00eancia e impacto que pode representar para as redes corporativas.<\/p>\n\n\n\n<p>Refer\u00eancias:<\/p>\n\n\n\n<p><a href=\"https:\/\/www.wired.com\/story\/log4j-log4shell-vulnerability-ransomware-second-wave\/?bxid=5f7077f48dd7ce68295d9e71&amp;cndid=62271065&amp;esrc=manage-page&amp;source=EDT_WIR_NEWSLETTER_0_DAILY_ZZ&amp;utm_brand=wired&amp;utm_campaign=aud-dev&amp;utm_content=WIR_Daily_121721&amp;utm_mailing=WIR_Daily_121721&amp;utm_medium=email&amp;utm_source=nl&amp;utm_term=P4\" target=\"_blank\" rel=\"noreferrer noopener\">The Next Wave of Log4J Attacks Will Be Brutal | WIRED<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/www.cisecurity.org\/log4j-zero-day-vulnerability-response\/\" target=\"_blank\" rel=\"noreferrer noopener\">Log4j Zero-Day Vulnerability Response (cisecurity.org)<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/fcnuvem.com.br\/home\/falha-de-seguranca\/\" target=\"_blank\" rel=\"noreferrer noopener\">Falha de seguran\u00e7a: nova amea\u00e7a cibern\u00e9tica afeta redes corporativas (fcnuvem.com.br)<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-44832\" target=\"_blank\" rel=\"noreferrer noopener\">NVD &#8211; CVE-2021-44832 (nist.gov)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Os riscos cibern\u00e9ticos relacionados ao Log4J descobertos nos \u00faltimos dias representam a maior amea\u00e7a cibern\u00e9tica que se tem not\u00edcia at\u00e9 hoje<\/p>\n","protected":false},"author":8,"featured_media":1596,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[90],"tags":[399,400,401],"post_series":[],"class_list":["post-1594","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-ciberseguranca","tag-falhas-seguranca","tag-log4j","tag-riscos-ciberneticos","entry","has-media"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mitiga\u00e7\u00e3o de riscos cibern\u00e9ticos do Log4J - Blog da FCamara<\/title>\n<meta name=\"description\" content=\"Os riscos cibern\u00e9ticos relacionados ao Log4J descobertos nos \u00faltimos dias representam a maior amea\u00e7a cibern\u00e9tica que se tem not\u00edcia at\u00e9 hoje\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mitiga\u00e7\u00e3o de riscos cibern\u00e9ticos do Log4J - Blog da FCamara\" \/>\n<meta property=\"og:description\" content=\"Os riscos cibern\u00e9ticos relacionados ao Log4J descobertos nos \u00faltimos dias representam a maior amea\u00e7a cibern\u00e9tica que se tem not\u00edcia at\u00e9 hoje\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog da FCamara\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-04T18:03:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-05T14:55:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/01\/Thumb-MitigacaoLog4J.png\" \/>\n\t<meta property=\"og:image:width\" content=\"260\" \/>\n\t<meta property=\"og:image:height\" content=\"205\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"fcnuvem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"fcnuvem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/\"},\"author\":{\"name\":\"fcnuvem\",\"@id\":\"https:\/\/fcamara.com\/blog\/#\/schema\/person\/62d48659a26297896002e2434a44e28a\"},\"headline\":\"Mitiga\u00e7\u00e3o de riscos cibern\u00e9ticos do Log4J\",\"datePublished\":\"2022-01-04T18:03:57+00:00\",\"dateModified\":\"2022-12-05T14:55:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/\"},\"wordCount\":807,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/fcamara.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/01\/Thumb-MitigacaoLog4J.png\",\"keywords\":[\"falhas seguran\u00e7a\",\"log4j\",\"riscos cibern\u00e9ticos\"],\"articleSection\":[\"Cloud &amp; Ciberseguran\u00e7a\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/\",\"url\":\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/\",\"name\":\"Mitiga\u00e7\u00e3o de riscos cibern\u00e9ticos do Log4J - Blog da FCamara\",\"isPartOf\":{\"@id\":\"https:\/\/fcamara.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/01\/Thumb-MitigacaoLog4J.png\",\"datePublished\":\"2022-01-04T18:03:57+00:00\",\"dateModified\":\"2022-12-05T14:55:37+00:00\",\"description\":\"Os riscos cibern\u00e9ticos relacionados ao Log4J descobertos nos \u00faltimos dias representam a maior amea\u00e7a cibern\u00e9tica que se tem not\u00edcia at\u00e9 hoje\",\"breadcrumb\":{\"@id\":\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#primaryimage\",\"url\":\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/01\/Thumb-MitigacaoLog4J.png\",\"contentUrl\":\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/01\/Thumb-MitigacaoLog4J.png\",\"width\":260,\"height\":205,\"caption\":\"riscos cibern\u00e9ticos\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/fcamara.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"investir em mobilidade\",\"item\":\"https:\/\/fcamara.com\/blog\/tags\/investir-em-mobilidade\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mitiga\u00e7\u00e3o de riscos cibern\u00e9ticos do Log4J\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fcamara.com\/blog\/#website\",\"url\":\"https:\/\/fcamara.com\/blog\/\",\"name\":\"Blog da FCamara\",\"description\":\"Esta \u00e9 a \u00e1rea de insights sobre o mercado de tecnologia.\",\"publisher\":{\"@id\":\"https:\/\/fcamara.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fcamara.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fcamara.com\/blog\/#organization\",\"name\":\"Blog da FCamara\",\"url\":\"https:\/\/fcamara.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/fcamara.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2024\/07\/FCamara-Blog-laranja.webp\",\"contentUrl\":\"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2024\/07\/FCamara-Blog-laranja.webp\",\"width\":459,\"height\":68,\"caption\":\"Blog da FCamara\"},\"image\":{\"@id\":\"https:\/\/fcamara.