March 2, 2022, 3:17 p.m. | Bill Toulas

BleepingComputer www.bleepingcomputer.com

The Log4Shell vulnerabilities in the widely used Log4j software are still leveraged by threat actors today to deploy various malware payloads, including recruiting devices into DDoS botnets and for planting cryptominers. [...]

botnets cryptominers ddos exploits log4shell security

Information Security Problem Manager

@ Deutsche Bank | Bucharest

Information System Security Officer

@ Booz Allen Hamilton | USA, VA, Chantilly (15009 Conference Ctr Dr)

Senior Account Executive - Cybersecurity

@ OpenText | Virtual, CA

Grants Compliance Senior Specialist

@ Plan International | Bamako, Mali

Sr. Cybersecurity Engineer- Tenable

@ phia, LLC | Arlington, VA

Portfolio Manager- Enterprise Information Security Auditing

@ American Chemical Society | Columbus, OH, US, 43202