Log4j also became a top pick for exploitation after the discovery of a critical RCE flaw.
Article Link: Brute-forcing passwords, ProxyLogon exploits were some of 2021's most popular attack methods | ZDNet
Log4j also became a top pick for exploitation after the discovery of a critical RCE flaw.
Article Link: Brute-forcing passwords, ProxyLogon exploits were some of 2021's most popular attack methods | ZDNet