Information security tech, policy, practice. Twitter is my threat intel stream. Super irregular Tweets, comments are my own.
Jan 7, 2022 • 11 tweets • 2 min read
#Log4j is one of those vulnerabilities that seems ready-made for mass exploitation. Remotely accessible + unauthenticated + widely used + super easy. So where are all the victims? My very first🧵😉
This is like the Fermi paradox, but for #cybersecurity. There *are* victims, and *this is* a serious vulnerability that should be quickly mitigated.