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/fcamara.com\/blog\/#\/schema\/person\/62d48659a26297896002e2434a44e28a\",\"name\":\"fcnuvem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g\",\"caption\":\"fcnuvem\"},\"url\":\"https:\/\/fcamara.com\/blog\/author\/fcnuvem\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mitiga\u00e7\u00e3o de riscos cibern\u00e9ticos do Log4J - Blog da FCamara","description":"Os riscos cibern\u00e9ticos relacionados ao Log4J descobertos nos \u00faltimos dias representam a maior amea\u00e7a cibern\u00e9tica que se tem not\u00edcia at\u00e9 hoje","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/","og_locale":"pt_BR","og_type":"article","og_title":"Mitiga\u00e7\u00e3o de riscos cibern\u00e9ticos do Log4J - Blog da FCamara","og_description":"Os riscos cibern\u00e9ticos relacionados ao Log4J descobertos nos \u00faltimos dias representam a maior amea\u00e7a cibern\u00e9tica que se tem not\u00edcia at\u00e9 hoje","og_url":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/","og_site_name":"Blog da FCamara","article_published_time":"2022-01-04T18:03:57+00:00","article_modified_time":"2022-12-05T14:55:37+00:00","og_image":[{"width":260,"height":205,"url":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/01\/Thumb-MitigacaoLog4J.png","type":"image\/png"}],"author":"fcnuvem","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"fcnuvem","Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#article","isPartOf":{"@id":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/"},"author":{"name":"fcnuvem","@id":"https:\/\/fcamara.com\/blog\/#\/schema\/person\/62d48659a26297896002e2434a44e28a"},"headline":"Mitiga\u00e7\u00e3o de riscos cibern\u00e9ticos do Log4J","datePublished":"2022-01-04T18:03:57+00:00","dateModified":"2022-12-05T14:55:37+00:00","mainEntityOfPage":{"@id":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/"},"wordCount":807,"commentCount":0,"publisher":{"@id":"https:\/\/fcamara.com\/blog\/#organization"},"image":{"@id":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#primaryimage"},"thumbnailUrl":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/01\/Thumb-MitigacaoLog4J.png","keywords":["falhas seguran\u00e7a","log4j","riscos cibern\u00e9ticos"],"articleSection":["Cloud &amp; Ciberseguran\u00e7a"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/","url":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/","name":"Mitiga\u00e7\u00e3o de riscos cibern\u00e9ticos do Log4J - Blog da FCamara","isPartOf":{"@id":"https:\/\/fcamara.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#primaryimage"},"image":{"@id":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#primaryimage"},"thumbnailUrl":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/01\/Thumb-MitigacaoLog4J.png","datePublished":"2022-01-04T18:03:57+00:00","dateModified":"2022-12-05T14:55:37+00:00","description":"Os riscos cibern\u00e9ticos relacionados ao Log4J descobertos nos \u00faltimos dias representam a maior amea\u00e7a cibern\u00e9tica que se tem not\u00edcia at\u00e9 hoje","breadcrumb":{"@id":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#primaryimage","url":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/01\/Thumb-MitigacaoLog4J.png","contentUrl":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2022\/01\/Thumb-MitigacaoLog4J.png","width":260,"height":205,"caption":"riscos cibern\u00e9ticos"},{"@type":"BreadcrumbList","@id":"https:\/\/fcamara.com\/blog\/blog-riscos-ciberneticos-log4j\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/fcamara.com\/blog\/"},{"@type":"ListItem","position":2,"name":"investir em mobilidade","item":"https:\/\/fcamara.com\/blog\/tags\/investir-em-mobilidade\/"},{"@type":"ListItem","position":3,"name":"Mitiga\u00e7\u00e3o de riscos cibern\u00e9ticos do Log4J"}]},{"@type":"WebSite","@id":"https:\/\/fcamara.com\/blog\/#website","url":"https:\/\/fcamara.com\/blog\/","name":"Blog da FCamara","description":"Esta \u00e9 a \u00e1rea de insights sobre o mercado de tecnologia.","publisher":{"@id":"https:\/\/fcamara.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fcamara.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/fcamara.com\/blog\/#organization","name":"Blog da FCamara","url":"https:\/\/fcamara.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/fcamara.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2024\/07\/FCamara-Blog-laranja.webp","contentUrl":"https:\/\/fcamara.com\/blog\/wp-content\/uploads\/2024\/07\/FCamara-Blog-laranja.webp","width":459,"height":68,"caption":"Blog da FCamara"},"image":{"@id":"https:\/\/fcamara.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/fcamara.com\/blog\/#\/schema\/person\/62d48659a26297896002e2434a44e28a","name":"fcnuvem","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/?s=96&d=mm&r=g","caption":"fcnuvem"},"url":"https:\/\/fcamara.com\/blog\/author\/fcnuvem\/"}]}},"lang":"br","translations":{"br":1594},"pll_sync_post":[],"_links":{"self":[{"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/posts\/1594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/comments?post=1594"}],"version-history":[{"count":1,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/posts\/1594\/revisions"}],"predecessor-version":[{"id":6137,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/posts\/1594\/revisions\/6137"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/media\/1596"}],"wp:attachment":[{"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/media?parent=1594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/categories?post=1594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/tags?post=1594"},{"taxonomy":"post_series","embeddable":true,"href":"https:\/\/fcamara.com\/blog\/wp-json\/wp\/v2\/post_series?post=1594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}