ニュース

Several vendors and threat researchers have also developed Log4j-specific detection tools and posted resource blogs to help organizations remediate any exploit.