Cybersecurity leaders are concerned that attackers could further weaponize the Log4j security vulnerability by creating a “worm” that spreads automatically from one vulnerable device to another.
Cybersecurity leaders are concerned that attackers could further weaponize the Log4j security vulnerability by creating a “worm” that spreads automatically from one vulnerable device to another.