A deep dive into a real-life Log4j exploitation

This article has been indexed from

Check Point Software

The widely used Apache Log4j vulnerability is still making waves worldwide. After witnessing over 1,272,000 attempts to allocate the vulnerability, and attempted exploits on over 44% of corporate networks globally, Check Point Research recently detected numerous attacks exploiting the Log4j vulnerability, involving mining of cryptocurrencies. While most detected miners attacks were Linux-based, Check Point researchers…

The post A deep dive into a real-life Log4j exploitation appeared first on Check Point Software.

Read the original article: