ICS vendors address Log4j vulnerabilities. Old, patched, Windows vulnerability exploited. Google Docs scam. Robocalls rising.

Dateline the Internet: the Log4j vulnerabilities and related risks.
Log4 j in industrial systems. Regulatory response. Exploitation for ransomware. (The CyberWire) ICS vendors review their products for Log4j vulnerabilities. Regulators are working through their response to the open source library…
Source: thecyberwire.com – Read more