Check Point Software
The widely used Apache Log4j vulnerability is still making waves worldwide. After witnessing over 1,272,000 attempts to allocate the vulnerability, and attempted exploits on over 44% of corporate networks globally, Check Point Research recently detected numerous attacks exploiting the Log4j vulnerability, involving mining of cryptocurrencies. While most detected miners attacks were Linux-based, Check Point researchers…
The post A deep dive into a real-life Log4j exploitation appeared first on Check Point Software.
Read the original article: