This article has been indexed from SecurityWeek RSS Feed
Several types of malware are being delivered in attacks exploiting the recently disclosed Log4j vulnerability named Log4Shell and LogJam.
Read the original article: Ransomware, Trojans, DDoS Malware and Crypto-Miners Delivered in Log4Shell Attacks