Log4j attackers switch to RMI to inject code and mine Monero – Secure Hunter Anti-Malware

Some threat actors exploiting the Apache Log4j vulnerability have switched from LDAP callback URLs to RMI or even used both in a single request for maximum chances of success. […]

This content was originally published here.

Laat een reactie achter

Het e-mailadres wordt niet gepubliceerd.