New Linux backdoor that propagates via Log4j vulnerability easy to exploit in the cloud

(“Java Logo” by mrjoro is licensed under CC BY-NC 2.0)Researchers on Tuesday found a honeypot system capture an unknown executable and link (ELF) format Linux file propagating through a Log4j vulnerability.In a blog post, 360Netlab researchers say that the network traffic generated by this…
Source: www.scmagazine.com – Read more